Current location - Education and Training Encyclopedia - Education and training - What are the training courses for network engineers?
What are the training courses for network engineers?
Introduction to network engineer training: The employment pressure is relatively high now. In society, relying on one's own ability is more important than Arvin Ping. Therefore, many people will master a technology that adapts to society through self-study or professional study. At present, there is a shortage of technical talents of network engineers in China, and many people want to get the certification of network engineers and get a good salary. Through the professional study in Hefu Baode, I learned the certificate of the recent network engineering training course, which will give me more stable work and development prospects in the future. If you want to consult a network engineer online in www.hfbaode.com, we will answer your questions in detail. The following are the training courses for network engineers by subject:

I. HCNA-R&; South America (HCDA)

Positioning: HCNA-R&; S(HCDA) is positioned as a professional with primary knowledge and skills in the field of enterprise network technology. Focus on the investigation and certification of primary enterprise network technology. With HCNA-r &;; Engineers with S(HCDA) certificates are recognized as professionals with the general technology and basic design ability of small and medium-sized enterprise networks.

Advantages: 1 Theory and application are closely combined; 2. Certification with high gold content; 3. The only certification in the industry that meets the trend of ICT convergence

Value: 1. Have the level of enterprise network engineer, and be qualified for the position of network engineer in small and medium-sized enterprises. 2. Prove that you have a preliminary understanding of small and medium-sized enterprise networks, understand the general technology of small and medium-sized networks, and have the ability to assist in designing small and medium-sized networks and use Huawei network equipment to implement the design. 3. Owning HCNA-R&; S(HCDA) certified engineers believe that enterprises have the ability to use Huawei network equipment to build basic small and medium-sized routing and switching networks to support basic network applications such as voice, wireless, cloud, security and storage integration, and meet the needs of enterprises for network use.

HCNA R & amp; S ability goal: 1, able to use the basic knowledge of IP routing technology, switching technology, network security and so on to enter the IP network. Basic operation and maintenance; 2. Be able to use Huawei routers, switches and firewall products to build a simple and small IP network; 3. Be able to operate network equipment correctly according to the communication industry process specification.

The training courses are as follows:

? Chapter 1 Brief introduction of IP network: introduction of basic concepts of IP network, including transmission media; IP address; Introduction of ICMP and ARP protocols; Introduction of transport layer protocols; Detailed introduction of data forwarding process. The second chapter is the operation guidance of VRP: the basic introduction of VRP; Command line operation basis of VRP; Introduction of file system foundation and VRP system management. Chapter three: the foundation of switching network: the introduction of the basic concepts of switching network; STP principle and configuration; Introduction to the principle and structure of RSTP. Chapter four: gIP routing foundation of interconnection between networks; Static routing foundation; Principle and configuration of distance vector routing protocol -RIP; Principle and configuration of link-state routing protocol OSPF. Chapter five: the realization of network application: DHCP principle and configuration; FTP principle and configuration; Telnet principle and configuration. Chapter 6 introduces the link aggregation technology to improve the efficiency and reliability of enterprise network; VLAN principle and configuration; GARP and GVRP;; ; Inter-VLAN route; Overview of wireless local area network. Chapter seven? Enrich the principle and configuration of enterprise interconnection methods HDLC and PPP; Frame Relay principle and configuration; Principle and configuration of PPPoE; Network address translation; Enterprise wireless solutions. Chapter 8 introduces the access control list to enhance enterprise network security; Introduction of AAA technology; Principle and configuration of IPsec VPN; GRE principle and configuration. Chapter 9 Optimizing the Manageability of Enterprise Network? SNMP principle and configuration; E-Sight introduces the basic introduction of chapter 10 enterprise network migration to IPv6 Pv6; IPv6 routing foundation; Principle and configuration of DHCPv6. Chapter 1 1 Experiment of Building a Basic Network with eNSP 1- 1: Building a Basic IP Network. Chapter 12 Basic Equipment Configuration Experiment 2- 1 Basic Equipment Configuration. Chapter 13 STP and RSTP Experiment 3- 1: Configure STP; Experiment 3-2: Configure RSTP. Chapter 14 Routing Configuration? Lab 4- 1: Configure static routes and default routes; Experiment 4-2: Configure RIPv 1 and RIPv2;; Experiment 4-3: RIPv2 routing summary and authentication; Experiment 4-4: OSPF single area configuration. Chapter 15 FTP and DHCP? Experiment 5- 1: Configure FTP service; Lab 5-2: Configure DHCP. Chapter 16 Ethernet and VLAN experiment 6- 1: Ethernet interface and link configuration; Experiment 6-2: VLAN configuration; Experiment 6-3: GVRP configuration; Experiment 6-4: International 6-4: VLAN Routing; Lab 6-5: Configure Layer 3 switches. Chapter 17 Enterprise WAN Configuration Experiment 7- 1: HDLC and PPP configuration; Lab 7-2: Frame Relay Configuration; Lab 7-3: Configure PPPoE Client. Chapter 18 IP security configuration experiment 8- 1: configure ACL to filter enterprise data; Experiment 8-2: NAT configuration; Experiment 8-3: Local AAA Configuration; Experiment 8-4: IPsec VPN configuration; Experiment 8-5: GRE tunnel configuration. Chapter 19 enterprise network management experiment 9- 1: network management through SNMP protocol. Chapter 19 enterprise network management experiment 9- 1: network management through SNMP protocol.

Second, HCNA- safety.

Positioning: HCNA- security positioning is a professional who is familiar with the basic knowledge of network security and has the experience and skills of network security equipment networking in the field of network security technology. Focusing on the inspection and certification of firewall and terminal security technology, engineers with HCNA security certificates are recognized as professionals with the basic planning, installation and deployment capabilities of firewalls and the basic operation and deployment capabilities of TSM products.

Advantages: 1 Pay attention to the basic knowledge of network security and expand your vision in the field of network security; 2. Not only pay attention to the basic knowledge of firewall, technical principle, packet filtering, NAT and other basic applications, if SSL VPN, IPSec VPN and user access authentication are important applications, they can also help you quickly master key security technologies and apply them to practical work; 3. Pay attention to the knowledge of intranet security and terminal security to help you realize the security planning and design at the desktop terminal level.

Value: 1. Have the level of network security engineer, and be competent for the post of network security engineer or system administrator; 2. Have the ability of network security planning and design to realize the safe deployment of firewall; 3. Master the technology of network security equipment and complete the installation, operation and maintenance management of network security equipment; 4. Master the basic knowledge of terminal security system, have the ability of terminal security system planning and design, and complete the terminal security system deployment examination.

Three. HCNP- safety

Positioning: HCNA- security positioning is a professional who is familiar with the basic knowledge of network security and has the experience and skills of network security equipment networking in the field of network security technology. Focusing on the inspection and certification of firewall and terminal security technology, engineers with HCNA security certificates are recognized as professionals with the basic planning, installation and deployment capabilities of firewalls and the basic operation and deployment capabilities of TSM products.

Advantages: 1 Pay attention to the basic knowledge of network security and expand your vision in the field of network security; 2. Not only pay attention to the basic knowledge of firewall, technical principle, packet filtering, NAT and other basic applications, if SSL VPN, IPSec VPN and user access authentication are important applications, they can also help you quickly master key security technologies and apply them to practical work; 3. Pay attention to the knowledge of intranet security and terminal security to help you realize the security planning and design at the desktop terminal level.

Value: 1. Have the level of network security engineer, and be competent for the post of network security engineer or system administrator; 2. Have the ability of network security planning and design to realize the safe deployment of firewall; 3. Master the technology of network security equipment and complete the installation, operation and maintenance management of network security equipment; 4. Master the basic knowledge of terminal security system, have the ability of terminal security system planning and design, and complete the terminal security system deployment examination.

These courses are as follows:

I. Advanced firewall equipment management: 1. Basic management mode; 2.AAA equipment management; 3. Password failure recovery.

2. Advanced security function of firewall: 1. Principle and configuration of firewall current limiting strategy; 2. The principle and configuration of firewall load balancing.

