Ghaziabad
India
- Angel Draev
- Ghazi Mabrouk
Intermediate
Description
Telecommunications is evolving fast with 5G, 6G, massive IoT, cloud-native architectures, and open networks. These advances unlock new opportunities but also bring complex cybersecurity challenges that can threaten trust and resilience.
This week-long training equips participants to tackle these challenges from strategic and technical perspectives. It covers the global cyber threat landscape, the role of trust in networks, and key technologies for secure telecom environments, including Zero Trust, AI-driven threat detection, and cloud, edge, and critical infrastructure security.
Participants will also explore emerging risks and trends, such as IoT vulnerabilities, supply chain exposures, quantum communications, and 6G security implications. Through case studies, exercises, and discussions, they will build practical skills to design, govern, and implement secure strategies for the telecom networks of tomorrow.
With the generous support of the Global Gateway initiative of the European Union, participation in this training is provided free of charge for selected applicants. This includes accommodation, meals, and extracurricular activities. Participants or their organizations are responsible for covering the costs of travel expenses to and from their home countries to Ghaziabad, India and visa application costs if applicable. Airport transfer in India will be offered by the training organizers.
This course is intended for government officials and policy makers engaged in telecom network security and policy formulation worldwide.
The maximum number of participants for this training course is limited to 30.
Members of the above-mentioned target population are invited to apply for the training if they meet the following criteria:
- Hold an undergraduate degree in a relevant field or have at least three years of experience in cybersecurity and/or digital transformation if they do not hold a university degree.
- Possess a fluent level of English.
- Complete the application questionnaire and attach an up-to-date CV, a recommendation letter from their employer, or a motivation letter.
Government officials and policymakers from developing countries, particularly women, are encouraged to apply. Selection will be conducted by the course organizers, who will consider the above entry requirements along with an analysis of the application questionnaire and the recommendation/motivation letter of each applicant.
Upon completion of this course, participants will be able to:
- Outline the global telecom cybersecurity landscape and its implications for trust, resilience, and interoperability.
- Explore key technologies and architectures (Zero Trust, 5G/6G, AI/ML, cloud, IoT) for fortifying telecom networks.
- Assess risks across the telecom ecosystem, including supply chain, IoT, open networks, and critical infrastructure.
- Evaluate the transformation in telecom—driven by virtualization, quantum readiness, and blockchain—and their security implications.
- Discuss and develop strategies, policies, and collaborative approaches to strengthen global telecom security and resilience.
The training will use a mix of interactive and practical approaches, including:
- Lectures by subject matter experts
- End-of-day quizzes to reinforce learning
- Case studies analyzing global telecom attack scenarios, telecom fraud, and identity threats
- Group activities and role-plays to encourage collaboration and problem-solving
- Hands-on lab exercises for practical experience
Participants will be assessed through a combination of tools:
- Active participation / Groupwork deliverables: 40%
- End-of-day quizzes: 20%
- Final exam: 40%
- Total: 100%
A minimum of 70% overall is required to receive the ITU certificate.
Day 1 – Building Trust in Telecom Networks
Session 1: Inaugural Session & Course Overview
Key learning points:
- Understand the scope, objectives, and structure of the program.
- Recognize the importance of trust in global telecom cybersecurity.
Session 2: Global Telecom Threat Landscape
Key learning points:
- Identify key cyber threats impacting telecom networks worldwide.
- Analyze past incidents for lessons in resilience building.
Session 3: Frameworks for Trust in Telecom
Key learning points:
- Explain trust principles: confidentiality, integrity, availability, resilience.
- Evaluate cross-border trust and sovereignty issues in telecom operations.
Session 4: Regulations & Global Cooperation
Key learning points:
- Compare international regulatory frameworks (ITU, GSMA, ENISA, NIST).
- Assess the role of global cooperation in safeguarding telecom infrastructure.
Day 2 – Technologies for Fortification (Core Networks)
Session 5: Zero Trust & Secure Architectures
Key learning points:
- Apply Zero Trust principles to telecom networks.
- Secure 4G/5G architectures effectively.
Session 6: AI/ML in Telecom Security
Key learning points:
- Examine AI/ML for threat detection and fraud prevention.
- Evaluate strengths and risks of AI-driven security solutions.
Session 7: Virtualization & Cloud Security
Key learning points:
- Explore cloud-native networks and IoT security challenges.
- Recommend mitigation strategies for secure cloud-based telecom environments.
Session 8: Risk Assessment of 5G Core
Key learning points:
- Identify vulnerabilities in 5G core networks.
- Propose security controls to address identified risks.
Day 3 – Securing the Ecosystem
Session 9: IoT & M2M Security
Key learning points:
- Recognize IoT/M2M vulnerabilities within telecom ecosystems.
- Suggest protective measures against large-scale IoT-based attacks.
Session 10: Critical Infrastructure & Supply Chain Security
Key learning points:
- Identify risks in telecom supply chains and critical infrastructure.
- Recommend mitigation strategies and vendor risk management.
Session 11: Satellite & Submarine Cable Security
Key learning points:
- Analyze vulnerabilities in satellite and subsea cable systems.
- Explore strategies for redundancy and resilience in global networks.
Session 12: Telecom Fraud & Identity Threats
Key learning points:
- Examine telecom fraud and identity threats (SS7/Diameter, SIM swap, VoIP fraud).
- Propose mitigation strategies for fraud prevention.
Day 4 – Telecom Transformation & Future Security
Session 13: Quantum Communications & Post-Quantum Cryptography
Key learning points:
- Describe quantum communications and post-quantum cryptography in telecom resilience.
Session 14: Blockchain in Telecom Security
Key learning points:
- Evaluate blockchain applications for authentication and transaction trust in telecom.
Session 15: 6G & Future Security Challenges
Key learning points:
- Identify emerging risks from ultra-low latency, AI-driven threats, and new telecom technologies.
Session 16: Global Case Studies & Roadmap Design
Key learning points:
- Analyze international approaches to telecom security.
- Design secure strategies for future telecom transformation.
Day 5 – Governance, Capacity Building & Way Forward
Session 17: Standards, Best Practices & International Cooperation
Key learning points:
- Examine international standards (ISO/IEC 27001, 3GPP SA3, NIST CSF).
- Understand the role of CERTs/CSIRTs and policy-building strategies.
Session 18: Final Assessment
Key learning points:
- Test knowledge gained throughout the course.
Session 19: Feedback & Valedictory
Key learning points:
- Reflect on key learnings and provide constructive feedback.