K Labs mette a tua disposizione i propri Trainers Certificati, i Laboratori Didattici, i Simulatori di Esame, il proprio Test Center e un Tutor a te dedicato per la preparazione all'esame.
Grazie al nostro supporto la percentuale di candidati che ottengono la certificazione al primo tentativo è prossima al 100%.
DURATION
5 days
LEVEL
Intermediate
OBJECTIVES
Describe the functionality of network security devices, the scenario of firewall advanced features, the principle of firewall advanced features, the scenario and principle of application security technologies.
Configure the firewall advanced features, the application security technologies, the Agile Controller terminal security features.
Troubleshoot the firewall advanced features, the application security technologies, the Agile Controller terminal security features.
Understand WALN security technologies.
PREREQUISITES
HCIA Security certification or equivalent knowledge.
WHO SHOULD ATTEND
Who wants to become a network security professional and who wants to obtain HCIP Security certification.
TOPICS
Network Security Device Management
1.Network Security Device Introduction
2.Network Security Device Management
Firewall Bandwidth Management
1.Firewall Bandwidth Management Technology
2.Firewall Bandwidth Management Configuration
3.Firewall Bandwidth Management Troubleshooting
Server Load Balancing
1.SLB Technology
2.SLB Configuration
3.SLB Troubleshooting
4.IP-Link technology
Firewall High Availability
1.Firewall High Availability Technology
2.Firewall High Availability Configuration
3.Firewall High Availability Troubleshooting
Firewall Virtual System
1.Firewall Virtual System Technology
2.Firewall Virtual System Configuration
3.Firewall Virtual System Troubleshooting
Advanced VPN Applications
1.Advanced Application of IPSec VPN
2.Advanced Application of SSL VPN
Firewall Intelligent Maintenance
1.Firewall Intelligent Uplink Selection
2.Firewall Smart Policy
Firewall Virtualization
1.Firewalls Virtualization Technology Overview
2.USG6000V Functionality Introduction
3.Virtual Firewall Application Scenario