HCIAS-HCIA-Security

HCIA-Security

HCIA-Security

Objectives:

On completion of this program, the participants will be able to:
Describe the definition and characteristics of network security
Describe the development history and trend of network security
Understand the data definition and transmission process
Describe the working principles of the TCP/IP protocol stack
Describe the working principles of common protocols
Describe common security threats to enterprise networks
Describe how to cope with common network security threats
Describe firewall security zones
Describe the stateful inspection and session mechanisms of the firewall
Describe the technical background of NAT
Know the classification and working principles of NAT
Know the application scenarios of different types of NAT
Understand the hot standby fundamentals
Master the basic hot standby configurations
Describe user authentication technologies
Describe the different types of intrusion prevention
Describe the fundamentals of intrusion prevention
Deploy network antivirus policies
Development of encryption and decryption technologies
Processes of various encryption and decryption methods
Principles of encryption and decryption algorithms
Describe data communication security technologies
Describe the PKI certificate system architecture
Describe the PKI working mechanism
Application scenarios of encryption technologies
Configuration methods for different VPN technologies

Target Audience:

Cyber security junior engineer who hopes to have information security capabilities.

Prerequisites:

Basic knowledge of TCP/IP
Basic knowledge of Routing and Switching

Training Content:

1. Security information and security overview
Network Security Concepts and Specifications
Network Security Definition
Future Network Security Trends
Information Security Standards and Specifications
Network Basics
Network Reference Model
Common Network Devices
Common Network Security Threats and Threat Prevention
Overview of Enterprise Network Security Threats
Communication Network Security Requirements and Solutions
Zone Border Security Threats and Threat Prevention
Computing Environment Security Threats and Threat Prevention
Security Requirements and Solutions of the Management Center

2. Network Security Basis
Firewall Security Policies
Firewall Basic Principles
Application Scenarios of Firewalls in Cyber Security Solutions
Firewall NAT Technologies
Overview of NAT
Source NAT
Destination NAT
Bidirectional NAT
NAT ALG and NAT Server
Firewall Hot Standby Technologies
Hot Standby Fundamentals
Hot Standby Basic Networking and Configuration
Firewall User Management Technologies
AAA Principles
Firewall User Authentication and Application
Firewall IPS
Intrusion Overview
Intrusion Prevention
Antivirus

3. Application of Encryption and Decryption
Fundamentals of Encryption and Decryption Technologies
Encryption/Decryption Technology Development
Encryption/Decryption Technology Fundamentals
Common Encryption/Decryption Algorithms
Hash Algorithms
PKI Certificate System
Data Communication Security Technologies
PKI System Structure
PKI Working Mechanism
Encryption Technology Applications
Application of Cryptography
VPN Overview
VPN Configuration

Записаться на курс

Длительность: 5 дней (40 часов)
Код курса: HCIAS

Стоимость обучения.
Очный формат: 991 000 ₸
Онлайн формат: 942 000 ₸






    Контактная информация: