وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

Security 3.0

سرفصل های دوره

1. HCIP-Security V3.0 CISN
  • 1.1.1 Network Security Devices and Networking
  • 1.1.2 Introduction to Firewalls, SVN, NIP, AntiDDoS and FireHunter
  • 1.1.3 Introduction to WAF, Agile Controller, AnyOffice, eSight, LogCenter and UMA
  • 1.1.4.1.1.4 Introduction to Network Security Networking
  • 1.2.1 Network Security O&M
  • 1.2.2 File System
  • 1.2.3 Administrator Permission Control and Protocols
  • 1.2.4 Analysis of Network Security Device Logs
  • 1.2.5 Log Event Management Center
  • 1.3.1 Application Scenario of Intelligent Uplink Selection
  • 1.3.2 Principle of Intelligent Uplink Selection
  • 1.3.3 Application Analysis of Intelligent Uplink Selection
  • 1.3.4 Troubleshooting of Intelligent Uplink Selection
  • 1.4.1 SLB Overview and Implementation Mechanism
  • 1.4.2 SLB Configuration and Deployment
  • 1.5.1 Introduction to IP-Link
  • 1.5.2 Introduction to BFD
  • 1.5.3 Introduction to Hot Standby
  • 1.5.4 Application Scenario to Hot Standby
  • 1.5.5 Introduction to Link-Group and Eth-Trunk
  • 1.6.1 IPSec VPN Scenario Overview
  • 1.6.2 Principle of IPSec VPN
  • 1.6.3 Principle of IKEv1 and IKEv2
  • 1.6.4 IPSec VPN Application Scenario
  • 1.6.5 Hub-Spoke IPSec VPN Application Scenario
  • 1.6.6 GRE over IPSec VPN
  • 1.7.1 SSL VPN Technology and Application
  • 1.7.2 Application of Certificates in SSL VPN 1.7 SSL VPN Technology and Application
  • 1.7.3 SSL VPN Application Scenario Analysis 1.7 SSL VPN Technology and Application
  • 1.7.4 SSL VPN Troubleshooting 1.7 SSL VPN Technology and Application
  • 1.8.1 Bandwidth Management Overview
  • 1.8.2 Bandwidth Management Principle
  • 1.8.3 Bandwidth Management Configuration and Deployment
  • 1.8.4 Bandwidth Management Troubleshooting
  • 1.9.1 Virtual System Overview
  • 1.9.2 Virtual System Principle
  • 1.9.3 Virtual System Configuration
  • 1.9.4 Virtual System Deployment
  • 1.9.5 Virtual System Troubleshooting
  • HCIP-Security CISN V3.0 Training Material.pdf
  • HCIP-Security-CISN Lab Guide.pdf

  • 2. HCIP-Security V3.0 CSSN
  • 2.1.1 Basic information Security Knowledge
  • 2.1.2 Content Security Threat -1
  • 2.1.3 Content Security Threat -2
  • 2.1.4 Content Security Technology - 1
  • 2.1.5 Content Security Technology - 2
  • 2.1.6 IAE Detection Engine
  • 2.2.1 Overview of Content Security Filter Technologies
  • 2.2.2 File Blocking and Data Filtering Technology
  • 2.2.3 Mail Filter and Application Behavior Control Technology
  • 2.2.4 Configuration of Content Security Filtering Technologies
  • 2.2.5 Troubleshooting of Content Security Filtering Technologies
  • 2.3.1 Web Security Defense Overview
  • 2.3.2 Web Attack Analysis
  • 2.3.3 URL Filtering Technology
  • 2.3.4 Web Application System Protection Technology
  • 2.4.1 Introduction to Network Intrusion
  • 2.4.2 IDS and IPS System
  • 2.5.1 Application Scenario of Intrusion Prevention Devices
  • 2.5.2 Application and Configuration of Intrusion Prevention Devices - 1
  • 2.5.3 Application and Configuration of Intrusion Prevention Devices - 2
  • 2.5.4 Features of Firewall Intrusion Prevention
  • 2.6.1 Computer Virus Overview - 1
  • 2.6.2 Computer Virus Overview - 2
  • 2.6.3 Antivirus Technologies
  • 2.6.4 Gateway Antivirus Configuration
  • 2.7.1 Introduction to Network Attacks
  • 2.7.2 Principle of Single-Packet Attack Defense - 1
  • 2.7.3 Principle of Single-Packet Attack Defense - 2
  • 2.7.4 Principle of Traffic Attack Defense - 1
  • 2.7.5 Principle of Traffic Attack Defense - 2
  • 2.7.6 Principle of Traffic Attack Defense - 3
  • 2.7.7 Solutions to Traffic Attacks
  • 2.7.8 Features of Firewall Attack Defense
  • 2.8.1 Security in the Cloud Era
  • 2.8.2 Big Data-based Proactive Defense - 1
  • 2.8.3 Big Data-based Proactive Defense - 2
  • 2.8.4 Software-Defined Security
  • HCIP-Security CSSN V3.0 Training Material.pdf
  • HCIP-Security-CSSN V3.0 Lab Guide.pdf

  • 3. HCIP-Security V3.0 CTSS
  • 3.1.1 Necessity of Terminal Security
  • 3.1.2 Design Roadmap of the Terminal Security Solution
  • 3.2.1 WLAN Overview
  • 3.2.2 WLAN Security Overview
  • 3.2.3 WLAN Security Threats
  • 3.2.4 WLAN Security Techology - 1
  • 3.2.5 WLAN Security Techology - 2
  • 3.2.6 Typical WLAN Security Design Cause
  • 3.3.1 Agile Controller-Campus Overview
  • 3.3.2 Install Agile Controller-Campus
  • 3.3.3 Start the Agile Controller-Campus for the First Time
  • 3.4.1 User Management Overview
  • 3.4.2 User Management Function
  • 3.5.1 Access Control Overview
  • 3.5.2 Wired 802.1X Authentication
  • 3.5.3 Wireless 802.1X Authentication
  • 3.5.4 Wired MAC Address Authentication
  • 3.5.5 Wireless MAC Address Authentication
  • 3.6.1 SACG Authentication Principles
  • 3.6.2 SACG Authentication Configuration and Deployment
  • 3.6.3 SACG Authentication Troubleshooting
  • 3.7.1 Portal Authentication Principles
  • 3.7.2 Wired Portal Authentication Configuration and Deployment
  • 3.7.3 Wireless Portal Authentication Configuration and Deployment
  • 3.8.1 Principles of the Agile Network Solution
  • 3.8.2 Configurations of Agile Features
  • 3.9.1 eSight Functions
  • 3.9.2 Network Management Protocols and Features
  • 3.9.3 Network Resource Management
  • 3.9.4 Secure Center Management
  • 3.9.5 IPSec VPN Management
  • HCIP-Security CTSS V3.0 Training Material.pdf
  • HCIP-Security-CTSS V3.0 Lab Guide.pdf
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 11231
    حجم: 3303 مگابایت
    مدت زمان: 1288 دقیقه
    تاریخ انتشار: 19 اردیبهشت 1402
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید