HCNA-Security-CBSN Certification Training

Huawei HCNA-Security-CBSN Certification Training Course Huawei HCNA-Security-CBSN Certification
By TED Integrated
Huawei Certification:

Huawei HCNA-Security-CBSN Constructing Basic Security Network

“A perfect and globally recognized IT certification for SMEs”

By TED Integrated

PSMB Certified Training Provider
Request for In-house TrainingRequest for In-house Training
Register for Public Training Public program not yet available
Register for Public TrainingRegister for Public Training
Email Customer Service training@ted.com.my Contact Customer Service +603-2386-7788
Course Title:
Huawei HCNA-Security-CBSN Constructing Basic Security Network
Training Category:
Information Technology
Target Audience:
Network Operators, Maintainers, and Administrators. Those who would like to take HCNA-Security-CBSN exam or simply like to learn the basics of network security are encouraged to attend.
5 Days
For In-house Training
Request for Quotation Request for Quotation
For Other Inquiries
Contact TED Integrated
Contact customer service +603-2386-7788
Email customer service training@ted.com.my
Delivery Methods
  • Language: English
  • PowerPoint Presentation
  • Workshop
  • Reading Materials
  • Computer Lab Work
  • Lecture
  • Certificate of Participation
Ad by Google
*Terms & Conditions

Course Introduction ›

Huawei is a fast growing IT certification body that offers globally recognized IT certification series to small & medium size organizations and HCNA-Security-CBSN Constructing Basic Security Network is one of it. This HCNA-Security certification training includes the topics necessary for you to prepare for the HCNA-Security-CBSN exam. Network Operators and Administrators who would like to take this exam or would like to learn the basics of network security are encouraged to attend.

To request for in-house training, click on the Request for In-house Training link as displayed above for quotation. For a complete course cotent and more information about this course, feel free to contact the training provider as shown above. If the public program is available, you can request for a registration online by clicking on the Register for Public Training link. If the link is disabled, it simply means it has yet to be available for public. You can contact the training provider for further inquiry.

Course Objectives ›

Upon completion of this program, participants should be able to:

  • Understand OSI model
  • Understand TCP/IP principles
  • Understand TCP/IP security issues
  • Understand Common attack means
  • Understand the definition and classification of firewalls
  • Understand firewall Main features and technologies
  • Understand the Data forwarding process and basic configuration of firewalls
  • Understand the functions and classification of ACLs
  • Understand firewall Security Policy and configuration
  • Understand the principles of the NAT technology
  • Understand the application of NAT
  • Understand the NAT configuration of firewalls
  • Understand firewall Dual-System Hot Backup basic technology
  • Understand firewall User Management
  • Understand firewall VLAN//SA/E1/ADSL/WLAN/3G technology
  • Understand the concept and functions of VPN
  • Understand key VPN technologies
  • Understand the classification and application of VPN
  • Understand the application scenarios of VPDN
  • Understand the principles of L2TP
  • Understand the application scenarios of client-initialized and NAS-initialized L2TP VPN
  • Understand the configuration of L2TP
  • Understand the principles and implementation of GRE VPN
  • Understand the security mechanism of GRE VPN
  • Understand the typical application and configuration of GRE VPN
  • Understand the principles of the IPSec technology
  • Understand the AH and ESP technologies
  • Understand the service process of IKE
  • Understand the application scenarios and configuration of IPSec VPN
  • Understand the principles of the SSL VPN technology
  • Understand the Basic functions and features of the SVN product
  • Understand the configuration of SSL VPN
  • Understand firewall UTM basic technology
  • Understand what terminal security is
  • Understand the components and deployment of the Policy Center system
  • Understand the organizational management and access control functions of the terminal security system
  • Understand the security policy configuration of the terminal security system

Prerequisites ›

  • Familiar with TCP/IP elementary knowledge
  • Familiar with Router & Switch elementary knowledge

Course Outline ›


Network Security Overview

  • OSI Model Introduction
  • TCP/IP Introduction
  • TCP/IP Security Issues
  • Common Network Attacks

Basic Firewall Technology

  • Firewall Overview
  • Firewall function and features
  • Firewall device management
  • Basic Firewall Configuration

Firewall Security Policy

  • Packet Filtering Technology
  • Firewall packet forward principles
  • Application of Firewall Security Policy

Network Address Translation Technology

  • Introduction to Network Address Translation Technology
  • NAT Technology Based on the Source IP Address
  • NAT Technology Based on the Destination IP Address
  • Bidirectional NAT Technology
  • NAT Application Scenario and Configuration

Firewall Dual-System Hot Backup basic Technology

  • Dual-System Hot Backup Principles
  • Dual-System Hot Backup Basic Networking and Configuration Commands

Firewall User Management

  • User Authentication overview
  • AAA Technology Principles
  • User Management Application

Firewall Networking

  • VLAN Feature Technology
  • SA and E1 Feature Technology
  • ADSL Feature Technology
  • WLAN Feature Technology
  • 3G Feature Technology

VPN Overview

  • VPN Introduction
  • VPN technologies
  • VPN classification


  • VPDN Overview
  • L2TP VPN Technology
  • Client-Initialized L2TP
  • NAS-Initialized L2TP


  • GRE VPN Overview
  • GRE VPN Technology
  • Analyzing the Application Scenarios of GRE VPN


  • IPSec VPN Overview
  • IPSec VPN Architecture
  • AH Technology
  • ESP Technology
  • IKE Technology
  • IPSec VPN Application Scenarios


  • SSL VPN Overview
  • SSL VPN Technology
  • SSL VPN Security Policy
  • SSL VPN Application Scenario

Firewall UTM basic Technology

  • Background of UTM
  • Firewall UTM basis Technology
  • Firewall UTM Technology Application

Terminal Security

  • Overview of Terminal Security
  • Deployment of the Policy Center System
  • Deployment of Terminal Security Policies

Contact us now ›

  • Course content customization
  • In-house training request
  • Available public program
  • Consultation services
  • Other inquiries
Contact Customer ServiceCall : +603-2386-7788
Email Customer Service E-mail : training@ted.com.my

Related Courses ›

Published by: ,
online learning icon Request for Online Training
Contact Us
Animated Progress Icon

Contact Assistant