HCNA-Security-CBSN Certification Training

Huawei HCNA-Security-CBSN Certification Training Course Huawei HCNA-Security-CBSN Certification
By TED Integrated
Course Title:
Huawei HCNA-Security-CBSN Constructing Basic Security Network
Training Category:
Information Technology
Target Audience:
Network Operators, Maintainers, and Administrators. Those who would like to take HCNA-Security-CBSN exam or simply like to learn the basics of network security are encouraged to attend.
Duration:
5 Days

Course Introduction ›

Huawei is a fast growing IT certification body that offers globally recognized IT certification series to small & medium size organizations and HCNA-Security-CBSN Constructing Basic Security Network is one of it. This HCNA-Security certification training includes the topics necessary for you to prepare for the HCNA-Security-CBSN exam. Network Operators and Administrators who would like to take this exam or would like to learn the basics of network security are encouraged to attend.

To request for in-house training, click on the Request for In-house Training link as displayed above for quotation. For a complete course cotent and more information about this course, feel free to contact the training provider as shown above. If the public program is available, you can request for a registration online by clicking on the Register for Public Training link. If the link is disabled, it simply means it has yet to be available for public. You can contact the training provider for further inquiry.

Course Objectives ›

Upon completion of this program, participants should be able to:

  • Understand OSI model
  • Understand TCP/IP principles
  • Understand TCP/IP security issues
  • Understand Common attack means
  • Understand the definition and classification of firewalls
  • Understand firewall Main features and technologies
  • Understand the Data forwarding process and basic configuration of firewalls
  • Understand the functions and classification of ACLs
  • Understand firewall Security Policy and configuration
  • Understand the principles of the NAT technology
  • Understand the application of NAT
  • Understand the NAT configuration of firewalls
  • Understand firewall Dual-System Hot Backup basic technology
  • Understand firewall User Management
  • Understand firewall VLAN//SA/E1/ADSL/WLAN/3G technology
  • Understand the concept and functions of VPN
  • Understand key VPN technologies
  • Understand the classification and application of VPN
  • Understand the application scenarios of VPDN
  • Understand the principles of L2TP
  • Understand the application scenarios of client-initialized and NAS-initialized L2TP VPN
  • Understand the configuration of L2TP
  • Understand the principles and implementation of GRE VPN
  • Understand the security mechanism of GRE VPN
  • Understand the typical application and configuration of GRE VPN
  • Understand the principles of the IPSec technology
  • Understand the AH and ESP technologies
  • Understand the service process of IKE
  • Understand the application scenarios and configuration of IPSec VPN
  • Understand the principles of the SSL VPN technology
  • Understand the Basic functions and features of the SVN product
  • Understand the configuration of SSL VPN
  • Understand firewall UTM basic technology
  • Understand what terminal security is
  • Understand the components and deployment of the Policy Center system
  • Understand the organizational management and access control functions of the terminal security system
  • Understand the security policy configuration of the terminal security system

Prerequisites ›

  • Familiar with TCP/IP elementary knowledge
  • Familiar with Router & Switch elementary knowledge

Course Outline ›

DAY 1

Network Security Overview

  • OSI Model Introduction
  • TCP/IP Introduction
  • TCP/IP Security Issues
  • Common Network Attacks

Basic Firewall Technology

  • Firewall Overview
  • Firewall function and features
  • Firewall device management
  • Basic Firewall Configuration

Firewall Security Policy

  • Packet Filtering Technology
  • Firewall packet forward principles
  • Application of Firewall Security Policy
DAY 2

Network Address Translation Technology

  • Introduction to Network Address Translation Technology
  • NAT Technology Based on the Source IP Address
  • NAT Technology Based on the Destination IP Address
  • Bidirectional NAT Technology
  • NAT Application Scenario and Configuration

Firewall Dual-System Hot Backup basic Technology

  • Dual-System Hot Backup Principles
  • Dual-System Hot Backup Basic Networking and Configuration Commands

Firewall User Management

  • User Authentication overview
  • AAA Technology Principles
  • User Management Application
DAY 3

Firewall Networking

  • VLAN Feature Technology
  • SA and E1 Feature Technology
  • ADSL Feature Technology
  • WLAN Feature Technology
  • 3G Feature Technology

VPN Overview

  • VPN Introduction
  • VPN technologies
  • VPN classification

L2TP VPN

  • VPDN Overview
  • L2TP VPN Technology
  • Client-Initialized L2TP
  • NAS-Initialized L2TP
DAY 4

GRE VPN

  • GRE VPN Overview
  • GRE VPN Technology
  • Analyzing the Application Scenarios of GRE VPN

IPSec VPN

  • IPSec VPN Overview
  • IPSec VPN Architecture
  • AH Technology
  • ESP Technology
  • IKE Technology
  • IPSec VPN Application Scenarios

SSL VPN

  • SSL VPN Overview
  • SSL VPN Technology
  • SSL VPN Security Policy
  • SSL VPN Application Scenario
DAY 5

Firewall UTM basic Technology

  • Background of UTM
  • Firewall UTM basis Technology
  • Firewall UTM Technology Application

Terminal Security

  • Overview of Terminal Security
  • Deployment of the Policy Center System
  • Deployment of Terminal Security Policies

Contact us now ›

Related Courses ›

Published by: ,