Huawei Security Certification Training
HCIA-Security Training
Training Path
1 |
Security information and security overview |
|
Lecture,Practice |
2.0 days |
2 |
Security Operation and Analysis |
|
Lecture,Case study |
2.0 days |
3 |
Network Security Basis |
|
Lecture,Practice |
3.0 days |
4 |
Operation System and Host Security |
|
Lecture |
1.0 day |
5 |
Application of Encryption and Decryption |
|
Lecture,Practice |
2.0 days |
Target Audience
Cyber security junior engineer who hopes to have information security capabilities
Prerequisites
- l Basic knowledge of TCP/IP
- l Basic knowledge of Routing and Switching
Objectives
On completion of this program, the participants will be able to:
- Understand the basic concepts of information security
- Understand information security common specifications
- Configure network devicesKnow some common security attacks
- Understand the basic process of security operation and maintenance
- Understanding of safety analysis methods and evidence collection methods
- Understand basic firewall technology and configuration
- Understand NAT technology
- Understand firewall dual-system hot back principles
- Know basic network instructions
- Know the basic component of operating system
- Understanding the common risks and defense methods of operating systems
- Understand encryption principles
- Understand encryption application and practice the related configurations
Training Contents
Security information and security overview:
- Basic Network Concepts
- TCP/IP Architecture
- Common Network Protocols
- Information Security Standards and Specifications
- Information Security Standards and Specifications
- ISO 27001 ISMS
- Graded Protection of Information Security
- Other Standards
- Common Network Devices
- Basic Network Devices
- Initial Device Login
- Threat Defense and Information Security Development Trends
- Security Threat Defense
- Information Security Awareness
- Information Security Development Trends
- Common Information Security Threats
- Current Situation of Information Security Threats
- Threats to Network Security
- Threats to Application Security
- Threats to Data Transmission and Device Security
- Basic Concepts of Information Security
- Information and Information Security
- Information Security Risks and Management
Security Operation and Analysis
- Cyber Security Emergency Response
- Background of Cyber Security Emergency Response
- Overview of Cyber Security Emergency Response
- Process of Cyber Security Emergency Response
- Introduction to Security Operations
- Concept of Security Operations
- Basic Requirements for Security Operations
- Content of Security Operations
- Data Monitoring and Analysis
- Proactive Analysis
- Passive Collection
- Data Analysis
- Digital Forensics
- Cyber crime
- Overview of Digital Forensics
- Digital Forensic Process
- Case Workshop
- Discussion on Information Security Deployment Procedure
- Discussion on Cyber Security Cases
Network Security Basis
- Firewall User Management
- User Authentication and AAA Technical Principles
- User Authentication Management and Application
- Overview of Intrusion Prevention
- Intrusion Overview
- Intrusion Prevention System Overview
- Network Antivirus Overview
- Introduction to Firewalls
- Firewall Overview
- Principle of Firewall Forwarding
- Firewall Security Policies and Application
- ASPF
- Dual-System Hot Standby
- Technical Principles of Dual-System Hot Standby
- Basic Networking and Configuration of Dual-System Hot Standby
- Network Address Translation
- NAT Principle
- Source NAT
- Server Mapping
- Application Scenarios
Operation System and Host Security
- Host Firewalls and Antivirus Software
- Windows Firewalls
- Linux Firewalls
- Antivirus Software
- Operating System Overview
- Operating System 101
- Windows Operating System
- Linux Operating System
- Common Server Types and Threats
- Server Overview
- Common Server Software
- Server Security Threats
- Vulnerabilities and Patches
Application of Encryption and Decryption
- Public Key Infrastructure (PKI) Certificate System
- Digital Certificate
- PKI System Structure
- PKI Implementation
- Application of Cryptographic Technologies
- Application of Cryptography
- VPN Overview
- VPN Configuration
- Encryption and Decryption Mechanisms
- Encryption Technology Development
- Encryption and Decryption Mechanisms
- Common Encryption and Decryption Algorithms
Duration
10 working days