5G Security · Pro
Lab: Identify security vulnerabilities in a 5G deployment
Threat Assessment Exercise
In this lab you analyze a realistic 5G network deployment diagram and identify security vulnerabilities before the network goes live. The diagram presents gNBs, core NFs, transport links, external connections, slice configurations, and roaming interfaces. Your task is to examine each component and its security configuration, looking for misconfigurations, missing protections, and potential attack surfaces. This exercise mirrors the type of security audit that operators and vendors perform during pre-launch validation of production 5G networks.