Overview

HCIA Security Course provides engineers with the basic ability to configure and maintain small and medium-sized enterprise information security solutions, and have the ability to achieve basic network security for SMBs and meet the basic needs of a variety of security applications.

General Course Objective

Individuals will learn these concepts; Information security concept, information security standards and specifications, common attack methods, basic operating system security, firewall security policy, firewall NAT technology, firewall hot standby technology, intrusion prevention technology, cryptography foundation, PKI mechanism, IPSec/SSL VPN technology, data monitoring and analysis, electronic forensics technology and emergency response technology.

Specific Course Objectives

On completion of this program, the participants will be able to:

(1) Understand the basic concepts of information security.
(2) Understand information security common specifications.
(3) Configure network devices Know some common security attacks.
(4) Understand the basic process of security operation and maintenance.
(5) Understanding of safety analysis methods and evidence collection methods.
(6) Understand basic firewall technology and configuration.

 

Course Breakdown

1. Security information and security overview

1.1 Basic Network Concepts
1.1.1 TCP/IP Architecture
1.1.2 Common Network Protocols
1.2 Information Security Standards and Specifications
1.2.1 Information Security Standards and Specifications
1.2.2 ISO 27001 ISMS
1.2.3 Graded Protection of Information Security
1.2.4 Other Standards
1.3 Common Network Devices
1.3.1 Basic Network Devices
1.3.2 Initial Device Login
1.4 Threat Defense and Information Security Development Trends
1.4.1 Security Threat Defense
1.4.2 Information Security Awareness
1.4.3 Information Security Development Trends
1.5 Common Information Security Threats
1.5.1 Current Situation of Information Security Threats
1.5.2 Threats to Network Security
1.5.3 Threats to Application Security
1.5.4 Threats to Data Transmission and Device Security
1.6 Basic Concepts of Information Security
1.6.1 Information and Information Security
1.6.2 Information Security Risks and Management

2. Security Operation and Analysis

2.1 Cyber Security Emergency Response
2.1.1 Background of Cyber Security Emergency Response
2.1.2 Overview of Cyber Security Emergency Response
2.1.3 Process of Cyber Security Emergency Response
2.2 Introduction to Security Operations
2.2.1 Concept of Security Operations
2.2.2 Basic Requirements for Security Operations
2.2.3 Content of Security Operations
2.3 Data Monitoring and Analysis
2.3.1 Proactive Analysis
2.3.2 Passive Collection
2.3.3 Data Analysis
2.4 Digital Forensics
2.4.1 Cyber crime
2.4.2 Overview of Digital Forensics
2.4.3 Digital Forensic Process
2.5 Case Workshop
2.5.1 Discussion on Information Security Deployment Procedure
2.5.2 Discussion on Cyber Security Cases

3. Network Security Basis

3.1 Firewall User Management
3.1.1 User Authentication and AAA Technical Principles
3.1.2 User Authentication Management and Application
3.2 Overview of Intrusion Prevention
3.2.1 Intrusion Overview
3.2.2 Intrusion Prevention System Overview
3.2.3 Network Antivirus Overview
3.3 Introduction to Firewalls
3.3.1 Firewall Overview
3.3.2 Principle of Firewall Forwarding
3.3.3 Firewall Security Policies and Application
3.3.4 ASPF
3.4 Dual-System Hot Standby
3.4.1 Technical Principles of Dual-System Hot Standby
3.4.2 Basic Networking and Configuration of Dual-System Hot Standby
3.5 Network Address Translation
3.5.1 NAT Principle
3.5.2 Source NAT
3.5.3 Server Mapping
3.5.4 Application Scenarios

4. Operation System and Host Security

4.1 Host Firewalls and Antivirus Software
4.1.1 Windows Firewalls
4.1.2 Linux Firewalls
4.1.3 Antivirus Software
4.2 Operating System Overview
4.2.1 Operating System 101
4.2.2 Windows Operating System
4.2.3 Linux Operating System
4.3 Common Server Types and Threats
4.3.1 Server Overview
4.3.2 Common Server Software
4.3.3 Server Security Threats
4.3.4 Vulnerabilities and Patches

5. Application of Encryption and Decryption

5.1 Public Key Infrastructure (PKI) Certificate System
5.1.1 Digital Certificate
5.1.2 PKI System Structure
5.1.3 PKI Implementation
5.2 Application of Cryptographic Technologies
5.2.1 Application of Cryptography
5.2.2 VPN Overview
5.2.3 VPN Configuration
5.3 Encryption and Decryption Mechanisms
5.3.1 Encryption Technology Development
5.3.2 Encryption and Decryption Mechanisms
5.3.3 Common Encryption and Decryption Algorithms

 

Course Facilitators:
This course is delivered by highly skilled and experienced Huawei Certified Instructors who have also attained the HCIA, HCIP, HCIE, among other related certifications.

Target Audience

  • Cyber security junior engineer who hopes to have information security capabilities.

 

Prerequisite

  • Basic knowledge of TCP/IP.
  • Basic knowledge of Routing and Switching.

 

HCIA Security Exam Details

  • Exam Code: H12 – 711
  • Duration: 90 mins
  • Exam fee: $200
  • Availability: AFRALTI – Pearson VUE Testing Center
DatesDurationLocation
2 weeksAFRALTI
2 weeksAFRALTI
2 weeksAFRALTI
Captcha
Checkboxes