loading...
Sale!

HUAWEI HCIP-Security V3.0 Course & PDF Guides

$12.00

Price: 12.00 USD | Size: 9.60 GB | 

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD

OR

SKU: XN-HW-HCP-V3 Category:

Description

Price: 12.00 USD | Size: 9.60 GB | 

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD

 

HUAWEI HCIP‑Security V3.0  Course & PDF Guides

Content

1.1.1 Network Security Devices and Networking

1.1.2 Introduction to Firewalls, SVN, NIP, AntiDDoS and FireHunter

1.1.3 Introduction to WAF, Agile Controller, AnyOffice, eSight, LogCenter and UMA

1.1.4.1.1.4 Introduction to Network Security Networking

1.2.1 Network Security O&M

1.2.2 File System

1.2.3 Administrator Permission Control and Protocols

1.2.4 Analysis of Network Security Device Logs

1.2.5 Log Event Management Center

1.3.1 Application Scenario of Intelligent Uplink Selection

1.3.2 Principle of Intelligent Uplink Selection

1.3.3 Application Analysis of Intelligent Uplink Selection

1.3.4 Troubleshooting of Intelligent Uplink Selection

1.4.1 SLB Overview and Implementation Mechanism

1.4.2 SLB Configuration and Deployment

1.5.1 Introduction to IP-Link

1.5.2 Introduction to BFD

1.5.3 Introduction to Hot Standby

1.5.4 Application Scenario to Hot Standby

1.5.5 Introduction to Link-Group and Eth-Trunk

1.6.1 IPSec VPN Scenario Overview

1.6.2 Principle of IPSec VPN

1.6.3 Principle of IKEv1 and IKEv2

1.6.4 IPSec VPN Application Scenario

1.6.5 Hub-Spoke IPSec VPN Application Scenario

1.6.6 GRE over IPSec VPN

1.7.1 SSL VPN Technology and Application

1.7.2 Application of Certificates in SSL VPN  1.7 SSL VPN Technology and Application

1.7.3 SSL VPN Application Scenario Analysis  1.7 SSL VPN Technology and Application

1.7.4 SSL VPN Troubleshooting  1.7 SSL VPN Technology and Application

1.8.1 Bandwidth Management Overview

1.8.2 Bandwidth Management Principle

1.8.3 Bandwidth Management Configuration and Deployment

1.8.4 Bandwidth Management Troubleshooting

1.9.1 Virtual System Overview

1.9.2 Virtual System Principle

1.9.3 Virtual System Configuration

1.9.4 Virtual System Deployment

1.9.5 Virtual System Troubleshooting

2.1.1 Basic information Security Knowledge

2.1.2 Content Security Threat -1

2.1.3 Content Security Threat -2

2.1.4 Content Security Technology – 1

2.1.5 Content Security Technology – 2

2.1.6 IAE Detection Engine

2.2.1 Overview of Content Security Filter Technologies

2.2.2 File Blocking and Data Filtering Technology

2.2.3 Mail Filter and Application Behavior Control Technology

2.2.4 Configuration of Content Security Filtering Technologies

2.2.5 Troubleshooting of Content Security Filtering Technologies

2.3.1 Web Security Defense Overview

2.3.2 Web Attack Analysis

2.3.3 URL Filtering Technology

2.3.4 Web Application System Protection Technology

2.4.1 Introduction to Network Intrusion

2.4.2 IDS and IPS System

2.5.1 Application Scenario of Intrusion Prevention Devices

2.5.2 Application and Configuration of Intrusion Prevention Devices – 1

2.5.3 Application and Configuration of Intrusion Prevention Devices – 2

2.5.4 Features of Firewall Intrusion Prevention

2.6.1 Computer Virus Overview – 1

2.6.2 Computer Virus Overview – 2

2.6.3 Antivirus Technologies

2.6.4 Gateway Antivirus Configuration

2.7.1 Introduction to Network Attacks

2.7.2 Principle of Single-Packet Attack Defense – 1

2.7.3 Principle of Single-Packet Attack Defense – 2

2.7.4 Principle of Traffic Attack Defense – 1

2.7.5 Principle of Traffic Attack Defense – 2

2.7.6 Principle of Traffic Attack Defense – 3

3.1.1 Necessity of Terminal Security

3.1.2 Design Roadmap of the Terminal Security Solution

3.2.1 WLAN Overview

3.2.2 WLAN Security Overview

3.2.3 WLAN Security Threats

3.2.4 WLAN Security Techology – 1

3.2.5 WLAN Security Techology – 2

3.2.6 Typical WLAN Security Design Cause

3.3.1 Agile Controller-Campus Overview

3.3.2 Install Agile Controller-Campus

3.3.3 Start the Agile Controller-Campus for the First Time

3.4.1 User Management Overview

3.4.2 User Management Function

3.5.1 Access Control Overview

3.5.2 Wired 802.1X Authentication

3.5.3 Wireless 802.1X Authentication

3.5.4 Wired MAC Address Authentication

3.5.5 Wireless MAC Address Authentication

3.6.1 SACG Authentication Principles

3.6.2 SACG Authentication Configuration and Deployment

3.6.3 SACG Authentication Troubleshooting

3.7.1 Portal Authentication Principles

3.7.2 Wired Portal Authentication Configuration and Deployment

3.7.3 Wireless Portal Authentication Configuration and Deployment

3.8.1 Principles of the Agile Network Solution

3.8.2 Configurations of Agile Features

3.9.1 eSight Functions

3.9.2 Network Management Protocols and Features

3.9.3 Network Resource Management

3.9.4 Secure Center Management

3.9.5 IPSec VPN Management

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

0
    0
    Your Cart
    Your cart is emptyReturn to Shop

    Add to cart