Huawei Certified ICT Associate-Security

Schedule

Start End Duration Location Details

Course Details

Huawei Certified ICT Associate-Security

Duration: 5 Days

Course Description:

Engineers master the basic information security knowledge and related technologies for small- and medium-sized networks, and are capable of building small-sized information security networks for enterprises to ensure the security of networks and applications of small- and medium-sized enterprises

Intended Audience:

Information security operation and maintenance engineer. Network security junior engineer who hopes to have information security capabilities

Course Outline:

1. Network Security Concepts and Specifications 
•    Network Security Definition
•    Future Network Security Trends
•    Information Security Standards and Specifications

2. Network Basics 
•    Network Reference Model
•    Common Network Devices

3. Common Network Security Threats and Threat Prevention 
•    Overview of Enterprise Network Security Threats
•    Communication Network Security Requirements and Solutions
•    Zone Border Security Threats and Threat Prevention
•    Computing Environment Security Threats and Threat Prevention
•    Security Requirements and Solutions of the Management Center

4. Firewall Security Policies 
•    Firewall Basic Principles
•    Application Scenarios of Firewalls in Cyber Security Solutions

5. Firewall NAT Technologies 
•    Overview of NAT
•    Source NAT
•    Destination NAT
•    Bidirectional NAT
•    NAT ALG and NAT Server

6. Firewall Hot Standby Technologies 
•    Hot Standby Fundamentals
•    Hot Standby Basic Networking and Configuration    

7. Firewall User Management Technologies 
•    AAA Principles
•    Firewall User Authentication and Application

8. Firewall IPS 
•    Intrusion Overview
•    Intrusion Prevention
•    Antivirus

9. Fundamentals of Encryption and Decryption Technologies 
•    Encryption/Decryption Technology Development
•    Encryption/Decryption Technology Fundamentals
•    Common Encryption/Decryption Algorithms
•    Hash Algorithms

10. PKI Certificate System 
•    Data Communication Security Technologies
•    PKI System Structure
•    PKI Working Mechanism

11. Encryption Technology Applications 
•    Application of Cryptography
•    VPN Overview
•    VPN Configuration