HCNA-Security Training
page-template-default,page,page-id-1080,bridge-core-3.0.7,qode-quick-links-1.0,qode-page-transition-enabled,ajax_updown_fade,page_not_loaded,qode-page-loading-effect-enabled,,qode-title-hidden,qode_grid_1300,footer_responsive_adv,qode-content-sidebar-responsive,qode-theme-ver-29.4,qode-theme-bridge,wpb-js-composer js-comp-ver-5.1.1,vc_responsive,elementor-default,elementor-kit-6182

HCNA-Security Training


Course ID

Lecture, Hands-on exercise

Course Type

5 Days


Min 6´╝îMax 12

Class Size

Target Audience

Operators and Maintainers, Administrators

  • Be familiar with TCP/IP elementary knowledge
  • Be familiar with Router&Switch elementary knowledge

On completion of this program, the participants will be able to:

  • Understand OSI model
  • Understand TCP/IP principles
  • Understand TCP/IP security issues
  • Understand Common attack means
  • Understand the definition and classification of firewalls.
  • Understand firewall Main features and technologies.
  • Understand the Data forwarding process and basic configuration of firewalls.
  • Understand the functions and classification of ACLs.
  • Understand firewall Security Policy and configuration
  • Understand the principles of the NAT technology.
  • Understand the application of NAT.
  • Understand the NAT configuration of firewalls.
  • Understand firewall Dual-System Hot Backup basic technology
  • Understand firewall User Management
  • Understand firewall VLAN//SA/E1/ADSL/WLAN/3G technology
  • Understand the concept and functions of VPN.
  • Understand key VPN technologies.
  • Understand the classification and application of VPN.
  • Understand the application scenarios of VPDN.
  • Understand the principles of L2TP.
  • Understand the application scenarios of client-initialized and NAS-initialized L2TP VPN.
  • Understand the configuration of L2TP.
  • Understand the principles and implementation of GRE VPN.
  • Understand the security mechanism of GRE VPN.
  • Understand the typical application and configuration of GRE VPN.
  • Understand the principles of the IPSec technology.
  • Understand the AH and ESP technologies.
  • Understand the service process of IKE.
  • Understand the application scenarios and configuration of IPSec VPN.
  • Understand the principles of the SSL VPN technology.
  • Understand the Basic functions and features of the SVN product.
  • Understand the configuration of SSL VPN.
  • Understand firewall UTM basic technology
  • Understand what terminal security is.
  • Understand the components and deployment of terminal security management system.
  • Understand the organizational management and access control functions of terminal security management system.
  • Understand the security policy configuration of terminal security management system.

OSCA1 HCNA-Security CBSN Constructing Basic Security Network

  • Network Security Overview
    • OSI Model Introduction
    • TCP/IP Introduction
    • TCP/IP Security Issues
    • Common Network Attacks
  • Basic Firewall Technology
    • Firewall Overview
    • Firewall function and features
    • Firewall device management
    • Basic Firewall Configuration
  • Firewall Security Policy
    • Packet Filtering Technology
    • Firewall packet forward principles
    • Application of Firewall Security Policy
  • Network Address Translation Technology
    • Introduction to Network Address Translation Technology
    • NAT Technology Based on the Source IP Address
    • NAT Technology Based on the Destination IP Address
    • Bidirectional NAT Technology
    • NAT Application Scenario and Configuration
  • Firewall Dual-System Hot Backup basic Technology
    • Dual-System Hot Backup Principles
    • Dual-System Hot Backup Basic Networking and Configuration Commands
  • Firewall User Management
    • User Authentication overview
    • AAA Technology Principles
    • User Management Application
    • Firewall Networking
    • VLAN Feature Technology
    • SA and E1 Feature Technology
    • ADSL Feature Technology
    • WLAN Feature Technology
    • 3G Feature Technology
  • VPN Overview
    • VPN Introduction
    • VPN technologies
    • VPN classification
  • L2TP VPN
    • VPDN Overview
    • L2TP VPN Technology
    • Client-Initialized L2TP
    • NAS-Initialized L2TP
    • GRE VPN Overview
    • GRE VPN Technology
    • Analyzing the Application Scenarios of GRE VPN
  • IPSec VPN
    • IPSec VPN Overview
    • IPSec VPN Architecture
    • AH Technology
    • ESP Technology
    • IKE Technology
    • IPSec VPN Application Scenarios
    • SSL VPN Overview
    • SSL VPN Technology
    • SSL VPN Security Policy
    • SSL VPN Application Scenario
  • Firewall UTM basic Technology
    • Background of UTM
    • Firewall UTM basis Technology
    • Firewall UTM Technology Application
  • Terminal Security
    • Overview of terminal security system
    • Deployment of the terminal security system
    • Deployment of terminal security policies

Get Trained by Industry Expert

Need more info on this course?