Iii. Firewall reliability technology: 1. IP-Link principle and configuration; 2.BDF principle and configuration; 3.Eth-Trunk principle and configuration; 4. Principle and structure of connecting rod group; 5. Bypass principle and configuration

; 6. The implementation principle and configuration of dual-machine hot standby protocol (the basic principles of VRRP protocol, VGMP protocol and HRP protocol).

Fourth, virtual firewall technology: the principle and configuration of virtual firewall.

V. Advanced application and troubleshooting of firewall VPN: 1. IPSec VPN technology: AH, ESP, IKE, multipoint VPN, IPSec NAT traversal, IPSec device redundancy, link redundancy; 2. Advanced functions and configuration of L2TP on 2.IPSec VPN; 3.SSL VPN application analysis.

VI. Basic firewall attack prevention technology: 1. Traffic attack and prevention technology and configuration; 2. Scanning snooping attack and prevention technology and configuration; 3. Abnormal message attack and prevention technology and configuration 4. Special information attack and prevention technology and configuration.

Seven, firewall DDOS attack prevention technology: 1. DDoS attack and prevention technology: TCP proxy technology, source legitimacy verification technology, session-based prevention technology, behavior analysis technology, feature recognition filtering technology;

2.DDoS attack prevention solution system architecture: management center, detection center and cleaning center; 3.DDoS attack prevention solution networking deployment: direct deployment and bypass deployment; 4.DDoS attack prevention solution drainage and backflow technology and configuration; 5.ATIC server deployment and configuration.

Eight, firewall troubleshooting: 1. Troubleshooting of firewall security policy function; 2. Troubleshooting the advanced security function of firewall; 3. Troubleshooting of dual-machine hot standby; 4. Troubleshooting 4.L2TP VPN; 5. Troubleshooting 5.IPSec VPN; 6. Troubleshooting 6.SSL VPN.

The concept of terminal security 1. Background of terminal security; 2. Challenges faced by terminal security solutions; 3. The concept of terminal security integrated defense system.

X. design of terminal security system? 1. Overview of terminal security three-dimensional defense design ideas; 2. Terminal security technology: business authorization in identity authentication, access control, security authentication and audit; 3. System function of policy center; 4. Design scheme of terminal security system.

Xi。 Installation and deployment of terminal security system? 1. Terminal security system installation: install SQL Server, SM, SC and terminal customization software; 2. Policy center system configuration: policy management configuration, server management configuration and terminal management configuration; 3. Terminal security system deployment: hardware SACG access control, 802. 1X access control, software SACG access control and portal gateway access control.

Twelve. Operation and operation management of terminal security system 1. Operation management operation: terminal security rule management, users and terminals, software distribution management, asset management, patch management and USB management; 2. System maintenance: system administrator, log management, equipment upgrade, customized reports; 3. Operation and maintenance tools: server monitors, scanners, information collection tools and remote assistance.

XIII. Fault handling of terminal security system 1. Troubleshooting ideas of strategy center; 2. How to use troubleshooting tools; 3. Typical fault handling of the strategy center system.

Fourteen The concept of content security 1. The concepts of information security and network security system; 2. Background of content security; 3. Main technologies involved in content security.

Fifteen. UTM technology application and configuration 1. The main technical principles of intrusion detection and defense; 2. Application and configuration of intrusion detection technology; 3. Application and configuration of intrusion prevention technology; 4. Basic knowledge of computer virus;

5. Virus attack characteristics and tool detection; 6. The realization principle of gateway anti-virus; 7. Application and configuration of gateway anti-virus technology; 8. Basic knowledge of web filtering technology; 9. Technical principle of website URL filtering; 10. Key detection technology of malicious web pages: 1 1. Application and configuration of web filtering technology: 12. Concept and background of spam; 13. Anti-spam technology principle; 14. Application and configuration of anti-spam technology;

15. Background of deep message detection technology; 16. the principle of deep message detection technology; 17. Application and configuration of deep message detection technology.

Sixteen, UTM function troubleshooting 1. Troubleshooting IPS; 2.AV troubleshooting; 3.URL filtering troubleshooting; 4. Troubleshooting of 4.RBL filtering; 5. Troubleshooting of online behavior management.

More Huawei certification training courses are as follows:

I hope that the above introduction to Huawei's certification positioning, value, advantages and training subjects will help you!