Huawei Certified ICT Associate-Security
Schedule
Start | End | Duration | Location | Details |
---|
Course Details
Huawei Certified ICT Associate-Security
Duration: 5 Days
Course Description:
Engineers master the basic information security knowledge and related technologies for small- and medium-sized networks, and are capable of building small-sized information security networks for enterprises to ensure the security of networks and applications of small- and medium-sized enterprises
Intended Audience:
Information security operation and maintenance engineer. Network security junior engineer who hopes to have information security capabilities
Course Outline:
1. Network Security Concepts and Specifications
• Network Security Definition
• Future Network Security Trends
• Information Security Standards and Specifications
2. Network Basics
• Network Reference Model
• Common Network Devices
3. Common Network Security Threats and Threat Prevention
• Overview of Enterprise Network Security Threats
• Communication Network Security Requirements and Solutions
• Zone Border Security Threats and Threat Prevention
• Computing Environment Security Threats and Threat Prevention
• Security Requirements and Solutions of the Management Center
4. Firewall Security Policies
• Firewall Basic Principles
• Application Scenarios of Firewalls in Cyber Security Solutions
5. Firewall NAT Technologies
• Overview of NAT
• Source NAT
• Destination NAT
• Bidirectional NAT
• NAT ALG and NAT Server
6. Firewall Hot Standby Technologies
• Hot Standby Fundamentals
• Hot Standby Basic Networking and Configuration
7. Firewall User Management Technologies
• AAA Principles
• Firewall User Authentication and Application
8. Firewall IPS
• Intrusion Overview
• Intrusion Prevention
• Antivirus
9. Fundamentals of Encryption and Decryption Technologies
• Encryption/Decryption Technology Development
• Encryption/Decryption Technology Fundamentals
• Common Encryption/Decryption Algorithms
• Hash Algorithms
10. PKI Certificate System
• Data Communication Security Technologies
• PKI System Structure
• PKI Working Mechanism
11. Encryption Technology Applications
• Application of Cryptography
• VPN Overview
• VPN Configuration