HCIA Security V4.0

Huawei Certification Overview:

Huawei Certification is a key component of our "Platform + Ecosystem" strategy, supporting cutting-edge ICT infrastructure (Cloud-Pipe-Device) and evolving with industry trends.


Certification Objectives

On completion of this program, the participants will be able to:

  • Describe the definition and characteristics of network security
  • Describe the development history and trend of network security
  • Understand the data definition and transmission process
  • Describe the working principles of the TCP/IP protocol stack
  • Describe the working principles of common protocols
  • Describe common security threats to enterprise networks
  • Describe how to cope with common network security threats
  • Describe firewall security zones 
  • Describe the stateful inspection and session mechanisms of the firewall
  • Describe the technical background of NAT
  • Know the classification and working principles of NAT
  • Know the application scenarios of different types of NAT
  • Understand the hot standby fundamentals
  • Master the basic hot standby configurations
  • Describe user authentication technologies
  • Describe the different types of intrusion prevention
  • Describe the fundamentals of intrusion prevention
  • Deploy network antivirus policies
  • Development of encryption and decryption technologies
  • Processes of various encryption and decryption methods
  • Principles of encryption and decryption algorithms
  • Describe data communication security technologies
  • Describe the PKI certificate system architecture
  • Describe the PKI working mechanism
  • Application scenarios of encryption technologies
  • Configuration methods for different VPN technologies

What you will gain at the end of this program:

  • Obtain official learning resources such as training materials.
  • FREE Mock Exam after finishing the training program


Course Description

Target Audience:

  • For Engineering and CS Students only 
  • Cyber security junior engineer who hopes to have information security capabilities.

Duration

  • Duration: 40 hours (4 hours/day, 10 days)
  • Time: 6:00 pm - 10:00 pm

Accreditation

Attendance Certification accredited by HUAWEI Academy MSA University and MSA Continuance Learning Center - CLC 

Image

Fees:

Standard

3,500 EGP

MSA Family

2,000 EGP (45% discount)

This program is officially endorsed by the faculty and serves as a mandatory practical training requirement for Engineering-Computer Science (CS) students seeking graduation eligibility.

Don’t miss the chance to join our Magical Learning Experience.

Register now

Our team is always available to assist you.

MSA University - 26 July Mehwar Road intersection with Wahat Road, 6th of October

Email: clc@msa.edu.eg
Whatsapp: 01272803847

Prerequisites
  • Basic knowledge of TCP/IP
  • Basic knowledge of Routing and Switching
Training Content
  1. Security information and security overview 
  • Network Security Concepts and Specifications
      • Network Security Definition
      • Future Network Security Trends
      • Information Security Standards and Specifications
  • Network Basics
      • Network Reference Model
      • Common Network Devices
  • Common Network Security Threats and Threat Prevention
    • Overview of Enterprise Network Security Threats
    • Communication Network Security Requirements and Solutions
    • Zone Border Security Threats and Threat Prevention
    • Computing Environment Security Threats and Threat Prevention
    • Security Requirements and Solutions of the Management Center
  1. Network Security Basis 
  • Firewall Security Policies
    • Firewall Basic Principles
    • Application Scenarios of Firewalls in Cyber Security Solutions
  • Firewall NAT Technologies
    • Overview of NAT
    • Source NAT
    • Destination NAT
    • Bidirectional NAT
    • NAT ALG and NAT Server
  • Firewall Hot Standby Technologies
    • Hot Standby Fundamentals
    • Hot Standby Basic Networking and Configuration
    • Firewall User Management Technologies
    • AAA Principles
    • Firewall User Authentication and Application
  • Firewall IPS
    • Intrusion Overview
    • Intrusion Prevention
    • Antivirus
  1. Application of Encryption and Decryption 
  • Fundamentals of Encryption and Decryption Technologies
    • Encryption/Decryption Technology Development
    • Encryption/Decryption Technology Fundamentals
    • Common Encryption/Decryption Algorithms
    • Hash Algorithms
  • PKI Certificate System
    • Data Communication Security Technologies
    • PKI System Structure
    • PKI Working Mechanism
  • Encryption Technology Applications
    • Application of Cryptography
    • VPN Overview
    • VPN Configuration
    •  



With over 50 years of experience, we’ll ensure you always get the best service.

Image
We provide expert consulting and financial advice to both individual and businesses. Over 25 years of experience.

SignUp Newsletter

Signup Your email address to subscribe our newsletter to get latest post and news about our product and company