
HCIA Security V4.0
Huawei Certification Overview:
Huawei Certification is a key component of our "Platform + Ecosystem" strategy, supporting cutting-edge ICT infrastructure (Cloud-Pipe-Device) and evolving with industry trends.
Certification Objectives
On completion of this program, the participants will be able to:
- Describe the definition and characteristics of network security
- Describe the development history and trend of network security
- Understand the data definition and transmission process
- Describe the working principles of the TCP/IP protocol stack
- Describe the working principles of common protocols
- Describe common security threats to enterprise networks
- Describe how to cope with common network security threats
- Describe firewall security zones
- Describe the stateful inspection and session mechanisms of the firewall
- Describe the technical background of NAT
- Know the classification and working principles of NAT
- Know the application scenarios of different types of NAT
- Understand the hot standby fundamentals
- Master the basic hot standby configurations
- Describe user authentication technologies
- Describe the different types of intrusion prevention
- Describe the fundamentals of intrusion prevention
- Deploy network antivirus policies
- Development of encryption and decryption technologies
- Processes of various encryption and decryption methods
- Principles of encryption and decryption algorithms
- Describe data communication security technologies
- Describe the PKI certificate system architecture
- Describe the PKI working mechanism
- Application scenarios of encryption technologies
- Configuration methods for different VPN technologies
What you will gain at the end of this program:
- Obtain official learning resources such as training materials.
- FREE Mock Exam after finishing the training program
Course Description
Target Audience:
- For Engineering and CS Students only
- Cyber security junior engineer who hopes to have information security capabilities.
Duration :
- Duration: 40 hours (4 hours/day, 10 days)
- Time: 6:00 pm - 10:00 pm
Accreditation
Attendance Certification accredited by HUAWEI Academy MSA University and MSA Continuance Learning Center - CLC

Fees:
Standard
MSA Family
This program is officially endorsed by the faculty and serves as a mandatory practical training requirement for Engineering-Computer Science (CS) students seeking graduation eligibility.
Don’t miss the chance to join our Magical Learning Experience.
Our team is always available to assist you.
MSA University - 26 July Mehwar Road intersection with Wahat Road, 6th of October
Email: clc@msa.edu.eg
Whatsapp: 01272803847
- Basic knowledge of TCP/IP
- Basic knowledge of Routing and Switching
- Security information and security overview
- Network Security Concepts and Specifications
- Network Security Definition
- Future Network Security Trends
- Information Security Standards and Specifications
- Network Basics
- Network Reference Model
- Common Network Devices
- Common Network Security Threats and Threat Prevention
- Overview of Enterprise Network Security Threats
- Communication Network Security Requirements and Solutions
- Zone Border Security Threats and Threat Prevention
- Computing Environment Security Threats and Threat Prevention
- Security Requirements and Solutions of the Management Center
- Network Security Basis
- Firewall Security Policies
- Firewall Basic Principles
- Application Scenarios of Firewalls in Cyber Security Solutions
- Firewall NAT Technologies
- Overview of NAT
- Source NAT
- Destination NAT
- Bidirectional NAT
- NAT ALG and NAT Server
- Firewall Hot Standby Technologies
- Hot Standby Fundamentals
- Hot Standby Basic Networking and Configuration
- Firewall User Management Technologies
- AAA Principles
- Firewall User Authentication and Application
- Firewall IPS
- Intrusion Overview
- Intrusion Prevention
- Antivirus
- Application of Encryption and Decryption
- Fundamentals of Encryption and Decryption Technologies
- Encryption/Decryption Technology Development
- Encryption/Decryption Technology Fundamentals
- Common Encryption/Decryption Algorithms
- Hash Algorithms
- PKI Certificate System
- Data Communication Security Technologies
- PKI System Structure
- PKI Working Mechanism
- Encryption Technology Applications
- Application of Cryptography
- VPN Overview
- VPN Configuration