Huawei - Security
Направление
- HCIA-Security
- Длительность: 5 дней (40 часов)
- Код курса: HCIASE
- Стоимость
- Очный формат: 995 500 ₸
- Онлайн формат: 983 000 ₸
Описание курса
Objectives:
On completion of this program, the participants will be able to:
Describe the definition and characteristics of network security
Describe the development history and trend of network security
Understand the data definition and transmission process
Describe the working principles of the TCP/IP protocol stack
Describe the working principles of common protocols
Describe common security threats to enterprise networks
Describe how to cope with common network security threats
Describe firewall security zones
Describe the stateful inspection and session mechanisms of the firewall
Describe the technical background of NAT
Know the classification and working principles of NAT
Know the application scenarios of different types of NAT
Understand the hot standby fundamentals
Master the basic hot standby configurations
Describe user authentication technologies
Describe the different types of intrusion prevention
Describe the fundamentals of intrusion prevention
Deploy network antivirus policies
Development of encryption and decryption technologies
Processes of various encryption and decryption methods
Principles of encryption and decryption algorithms
Describe data communication security technologies
Describe the PKI certificate system architecture
Describe the PKI working mechanism
Application scenarios of encryption technologies
Configuration methods for different VPN technologiesTarget Audience:
Cyber security junior engineer who hopes to have information security capabilities.
Prerequisites:
Basic knowledge of TCP/IP
Basic knowledge of Routing and SwitchingTraining Content:
1. Security information and security overview
Network Security Concepts and Specifications
Network Security Definition
Future Network Security Trends
Information Security Standards and Specifications
Network Basics
Network Reference Model
Common Network Devices
Common Network Security Threats and Threat Prevention
Overview of Enterprise Network Security Threats
Communication Network Security Requirements and Solutions
Zone Border Security Threats and Threat Prevention
Computing Environment Security Threats and Threat Prevention
Security Requirements and Solutions of the Management Center2. Network Security Basis
Firewall Security Policies
Firewall Basic Principles
Application Scenarios of Firewalls in Cyber Security Solutions
Firewall NAT Technologies
Overview of NAT
Source NAT
Destination NAT
Bidirectional NAT
NAT ALG and NAT Server
Firewall Hot Standby Technologies
Hot Standby Fundamentals
Hot Standby Basic Networking and Configuration
Firewall User Management Technologies
AAA Principles
Firewall User Authentication and Application
Firewall IPS
Intrusion Overview
Intrusion Prevention
Antivirus3. Application of Encryption and Decryption
Fundamentals of Encryption and Decryption Technologies
Encryption/Decryption Technology Development
Encryption/Decryption Technology Fundamentals
Common Encryption/Decryption Algorithms
Hash Algorithms
PKI Certificate System
Data Communication Security Technologies
PKI System Structure
PKI Working Mechanism
Encryption Technology Applications
Application of Cryptography
VPN Overview
VPN Configuration - HCIP-Security
- Длительность: 10 дней (80 часов)
- Код курса: HCIPS
- Стоимость
- Очный формат: 1 585 000 ₸
- Онлайн формат: 1 514 500 ₸
Описание курса
Objectives
On completion of this program, the participants will be able to:
Describe the principles of firewall high reliability technologies
Understand the high reliability networking mode of the firewall
Describe the application scenarios of firewall high reliability technologies
Describe the application scenarios of bandwidth management
Describe the fundamentals of bandwidth management
Describe the application scenarios of quota control policies
Describe the fundamentals of quota control policies
Master the configurations of firewall traffic management
Describe the application scenarios of virtual systems
Describe the basic concepts of virtual systems
Master how to configure virtual systems
Describe basic concepts of intelligent uplink selection
Describe the application scenarios of intelligent uplink selection
Master the configuration procedure of intelligent uplink selection
Understand the basic principles of IPsec VPN
Understand the typical application scenarios of IPsec VPN
Master the highly reliable IPsec VPN configuration method
Master IPsec VPN troubleshooting method
Understand application scenarios of SSL VPN
Master the main functions and principles of SSL VPN
Understand the SSL VPN networking
Master the configuration of SSL VPN
Describe the principles of common single-packet attacks
Describe the principles of common DDoS attacks
Describe the principles of defending against single-packet attacks
Describe the principles of defending against DDoS attacks
Describe the anti-DDoS solution and related defense principles
Describe the cyber kill chain
Describe the harm of vulnerabilities
Master vulnerability defense measures
Describe the technical background of the content security filtering technologies
Describe basic principles of content security filtering technologies
Master the configuration of content security filtering technologies
Describe the basic concepts of cyber security emergency response
Describe the handling process of cyber security emergency response
Understand technologies related to cyber security emergency response
Describe the basic concepts of NAC
Describe the working principles of user identity authentication
Describe common access authentication modes and their working principles
Configure user access authentication
Apply various network security technologies
Design the network security solution
Deploy the network security solution
Be familiar with network security O&MTarget Audience
Those who hope to become a network security professional
Cyber Security engineersPrerequisites
HCIA certification or the similar knowledge
Training Content
1 Secure communication network
Overview of Cyber Security Certification
Capability Models for Cyber Security Engineers
Cyber Security Certification
Firewall High Reliability Technologies
Overview of Firewall High Reliability Technologies
Firewall Hot Standby
Firewall Link High Reliability
Hot Standby Version Upgrade and Troubleshooting
Firewall Traffic Management
Firewall Bandwidth Management
Firewall Quota Control Policies
Example for Configuring Traffic Management
Firewall Virtual System
Virtual System Overview
Basic Concepts of Virtual Systems
Communication Between Virtual Systems
Virtual System Configuration
Firewall Intelligent Uplink Selection
Overview of Intelligent Uplink Selection
Principles of Intelligent Uplink Selection
Configuration of Intelligent Uplink Selection
IPsec VPN Technology and Application
Basic Principles of IPsec VPN
Application Scenarios of IPsec VPN
High Reliability of IPsec VPN
Troubleshooting of IPsec VPN
SSL VPN Technology and Application
Overview of SSL VPN
Service Functions of SSL VPN
Examples for Configuring the SSL VPN
SSL VPN Troubleshooting2 Security zone border
Cyber Attacks and Defense
Firewall Attack Defense Technologies
Single-Packet Attack Defense
DDoS Mitigation
Anti-DDoS
Vulnerability Defense and Penetration Testing
Vulnerability
Vulnerability Defense
Penetration Testing
Content Security Filtering Technologies
Overview of Content Security Filtering Technologies
Principles of Content Security Filtering Technologies
Examples for Configuring Content Security Filtering Technologies3 Security management center
Emergency Response
Emergency Response Overview
Emergency Response Process
Emergency Response Technologies and Cases
Network Access Control
Overview of NAC
User Identity Authentication
Access Authentication
NAC Configuration
Comprehensive Cases of Enterprise Network Security
Overview of Enterprise Network Security Requirements
Enterprise Network Security Solution Design and Deployment
Enterprise Network Security Troubleshooting
Записаться на курс
Контакты
LinkedIn
Email
Web