Published on: Sep 4, 2023
In brief…
Everything you need to know about UICC Cards, Technologies, Security for LTE-related Services
COURSE DESCRIPTION
UICC cards play a larger role today, than simply securing access to advanced mobile networks. They are also used as standard, secure & portable platforms for personal data & value added services (VAS); remotely updateable in a standard & secure way “Over-The-Air” (OTA).
This course will allow you to Understand the main standards, technos, features & security of UICC products for LTE networks. Questions on UICC deployment choices, configuration & optimisation for network services will be presented, as well as a dive into ISIM for IMS secure connectivity, and advanced OTA remote management over HTTPS. It will also allow you to analyse & manage UICC LTE card content using state-of-the-art tools.
AT THE END OF THE TRAINING YOU WILL
- Understand UICC card functionality for LTE,to ease analysis & management of cardsusing admin. tools
- Be able to list the main security mechanisms, and what subscriber-related information is stored in such cards
- Understand the concepts & mechanisms around VAS toolkit technology & new service opportunities with latest standards
- Understand the process & security around OTA over HTTPS, for remote management of UICC cards on LTE networks
- Be able to describe real field feedback on what USIM – ISIM cards & services are currently deployed on LTE & IMS networks
WHO SHOULD ATTEND ?
- MNO SIM & Device Management Teams
- VAS Innovation & Project ManagementStaff
- Network Infrastructure & HandsetManufacturer Testing Teams
- Roaming Staff
- Security Teams…
PRE-REQUISITES
Good knowledge on SIM & USIM cards (See“Mastering SIM & USIM Cards” course) would be useful, but not mandatory.
Please confirm that participants can read and understand spoken technical English. Other spoken languages (French…) may be available. Contact us.
TEACHING METHODS
Courses include theoretical session presentations made by the trainer, and generally include demos/hands-on exercises so students can reinforce the theory with practice.
KNOWLEDGE ACQUISITION METHODS
Quizzes are also used to ensure each student can check his/her acquisition of key concepts, and to allow the trainer to go back over points that may need reinforcing.
Certificates of training completion are systematically delivered to students who complete our training courses.
ACCESSIBILITY FOR DISABLED PERSONS
If you have specific requirements for participants at your site, please contact us.
DEADLINE AND REQUIREMENTS FOR REGISTERING ATTENDEES
The names and contact details (email…) of the identified participants are required at the latest 2 weeks before the start date of the session.
LANGUAGE & KNOWLEDGE SERVICES
- This training course is usually held in English. Please confirm that participants can read and understand spoken technical English. Presentation in another language may be possible on request (documents in English).
- We can deliver in one of the following forms :
- Public sessions : Usually recommended for companies with a small number of people requiring training, public sessions are involving attendees (from 4 up to 12) from different companies in the same training session, creating very rich sharing and networking situations. This is also a perfect way to get away from the day-to-day bustle of the office, in a quiet and discreet learning environment, with fully equipped rooms including AV, flip charts, IT infrastructure for practical exercises…
- Dedicated sessions Usually recommended for companies with multiple people requiring training. The training will be organized in your premises, or in a place of your choice, scheduled at your convenience, helping you to save money on travel expenses and reduce time out of the office. Courses can be customized (content / duration / place) to your real specific needs in order to ensure programs are even more job related and that new skills are immediately usable.
- Expertise assistance Sometimes, training is a good start… But work on complex projects may require more : accessing an expert to raise questions or concerns, get particular advices to solve a difficult situation, gather benchmarks for a case to avoid common traps and take the right decision… This is exactly where experts NODE can help you along the way, and package assistance bricks (remote or on-site, on the spot, project based, or regular) to help you apply knowledge on your specific cases.
- Consulting : Sometimes the need is even more specific and this is where errors can cost time, money, image loss… From early strategic stage where you need state of the art return of experience, data and facts coming from existing projects to take the right decisions up to deployment phase where the keywords become customer experience, adoption, usage boosting, our experts an ad-hoc teams can help you to avoid common traps and benefit from the most advanced best practices.
Course Features
- Lectures 29
- Quizzes 2
- Duration 2 days
- Skill level All levels
- Language English / French
- Students 273
- Assessments Yes
Curriculum
- 6 Sections
- 29 Lessons
- 2 Days
- INTRODUCTION3
- UICC for LTE7
- 3.1Introduction to UICC architecture (reminder)
- 3.2Standards, existing & new ones
- 3.3New features in the standard & what this can bring (File systems & new files, New keys & Handset interaction, Authentication for EPS, Additional Applications what for, howimplemented, New Toolkit features, and possible services)
- 3.4Migration path to LTE “SIM” (SIM alliance recommendations)
- 3.5Inter-standard Roaming, balancing (3GGP /3GPP2), new roaming files
- 3.6Femtocells (Home (e)Node B) overview, features& UICC file(s)
- 3.7Quiz end of Day 110 Minutes0 Questions
- Understanding ISIM for Identification & Authentication on IMS5
- OTA for LTE (Remote Management over https) Overview5
- Practicals10
- 6.1UICC Files browsing
- 6.2Activation of LTE file services in UST
- 6.3Roaming file wAcT settings
- 6.4Access Conditions for User/Operator Femtocell files
- 6.5Demo: Analyse boot phase with channel management& UST service activation
- 6.6ISIM Files browsing
- 6.7Activation of ISIM additional services in IST
- 6.8Connection parameter settings
- 6.9Demo: Analyse boot phase with channel management
- 6.10Demo of OTA sending APDU scripts over HTTPS
- Wrap-Up & Conclusion1