Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Securing Private Wireless - From Design to Deployment

Microsoft via YouTube

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore proven security frameworks for private wireless networks in this 36-minute conference talk from Microsoft Ignite 2025. Learn how field-tested strategies and AI-powered defenses have achieved a 63% reduction in security incidents while cutting costs and protecting critical infrastructure from advanced cyber threats. Discover approaches to balancing operational efficiency with network security in distributed architectures, addressing credential theft through stronger authentication methods, and implementing Azure-based AI platforms for telecom security operations. Examine the role of playbooks and use cases in cyber incident management, telecom provider collaboration strategies, and identity management solutions. Understand AI-driven threat hunting techniques using the CIA diamond model with telco-focused intelligence, and gain insights into 5G security orchestration through practical demonstrations. The session covers network security domains, distributed architecture challenges, authentication strengthening, AI platform integration, incident response automation, and advanced threat detection methodologies specifically designed for telecommunications and private wireless environments.

Syllabus

0:00 - Krishnan’s introduction and focus on network security domains
00:08:00 - Balancing operational efficiency and network security in distributed architectures
00:09:16 - Credential theft and need for stronger authentication
00:13:11 - Azure-based AI platform supporting telecom security operations
00:16:02 - Role of playbooks and use cases in cyber incident management
00:17:53 - Discussion on telecom provider collaboration and identity management
00:25:27 - AI-driven threat hunting using the CIA diamond model and telco-focused intelligence
00:26:56 - Introduction to 5G security orchestration and demo preview
00:35:16 - Closing remarks on telco security operations and audience Q&A

Taught by

Microsoft Ignite

Reviews

Start your review of Securing Private Wireless - From Design to Deployment

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.