1: Get a refresher on 4G security, security issues and solutions.
2: Learn in-depth regarding 5G security.
3: Find out considerations for end-to-end 5G network deployment.
Attendees should have some background in mobile networks and security, especially 4G will be beneficial. It is assumed that the attendees have good knowledge of information security.