K Labs mette a tua disposizione i propri Trainers Certificati, i Laboratori Didattici, i Simulatori di Esame, il proprio Test Center e un Tutor a te dedicato per la preparazione all'esame.
Grazie al nostro supporto la percentuale di candidati che ottengono la certificazione al primo tentativo è prossima al 100%.
HUAWEISECURITY Constructing Service Security Network, Huawei, Huawei Certification, Huawei Certified ICT Professional
NewCondition€1220.00 Pre-Order
DURATION 5 days
LEVEL Intermediate
OBJECTIVES Describe the functionality of network security devices Describe the scenario of firewall advanced features Describe the principle of firewall advanced features Configure the firewall advanced features Troubleshoot the firewall advanced features Describe the scenario of application security technologie Describe the principle of application security technologies Configure the application security technologies Troubleshoot the application security technologie Configure the Agile Controller terminal security features Troubleshoot the Agile Controller terminal security features Understand WALN security technologies
PREREQUISITES HCIA Security certification or equivalent knowledge
WHO SHOULD ATTEND Who wants to become a network security professional and who wants to obtain HCIP Security certification.
TOPICS •Overview of Content Security 1.Information Security Basics 2.Content Security Technologies 3.IAE Inspection Engine Introduction •Content Security Filtering Technology 1.File Blocking Technology 2.Data Filtering Technology 3.Mail Filtering Technology 4.Application Behavior Control •Web Security Protection 1.URL Filtering Technology 2.Web Application Protection 3.Malicious Web Detection •Intrusion Detection and Prevention 1.Intrusion Detection and Prevention Technologies 2.Intrusion Detection and Prevention Application •Antivirus Technologies for Gateway 1.Basic Knowledge of Viruses 2.Virus Signatures and Common Tools for Detecting Viruses 3.Antivirus Technologies for Gateways •Network Attack Defense Technologies 1.Defense Against Single-Packet Attacks 2.Anti-DDoS Technology •Big-Data and Cloud Security 1.Sandbox Technology 2.Big Data Security Solution 3.Cloud Security Technologies