Security

HCIP-Security-CTSS (Constructing Terminal Security System)

    HCIP-Security-CTSS (Constructing Terminal Security System) Course Description Who should Attend Prerequisites Duration Course Outline Course Description On completion of this program, the participants will be able to: Describe the functionality of network security devices Describe the scenario of firewall advanced features Describe the principle of firewall advanced features Configure the firewall advanced features […]

HCIP-Security-CTSS (Constructing Terminal Security System) Read More »

HCIP-Security-CSSN (Constructing Service Security Network)

    HCIP-Security-CSSN (Constructing Service Security Network) Course Description Who should Attend Prerequisites Duration Course Outline Course Description On completion of this program, the participants will be able to: Describe the functionality of network security devices Describe the scenario of firewall advanced features Describe the principle of firewall advanced features Configure the firewall advanced features

HCIP-Security-CSSN (Constructing Service Security Network) Read More »

HCIP-Security-CISN (Constructing Infrastructure of Security Network)

    HCIP-Security-CISN (Constructing Infrastructure of Security Network) Course Description Who should Attend Prerequisites Duration Course Outline Course Description On completion of this program, the participants will be able to: Describe the scenario of content security technologies. Describe the principle of web security protect method. Understand the intrusion and anti-virus principles and configuration method. Describe

HCIP-Security-CISN (Constructing Infrastructure of Security Network) Read More »

HCIA-Security

    HCIA-Security Course Description Who should Attend Prerequisites Duration Course Outline Course Description On completion of this program, the participants will be able to: On completion of this program, the participants will be able to: Understand the basic concepts of information security Understand information security common specifications Configure network devices Understand security attacks Understand

HCIA-Security Read More »

Scroll to Top