text
hidden text to trigger early load of fonts ПродукцияПродукцияПродукцияПродукция Các sản phẩmCác sản phẩmCác sản phẩmCác sản phẩm المنتجاتالمنتجاتالمنتجاتالمنتجات מוצריםמוצריםמוצריםמוצרים

Wireless Core Edge-to-Core Security

Course Overview

This course explains how 5G is driving changes to security practices and technologies in telco networks. We discuss the top security requirements and use cases for the 5G Wireless Core network and describe Intel’s key technologies for edge-to-core security.

Share With

Related Content

Chapter 1: The Evolution of Edge-to-Core Security for 5G

Chapter List

Quiz Status

Please watch the video before taking the quiz.

Once you have watched the video, please take the quiz.

Quiz Status

Please watch the video before taking the quiz.

Once you have watched the video, please take the quiz.

Chapter Overview

In this chapter, we discuss the evolution of Edge-to-Core Security for 5G. We explore security in industry transformation and how new computing opportunities such as cloud, edge, and analytics, are emerging and transforming business operations and increasing security complexity.

Knowledge Gained

Intel® Xeon® Scalable Processors Data Center Containers Communications Service Providers Cloud Native