HCIA Security

HCIA Security

HCIA-Security certification prove that you have a preliminary understanding of the basic knowledge of small and medium-sized network information security, Huawei firewall technology, encryption and decryption technology, information security system operation and maintenance, and have the ability to assist in the design of small and medium-sized enterprise security network architecture and deployment and maintenance of the corresponding solutions

Course Overivew

  • The HCIA-Security covers information security and security overview, operation system and Host security, network security basis, Application of Encryption and Decryption, Safety operation and analysis basis, etc.
  • You will learn Information security concept, information security standards and specifications, common attack methods, basic operating system security, firewall security policy, firewall NAT technology, firewall hot standby technology, intrusion prevention technology, cryptography foundation, PKI mechanism, IPSec/SSL VPN technology , data monitoring and analysis, electronic forensics technology and emergency response technology
Read More
Read Less
Course Benefits:

1.Basic Network Concepts

  • TCP/IP Architecture
  • Common Network Protocols

2.Information Security Standards and Specifications

  • Information Security Standards and Specifications
  • ISO 27001 ISMS
  • Graded Protection of Information Security
  • Other Standards

3.Common Network Devices

  • Basic Network Devices
  • Initial Device Login

4.Threat Defense and Information Security Development Trends

  • Security Threat Defense
  • Information Security Awareness
  • Information Security Development Trends

5.Common Information Security Threats

  • Current Situation of Information Security Threats
  • Threats to Network Security
  • Threats to Application Security
  • Threats to Data Transmission and Device Security

6.Basic Concepts of Information Security

  • Information and Information Security
  • Information Security Risks and Management

Network Security Basis
1.Firewall User Management

  • User Authentication and AAA Technical Principles
  • User Authentication Management and Application

2.Overview of Intrusion Prevention

  • Intrusion Overview
  • Intrusion Prevention System Overview
  • Network Antivirus Overview

3.Introduction to Firewalls

  • Firewall Overview
  • Principle of Firewall Forwarding
  • Firewall Security Policies and Application
  • ASPF

4.Dual-System Hot Standby

  • Technical Principles of Dual-System Hot Standby
  • Basic Networking and Configuration of Dual-System Hot Standby

5.Network Address Translation

  • NAT Principle
  • Source NAT
  • Server Mapping
  • Application Scenarios

Operation System and Host Security
1.Host Firewalls and Antivirus Software

  • Windows Firewalls
  • Linux Firewalls
  • Antivirus Software

2.Operating System Overview

  • Operating System 101
  • Windows Operating System
  • Linux Operating System

3.Common Server Types and Threats

  • Server Overview
  • Common Server Software
  • Server Security Threats
  • Vulnerabilities and Patches

Application of Encryption and Decryption
1.Public Key Infrastructure (PKI) Certificate System

  • Digital Certificate
  • PKI System Structure
  • PKI Implementation

2.Application of Cryptographic Technologies

  • Application of Cryptography
  • VPN Overview
  • VPN Configuration

3.Encryption and Decryption Mechanisms

  • Encryption Technology Development
  • Encryption and Decryption Mechanisms
  • Common Encryption and Decryption Algorithms

Security Operation and Analysis
1.Cyber Security Emergency Response

  • Background of Cyber Security Emergency Response
  • Overview of Cyber Security Emergency Response
  • Process of Cyber Security Emergency Response

2.Introduction to Security Operations

  • Concept of Security Operations
  • Basic Requirements for Security Operations
  • Content of Security Operations

3.Data Monitoring and Analysis

  • Proactive Analysis
  • Passive Collection
  • Data Analysis

4.Digital Forensics

  • Cyber crime
  • Overview of Digital Forensics
  • Digital Forensic Process

5.Case Workshop

  • Discussion on Information Security Deployment Procedure
  • Discussion on Cyber Security Cases

 

  • Understand the basic concepts of information security.
  • Understand information security common specifications.
  • Configure network devices Know some common security attacks.
  • Understand the basic process of security operation and maintenance.
  • Understanding of safety analysis methods and evidence collection methods.
  • Understand basic firewall technology and configuration.
  • Understand NAT technology.
  • Understand firewall dual-system hot back principles.
  • Know basic network instructions.
  • Know the basic component of operating system.
  • Understanding the common risks and defense methods of operating systems.
  • Understand encryption principles.
  • Understand encryption application and practice the related configurations.
  • Information security operation and maintenance engineer Network security junior engineer who hopes to have information security capabilities
  • Cyber security junior engineer who hopes to have information security capabilities.
Download
Course
Brochure

Prerequisites

This course is available at :

Classroom Training

Cairo
Giza
Onsite

Online Training

Virtual Interactive Instructor LED
Self-Paced Training

WHY CHOOSE CLS

Experience

We have been in the market since 1995, and we kept accumulating experience in the training business, and providing training for more than 100,000 trainees ever since, in Egypt, and the MENA region.

Premium Facilities

CLS facilities are well-equipped with strong hardware and software technologies that aid both students and trainers lead very effective smooth training programs.

Customer Support

We provide our clients with the best solutions, customized to their specific needs and goals. Our team is highly qualified to answer whatever questions you have.

Global Accredited

CLS is an authorized and accredited partner by technology leaders. This means that our training programs are of the highest quality source materials.

Up To Date

We keep tabs on every change in the market and the technology field, so our training programs will always be updated up to the World-class latest standards, and adapted to the global shape-shifting job market.

Certified Instructors

We select the best instructors, who are certified from trustworthy international vendors. They share their professional experience with the Trainees, so they can have a clear hands-on experience.

Over 200,000 Gradutes From CLS

Play Video
Amr Mostafa
An employee of the Security Department at the Ministry of Electricity

I`m attending now CEH Training with Eng Mohamed Hamdy ,CISSP Training with Eng Mohamed Gohar, I really learned a lot from him , everything here in CLS  is very satisfying including facilities .

Play Video
Lamiaa Medhat
CIO

We took a series of courses as the digital Transformation Unit of the ministry . we just finished CRISC Certification Training with DR Adel Abdel Meneim . Thank you CLS for all your efforts, we really appreciate it

Play Video
Ahmed Salah
Senior Cyber Security Engineer

Me and my colleagues are working in a government Organization, We took a no. of cyber security trainings with CLS starting with CEH and CISSP. we liked every thing the instructors, the stuff and whole environment

Play Video
Ferras Hassan
Head of the Programming Department at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Mohamed Ahmed Ali
Systems management specialist

Qualifying the cadres of digital transformation units in government agencies moving to the administrative capital .Thanks CLS

Play Video
Zeinab Salah
Software Developer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Ibrahim Khalaf
IT Infrastructure and Security Manger

I`m attending now CRISC Training with DR Adel Abdel Meneim , I really learned a lot from him , everything here in CLS  is very satisfying including facilities , locations and the team.

Play Video
Samar Shams ElDin
Programmer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Student Application For

HCIA Security
Full Name *
Email *
Phone *
Full Phone
Training Location *
Additional Request

Business Application For

HCIA Security
Full Name *
Company Name *
Job Title *
Number of Employees
Email *
Phone *
Full Phone
Training Location *
Additional Request