0% found this document useful (0 votes)
76 views5 pages

Security Course Details

The Huawei HCIA - Security v3.0 program aims to provide junior cybersecurity engineers with information security capabilities. Over the course of 60 hours of lectures, demonstrations, practices and case studies, participants will learn about basic security concepts, network device configuration, common attacks, operating system security, firewalls, encryption, and security operations and analysis. The training is targeted at those with basic TCP/IP and routing/switching knowledge and covers topics like firewalls, NAT, VPNs, encryption, intrusion prevention, and incident response.

Uploaded by

Nourhan Tarek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views5 pages

Security Course Details

The Huawei HCIA - Security v3.0 program aims to provide junior cybersecurity engineers with information security capabilities. Over the course of 60 hours of lectures, demonstrations, practices and case studies, participants will learn about basic security concepts, network device configuration, common attacks, operating system security, firewalls, encryption, and security operations and analysis. The training is targeted at those with basic TCP/IP and routing/switching knowledge and covers topics like firewalls, NAT, VPNs, encryption, intrusion prevention, and incident response.

Uploaded by

Nourhan Tarek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Huawei – HCIA – Security v3.

0
Objectives
On completion of this program, the participants will be able to:

 Understand the basic concepts of information security


 Understand information security common specifications
 Configure network devices
 Know some common security attacks
 Know the basic component of operating system
 Understanding the common risks and defense methods of operating systems
 Understand basic firewall technology and configuration
 Understand NAT technology
 Understand firewall dual-system hot back principles
 Know basic network instructions
 Understand encryption principles
 Understand encryption application and practice the related configurations
 Understand the basic process of security operation and maintenance
 Understanding of safety analysis methods and evidence collection methods

Target segment/level
Cyber security junior engineer who hopes to have information security capabilities.

Prerequisites
 Basic knowledge of TCP/IP.
 Basic knowledge of Routing and Switching.
Training Schedule
Security information and security overview
1
Lecture, Practice 2.0 days

Operation System and Host Security


2
Lecture, Demonstration 1.0 day

Network Security Basis


3
Lecture, Practice 3.0 days

Application of Encryption and Decryption


4
Lecture, Practice 2.0 days

Security Operation and Analysis


5
Lecture, Case study 2.0 days

Training Contents
Security information and security overview:
 Basic Concepts of Information Security
 Information and Information Security
 Information Security Risks and Management
 Information Security Standards and Specifications
 Information Security Standards and Specifications
 ISO 27001 ISMS
 Graded Protection of Information Security
 Other Standards
 Basic Network Concepts
 TCP/IP Architecture
 Common Network Protocols
 Common Network Devices
 Basic Network Devices
 Initial Device Login
 Common Information Security Threats
 Current Situation of Information Security Threats
 Threats to Network Security
 Threats to Application Security
 Threats to Data Transmission and Device Security
 Threat Defense and Information Security Development Trends
 Security Threat Defense
 Information Security Awareness
 Information Security Development Trends
Operation System and Host Security
 Operating System Overview
 Operating System 101
 Windows Operating System
 Linux Operating System
 Common Server Types and Threats
 Server Overview
 Common Server Software
 Server Security Threats
 Vulnerabilities and Patches
 Host Firewalls and Antivirus Software
 Windows Firewalls
 Linux Firewalls
 Antivirus Software
Network Security Basis
 Introduction to Firewalls
 Firewall Overview
 Principle of Firewall Forwarding
 Firewall Security Policies and Application
 ASPF
 Network Address Translation
 NAT Principle
 Source NAT
 Server Mapping
 Application Scenarios
 Dual-System Hot Standby
 Technical Principles of Dual-System Hot Standby
 Basic Networking and Configuration of Dual-System Hot Standby
 Firewall User Management
 User Authentication and AAA Technical Principles
 User Authentication Management and Application
 Overview of Intrusion Prevention
 Intrusion Overview
 Intrusion Prevention System Overview
 Network Antivirus Overview
Application of Encryption and Decryption
 Encryption and Decryption Mechanisms
 Encryption Technology Development
 Encryption and Decryption Mechanisms
 Common Encryption and Decryption Algorithms
 Public Key Infrastructure (PKI) Certificate System
 Digital Certificate
 PKI System Structure
 PKI Implementation
 Application of Cryptographic Technologies
 Application of Cryptography
 VPN Overview
 VPN Configuration
Security Operation and Analysis
 Introduction to Security Operations
 Concept of Security Operations
 Basic Requirements for Security Operations
 Content of Security Operations
 Data Monitoring and Analysis
 Proactive Analysis
 Passive Collection
 Data Analysis
 Digital Forensics
 Cyber crime
 Overview of Digital Forensics
 Digital Forensic Process
 Cyber Security Emergency Response
 Background of Cyber Security Emergency Response
 Overview of Cyber Security Emergency Response
 Process of Cyber Security Emergency Response
 Case Workshop
 Discussion on Information Security Deployment Procedure
 Discussion on Cyber Security Cases
Duration
60 hours

You might also like