Shop

About the Course

Wireless communication technologies are a critical part of our lives. 5G networks are the backbone of new services providing connectivity for remote health monitoring, body-attached sensors, smart logistics, autonomous cars and unmanned aerial vehicles. These services are integrated with cloud computing and mobile edge computing. 5G faces additional challenges to user privacy concerns, trust and service model requirements to support mission critical application and IoT (Internet of Things). This course will discuss critical aspects to understand 5G security.

Jun 03 - Dec 21, 2025

244ETF408
Est. Tuition:
$950.00
Learning Format:
Online
Duration:
30 weeks
Enroll

Estimated Tuition

$950.00

Location

Online

Instructor

  • Eric A. Nielsen, M.H.A., CISSP, C|CISO, CCSP, HCISPP, CAP, CRISC, is the CEO of Defense In-Depth Cybersecurity, and specializes in cybersecurity curriculum content development. Mr. Nielsen has an established track record of accomplishments, demonstrating subject mastery and leading functional security teams in security operations, security engineering and architecture, access and identify management, threat and vulnerability management, and security risk and compliance.

Schedule

Jun 3 - Dec 21

Textbook

No Textbooks Listed.

Additional information

This is a continuous enrollment and self-paced course, so you can work through the modules at your own pace and when convenient for your schedule.

Jan 02 - Jun 12, 2026

253ETF408
Est. Tuition:
$950.00
Learning Format:
Online
Duration:
24 weeks
Enroll

Estimated Tuition

$950.00

Location

Online

Instructor

  • Eric A. Nielsen, M.H.A., CISSP, C|CISO, CCSP, HCISPP, CAP, CRISC, is the CEO of Defense In-Depth Cybersecurity, and specializes in cybersecurity curriculum content development. Mr. Nielsen has an established track record of accomplishments, demonstrating subject mastery and leading functional security teams in security operations, security engineering and architecture, access and identify management, threat and vulnerability management, and security risk and compliance.

Schedule

Jan. 02 - Jun. 12

Textbook

No Textbooks Listed.

Additional information

This is a continuous enrollment and self-paced course, so you can work through the modules at your own pace and when convenient for your schedule.