Cybersecurity Track

Cybersecurity Track

 

Huawei Security Certification Training

HCIA-Security Training

Training Path          

1

Security information and security overview

Lecture,Practice

2.0 days

 

2

Security Operation and Analysis

Lecture,Case study

2.0 days

 

3

Network Security Basis

Lecture,Practice

3.0 days

 

4

Operation System and Host Security

Lecture

1.0 day

 

5

Application of Encryption and Decryption

Lecture,Practice

2.0 days

Target Audience

Cyber security junior engineer who hopes to have information security capabilities

Prerequisites

  • l Basic knowledge of TCP/IP
  • l Basic knowledge of Routing and Switching

Objectives

On completion of this program, the participants will be able to:

  • Understand the basic concepts of information security
  • Understand information security common specifications
  • Configure network devicesKnow some common security attacks
  • Understand the basic process of security operation and maintenance
  • Understanding of safety analysis methods and evidence collection methods
  • Understand basic firewall technology and configuration
  • Understand NAT technology
  • Understand firewall dual-system hot back principles
  • Know basic network instructions
  • Know the basic component of operating system
  • Understanding the common risks and defense methods of operating systems
  • Understand encryption principles
  • Understand encryption application and practice the related configurations

Training Contents

Security information and security overview:

  • Basic Network Concepts
  • TCP/IP Architecture
  • Common Network Protocols
  • Information Security Standards and Specifications
  • Information Security Standards and Specifications
  • ISO 27001 ISMS
  • Graded Protection of Information Security
  • Other Standards
  • Common Network Devices
  • Basic Network Devices
  • Initial Device Login
  • Threat Defense and Information Security Development Trends
  • Security Threat Defense
  • Information Security Awareness
  • Information Security Development Trends
  • Common Information Security Threats
  • Current Situation of Information Security Threats
  • Threats to Network Security
  • Threats to Application Security
  • Threats to Data Transmission and Device Security
  • Basic Concepts of Information Security
  • Information and Information Security
  • Information Security Risks and Management

Security Operation and Analysis

  • Cyber Security Emergency Response
  • Background of Cyber Security Emergency Response
  • Overview of Cyber Security Emergency Response
  • Process of Cyber Security Emergency Response
  • Introduction to Security Operations
  • Concept of Security Operations
  • Basic Requirements for Security Operations
  • Content of Security Operations
  • Data Monitoring and Analysis
  • Proactive Analysis
  • Passive Collection
  • Data Analysis
  • Digital Forensics
  • Cyber crime
  • Overview of Digital Forensics
  • Digital Forensic Process
  • Case Workshop
  • Discussion on Information Security Deployment Procedure
  • Discussion on Cyber Security Cases

Network Security Basis

  • Firewall User Management
  • User Authentication and AAA Technical Principles
  • User Authentication Management and Application
  • Overview of Intrusion Prevention
  • Intrusion Overview
  • Intrusion Prevention System Overview
  • Network Antivirus Overview
  • Introduction to Firewalls
  • Firewall Overview
  • Principle of Firewall Forwarding
  • Firewall Security Policies and Application
  • ASPF
  • Dual-System Hot Standby
  • Technical Principles of Dual-System Hot Standby
  • Basic Networking and Configuration of Dual-System Hot Standby
  • Network Address Translation
  • NAT Principle
  • Source NAT
  • Server Mapping
  • Application Scenarios

Operation System and Host Security

  • Host Firewalls and Antivirus Software
  • Windows Firewalls
  • Linux Firewalls
  • Antivirus Software
  • Operating System Overview
  • Operating System 101
  • Windows Operating System
  • Linux Operating System
  • Common Server Types and Threats
  • Server Overview
  • Common Server Software
  • Server Security Threats
  • Vulnerabilities and Patches

Application of Encryption and Decryption

  • Public Key Infrastructure (PKI) Certificate System
  • Digital Certificate
  • PKI System Structure
  • PKI Implementation
  • Application of Cryptographic Technologies
  • Application of Cryptography
  • VPN Overview
  • VPN Configuration
  • Encryption and Decryption Mechanisms
  • Encryption Technology Development
  • Encryption and Decryption Mechanisms
  • Common Encryption and Decryption Algorithms

Duration

        10 working days

logo

MoHESR AWS Academic Hub is all about supporting universities, academic staff and MOHESR in its mission to establish an undergraduate Cloud and Emerging Technologies Associate Degree that will be offered across Eligible
Higher Education Institutes.