1.1.1 Network Security Devices and Networking
1.1.2 Introduction to Firewalls, SVN, NIP, AntiDDoS and FireHunter
1.1.3 Introduction to WAF, Agile Controller, AnyOffice, eSight, LogCenter and UMA
1.1.4.1.1.4 Introduction to Network Security Networking
1.2.1 Network Security O&M
1.2.2 File System
1.2.3 Administrator Permission Control and Protocols
1.2.4 Analysis of Network Security Device Logs
1.2.5 Log Event Management Center
1.3.1 Application Scenario of Intelligent Uplink Selection
1.3.2 Principle of Intelligent Uplink Selection
1.3.3 Application Analysis of Intelligent Uplink Selection
1.3.4 Troubleshooting of Intelligent Uplink Selection
1.4.1 SLB Overview and Implementation Mechanism
1.4.2 SLB Configuration and Deployment
1.5.1 Introduction to IP-Link
1.5.2 Introduction to BFD
1.5.3 Introduction to Hot Standby
1.5.4 Application Scenario to Hot Standby
1.5.5 Introduction to Link-Group and Eth-Trunk
1.6.1 IPSec VPN Scenario Overview
1.6.2 Principle of IPSec VPN
1.6.3 Principle of IKEv1 and IKEv2
1.6.4 IPSec VPN Application Scenario
1.6.5 Hub-Spoke IPSec VPN Application Scenario
1.6.6 GRE over IPSec VPN
1.7.1 SSL VPN Technology and Application
1.7.2 Application of Certificates in SSL VPN 1.7 SSL VPN Technology and Application
1.7.3 SSL VPN Application Scenario Analysis 1.7 SSL VPN Technology and Application
1.7.4 SSL VPN Troubleshooting 1.7 SSL VPN Technology and Application
1.8.1 Bandwidth Management Overview
1.8.2 Bandwidth Management Principle
1.8.3 Bandwidth Management Configuration and Deployment
1.8.4 Bandwidth Management Troubleshooting
1.9.1 Virtual System Overview
1.9.2 Virtual System Principle
1.9.3 Virtual System Configuration
1.9.4 Virtual System Deployment
1.9.5 Virtual System Troubleshooting
HCIP-Security CISN V3.0 Training Material.pdf
HCIP-Security-CISN Lab Guide.pdf