X

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

Wireless Core Edge-to-Core Security

Back to Program >

Course Overview

This course explains how 5G is driving changes to security practices and technologies in telco networks. We discuss the top security requirements and use cases for the 5G Wireless Core network and describe Intel’s key technologies for edge-to-core security.

Share With

Chapter 1: The Evolution of Edge-to-Core Security for 5G

Chapter List

Quiz Status

Please watch the video before taking the quiz.

Once you have watched the video, please take the quiz.

Quiz Status

Please watch the video before taking the quiz.

Once you have watched the video, please take the quiz.

Chapter Overview

In this chapter, we discuss the evolution of Edge-to-Core Security for 5G. We explore security in industry transformation and how new computing opportunities such as cloud, edge, and analytics, are emerging and transforming business operations and increasing security complexity.

Knowledge Gained

Intel® Xeon® Scalable Processors Intel® SGX Intel® QuickAssist Technology 5G Containers Cloud Computing Cryptography Cloud Native Data Center Hybrid Cloud Network Edge Wireless Radio Access Network Core Network Communications Service Providers Cloud Service Providers Network Transformation Cybersecurity Telco Cloud Confidential Computing

Related Courses