Edge Security Demystified
Edge Security Demystified
Intermediate
4 Hrs
An advanced guide to securing your massive Edge infrastructure.
An advanced guide to securing your massive Edge infrastructure.
Overview
MEC (Multi-access Edge Computing) is a key emerging technology, especially since the introduction of 5G systems. The industry interest is gradually shifting into this new domain, with impact on new application development paradigms, that will enable innovative services accelerating even further the smartphones evolution. Moreover, cybersecurity is an important aspect to consider. It is then important to get familiar now with MEC and its impacts and benefits on application developments, avoiding the many myths and confusions that often circulate around new technologies.
The course will help you to navigate across many standards and solutions, in order to better focus on what matters for edge application development. It will cover the main aspects of Edge Computing, from a both system level and practical perspective and with the aim to provide useful tool for engineers, research scientists and of course application developers. In particular, you will learn all innovative technologies around MEC, with all critical references from international standardization (e.g. ETSI, 3GPP), industry groups (e.g. GSMA, 5GAA) and open source projects (e.g. Linux Foundation, CNCF, etc.). A special focus will be given to cybersecurity, where you will acquire a comprehensive understanding of the state-of-the-art support for edge computing, with special focus on automotive applications, as a key example from the industry.
Additionally, a set of practical examples and exercises will complete the course, together with a final quiz, where you will have the opportunity to measure your skills against problems in the real life, to be prepared to build your own MEC application, also based on the open-source software introduced during the course.
By the end of the course, you will be able to understand Edge computing and its key technology not only for 5G systems, but also in conjunction with other access technologies.
What You Will Learn
- Understand the fundamentals of MEC technology (Multi-access Edge Computing) in relation with 5G systems, and the main aspects related to cybersecurity at the edge.
- Familiarize with Edge security strategy and workflow
- Learn comprehensive overview of State-of-The-Art technical solutions and standards related to edge and to security.
- Learn to secure implementation of Edge environments, deploy tunnels and firewalls at the โEdgeโ, and endpoint/device monitoring within an Edge environment.
- Learn about device and user authentication in Edge computing, deployment of network access control in Edge computing and how to monitor data leakage in Edge environments.
- Familiarize with Secure Access Service Edge (SASE) architecture and how to deploy SASE at the Edge.
Prerequisites
- Basic knowledge on IT networking and cloud computing
Content
Chapter 1: Hype versus Reality of MEC
4 Videos
The Vision and Promise of the Edge Understanding the Hype: The Chicken-egg Problem Preparing for What is Real: The Application Development Perspective $7 Million Cybersecurity Scholarship by EC-Council Chapter 1 Quiz
Preview
Chapter 2: Edge Computing Ecosystem and Standards
5 Videos
Edge Computing, Fog Computing, and Cloud Computing ETSI ISG MEC Overview and Scope 3GPP SA6 and Integration of EDGEAPP with ETSI MEC Industry Groups Related to MEC Open-source Projects for the Edge Chapter 2 Quiz
Preview
Chapter 3: Deep Dive on MEC Specifications
6 Videos
MEC Architecture MEC Service APIs MEC in NFV Environments MEC in 4G, MEC in 5G, and MEC in Wi-Fi Networks Inter-MEC Systems and MEC Cloud Systems Coordination Technical Background on MEC Federation Chapter 3 Quiz
Preview
Chapter 4: Cybersecurity at the Edge: Scenarios and Challenges
4 Videos
End-to-end Security in Edge Environments Edge Scenarios and Security Aspects Areas of Vulnerabilities Approaches for Edge Security Chapter 4: Quiz
Preview
Chapter 5: Technical Overview on MEC Security Solutions and Standards
6 Videos
Standardization Landscape on Security ETSI ISG NFV (Network Functions Virtualization) ETSI ISG MEC (Multi-access Edge Computing) ETSI TC CYBER, 3GPP SA3, SASE, and MEF Other Standards (TCG, ISO, NIST) Cybersecurity Regulation Applicable to Edge Compute Chapter 5 Quiz
Preview
Chapter 6: Automotive Case Study: The View of 5GAA - Part 1
4 Videos
The Automotive Challenge Multi-MNO, Multi-OEM, and Multi-vendor Scenarios MEC Federation: An Industry-led Initiative Telco Edge Cloud Chapter 6 Quiz
Preview
Chapter 7: Automotive Case Study: The View of 5GAA - Part 2
6 Videos
Threat Landscape Security Threats Privacy Threats Trust Concerns Mitigation Strategies Considerations and Automotive Perspective Chapter 7 Quiz
Preview
Chapter 8: Looking Forward on MEC Security
5 Videos
Edge Technology Trends Confidential Computing AI-implications Distributed Ledger Technologies (DLTs) Quantum-resistant Crypto Chapter 8 Quiz
Preview
Chapter 9: Conclusion and Next Steps
1 Videos
Overview of Key Takeaways from the Course
Preview
Instructor
Dario Sabella
Get access to only this course
$79.99
One-time PaymentGet access to all 500+ courses with EC-Council Pro
$59.99/Month
Get access to all 500+ courses with EC-Council Pro
$599/Year
Get 2 months free!
Looking to train your team?
Try EC-Council Enterprise ยปReviews
(171 reviews)
5
Average Course Rating
Related Courses
469 enrollments
Course
CCNA - Understanding Routers and Switches
$49.99
231 enrollments
Course
CISSP Certification Domains 5, 6, 7, and 8 Video Training
$69.99
809 enrollments
Course
Learn Ethical Hacking by Hacking Real Websites Legally
$69.99