Huawei - Security - Human Growth Kazakhstan

Huawei - Security

Направление

  • HCIA-Security
    • Длительность: 5 дней (40 часов)
    • Код курса: HCIASE
    • Стоимость
    • Очный формат: 995 500 ₸
    • Онлайн формат: 983 000 ₸

    Описание курса

    Objectives:

    On completion of this program, the participants will be able to:
    Describe the definition and characteristics of network security
    Describe the development history and trend of network security
    Understand the data definition and transmission process
    Describe the working principles of the TCP/IP protocol stack
    Describe the working principles of common protocols
    Describe common security threats to enterprise networks
    Describe how to cope with common network security threats
    Describe firewall security zones
    Describe the stateful inspection and session mechanisms of the firewall
    Describe the technical background of NAT
    Know the classification and working principles of NAT
    Know the application scenarios of different types of NAT
    Understand the hot standby fundamentals
    Master the basic hot standby configurations
    Describe user authentication technologies
    Describe the different types of intrusion prevention
    Describe the fundamentals of intrusion prevention
    Deploy network antivirus policies
    Development of encryption and decryption technologies
    Processes of various encryption and decryption methods
    Principles of encryption and decryption algorithms
    Describe data communication security technologies
    Describe the PKI certificate system architecture
    Describe the PKI working mechanism
    Application scenarios of encryption technologies
    Configuration methods for different VPN technologies

    Target Audience:

    Cyber security junior engineer who hopes to have information security capabilities.

    Prerequisites:

    Basic knowledge of TCP/IP
    Basic knowledge of Routing and Switching

    Training Content:

    1. Security information and security overview

    Network Security Concepts and Specifications
    Network Security Definition
    Future Network Security Trends
    Information Security Standards and Specifications
    Network Basics
    Network Reference Model
    Common Network Devices
    Common Network Security Threats and Threat Prevention
    Overview of Enterprise Network Security Threats
    Communication Network Security Requirements and Solutions
    Zone Border Security Threats and Threat Prevention
    Computing Environment Security Threats and Threat Prevention
    Security Requirements and Solutions of the Management Center

    2. Network Security Basis

    Firewall Security Policies
    Firewall Basic Principles
    Application Scenarios of Firewalls in Cyber Security Solutions
    Firewall NAT Technologies
    Overview of NAT
    Source NAT
    Destination NAT
    Bidirectional NAT
    NAT ALG and NAT Server
    Firewall Hot Standby Technologies
    Hot Standby Fundamentals
    Hot Standby Basic Networking and Configuration
    Firewall User Management Technologies
    AAA Principles
    Firewall User Authentication and Application
    Firewall IPS
    Intrusion Overview
    Intrusion Prevention
    Antivirus

    3. Application of Encryption and Decryption

    Fundamentals of Encryption and Decryption Technologies
    Encryption/Decryption Technology Development
    Encryption/Decryption Technology Fundamentals
    Common Encryption/Decryption Algorithms
    Hash Algorithms
    PKI Certificate System
    Data Communication Security Technologies
    PKI System Structure
    PKI Working Mechanism
    Encryption Technology Applications
    Application of Cryptography
    VPN Overview
    VPN Configuration

  • HCIP-Security
    • Длительность: 10 дней (80 часов)
    • Код курса: HCIPS
    • Стоимость
    • Очный формат: 1 585 000 ₸
    • Онлайн формат: 1 514 500 ₸

    Описание курса

    Objectives

    On completion of this program, the participants will be able to:
    Describe the principles of firewall high reliability technologies
    Understand the high reliability networking mode of the firewall
    Describe the application scenarios of firewall high reliability technologies
    Describe the application scenarios of bandwidth management
    Describe the fundamentals of bandwidth management
    Describe the application scenarios of quota control policies
    Describe the fundamentals of quota control policies
    Master the configurations of firewall traffic management
    Describe the application scenarios of virtual systems
    Describe the basic concepts of virtual systems
    Master how to configure virtual systems
    Describe basic concepts of intelligent uplink selection
    Describe the application scenarios of intelligent uplink selection
    Master the configuration procedure of intelligent uplink selection
    Understand the basic principles of IPsec VPN
    Understand the typical application scenarios of IPsec VPN
    Master the highly reliable IPsec VPN configuration method
    Master IPsec VPN troubleshooting method
    Understand application scenarios of SSL VPN
    Master the main functions and principles of SSL VPN
    Understand the SSL VPN networking
    Master the configuration of SSL VPN
    Describe the principles of common single-packet attacks
    Describe the principles of common DDoS attacks
    Describe the principles of defending against single-packet attacks
    Describe the principles of defending against DDoS attacks
    Describe the anti-DDoS solution and related defense principles
    Describe the cyber kill chain
    Describe the harm of vulnerabilities
    Master vulnerability defense measures
    Describe the technical background of the content security filtering technologies
    Describe basic principles of content security filtering technologies
    Master the configuration of content security filtering technologies
    Describe the basic concepts of cyber security emergency response
    Describe the handling process of cyber security emergency response
    Understand technologies related to cyber security emergency response
    Describe the basic concepts of NAC
    Describe the working principles of user identity authentication
    Describe common access authentication modes and their working principles
    Configure user access authentication
    Apply various network security technologies
    Design the network security solution
    Deploy the network security solution
    Be familiar with network security O&M

    Target Audience

    Those who hope to become a network security professional
    Cyber Security engineers

    Prerequisites

    HCIA certification or the similar knowledge

    Training Content

    1 Secure communication network

    Overview of Cyber Security Certification
    Capability Models for Cyber Security Engineers
    Cyber Security Certification
    Firewall High Reliability Technologies
    Overview of Firewall High Reliability Technologies
    Firewall Hot Standby
    Firewall Link High Reliability
    Hot Standby Version Upgrade and Troubleshooting
    Firewall Traffic Management
    Firewall Bandwidth Management
    Firewall Quota Control Policies
    Example for Configuring Traffic Management
    Firewall Virtual System
    Virtual System Overview
    Basic Concepts of Virtual Systems
    Communication Between Virtual Systems
    Virtual System Configuration
    Firewall Intelligent Uplink Selection
    Overview of Intelligent Uplink Selection
    Principles of Intelligent Uplink Selection
    Configuration of Intelligent Uplink Selection
    IPsec VPN Technology and Application
    Basic Principles of IPsec VPN
    Application Scenarios of IPsec VPN
    High Reliability of IPsec VPN
    Troubleshooting of IPsec VPN
    SSL VPN Technology and Application
    Overview of SSL VPN
    Service Functions of SSL VPN
    Examples for Configuring the SSL VPN
    SSL VPN Troubleshooting

    2 Security zone border

    Cyber Attacks and Defense
    Firewall Attack Defense Technologies
    Single-Packet Attack Defense
    DDoS Mitigation
    Anti-DDoS
    Vulnerability Defense and Penetration Testing
    Vulnerability
    Vulnerability Defense
    Penetration Testing
    Content Security Filtering Technologies
    Overview of Content Security Filtering Technologies
    Principles of Content Security Filtering Technologies
    Examples for Configuring Content Security Filtering Technologies

    3 Security management center

    Emergency Response
    Emergency Response Overview
    Emergency Response Process
    Emergency Response Technologies and Cases
    Network Access Control
    Overview of NAC
    User Identity Authentication
    Access Authentication
    NAC Configuration
    Comprehensive Cases of Enterprise Network Security
    Overview of Enterprise Network Security Requirements
    Enterprise Network Security Solution Design and Deployment
    Enterprise Network Security Troubleshooting

Записаться на курс