Our Objective
The objective of the training is to provide the student through practical sessions to easily implement in his laboratory mobile networks of any technology, including 2G, 3G, 4G and 5G.
The student will be able to study the security of mobile devices and core network protocols, perform attacks such as trafc interception, analyse how to perform a downgrade attack and play with encryption or authentication algorithms, between others.

Who Should take this Course?
- Pentesters and security auditors
- Telecom professionals and telecom operators
- Telcom and IoT device researchers
What to Expect?
- Understanding telco mobile networks architecture & protocols.
- Hands-on compilation of Linux source code in Ubuntu
- A fully functional platform to start researching or developing new attacks on mobile networks of any technology