About Course
5G Cyber Security
5G technology is the newest form of wireless communication that promises to revolutionize the way we interact with the world around us. It promises faster speeds and lower latency, which will enable the Internet of Things (IoT) to flourish and usher in a new era of smart cities and connected devices. However, with the increased usage of 5G technology comes an increased risk of cyber security threats that must be addressed. In order to protect 5G networks, security measures must be taken to ensure that only authorized users have access to sensitive data and communications. This includes measures such as encryption, authentication, and access control. Encryption ensures that data is only readable by those with the necessary decryption key. Authentication ensures that only those with the correct credentials are able to access the network. Access control ensures that only authorized users can gain access to the network. Additionally, 5G networks must be monitored for vulnerabilities and malicious activity. Companies must employ security professionals to monitor their networks and detect any suspicious behavior. Companies must also implement preventive measures such as firewalls and intrusion detection systems to prevent malicious actors from gaining access to the network. Finally, companies must ensure that their 5G networks are regularly updated with the latest security patches. This will help to ensure that the system is always secure and up to date with the latest security protocols. Overall, 5G technology is an exciting advancement that will revolutionize the way we interact with the world around us. However, with the increased usage of 5G technology comes an increased risk of cyber security threats that must be addressed. Companies must take the necessary steps to ensure that their 5G networks are secure and remain that way.
Introduction to 5G cyber-security and ethical hacking platforms and learn from the top ethical hacker and penetration testing instructor, Loi Liang Yang, who has over 200,000 subscribers across the globe with more than 5 million views on his security content.
Introduction to cyber-security 5G
- Cyber-attack chain
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and Control
- Actions on Objective
Virtualization on VirtualBox
- Kali Linux
- Install, deploy and run Kali Linux
- Installation and deployment of vulnerable server for testing
Reconnaissance
Information gathering
Assess security vulnerabilities
Scanning engines
- Nmap scanning
Search engine scanners
Internet scanners
- Google search engine
Open-source intelligence
- Recon-ng scanning
Security standards
Center for Internet Security (CIS)
Hardening checks for systems
Exploitation
Metasploit framework for ethical hacking
- Basic commands and usage
- Module exploration
- Search for vulnerabilities from scanning results
- Exploitation of systems
- Post-exploitation for privilege escalation and scanning
Security hardening and configuration
Social engineering
- Dark Web with Tor
- Hacking groups and forums
- Wireless security assessment with WiFi PineApple
- Wireless vulnerabilities
- Social Engineering Toolkit (SET) attacks
- Direct attacks into Windows 10 with Macros and Powershell
Web, application, and database vulnerabilities
Open Web Application Security Project (OWASP) top 10
- Injection
- Broken authentication
- Sensitive data exposure
- XML External Entities
- Broken access control
- Security misconfiguration
- Cross-Site Scripting
- Insecure Deserialization
- Using components with known vulnerabilities
- Insufficient logging and monitoring
Full SQLMAP tutorial for web penetration testing
BurpSuite tutorial for manual injection on web penetration testing
Payload testing with custom load
Creation of payload
- Payloads package on injection
- Fully undetected payloads
- Buffer overflow for shell
Come join thousands of students who have learned from the top ethical hacking and penetration testing instructor, Loi Liang Yang, now!
Course Content
Security Course lectures
-
5G Security: A Shared Responsibility
05:14 -
R&S Thirty-Five: 5G security aspects
36:27 -
CISA Webinar: 5G Security and Vulnerabilities
56:18 -
4G to 5G Evolution: In-Depth Security Perspective
46:46 -
Webinar: 5G Security Briefing
01:04:49 -
yes, your phone is already hacked
06:19 -
5G Security Evolution | Vadim Paryev | Swisscom
01:04:45 -
New Vulnerabilities in 5G Networks
43:36