Huawei Training Courses
![](https://nxtdc.com/wp-content/uploads/2023/02/NXTDC-Huawei.png)
Huawei training covers many topics, including networking, security, storage, cloud computing, artificial intelligence, cybersecurity, 5G, and more. Huawei also offers certification programs for its products and technologies, which help individuals demonstrate their proficiency in using Huawei’s products and technologies.
We offer the following courses from Huawei:
This five-day course makes students understand definitions of information and data. Understand development trends of data storage products. Understand the functions and components of controller enclosures and disk enclosures. Understand concepts of scale-up and scale-out, as well as related cables and interface modules. Understand working principles of RAID 2.0+. Understand dynamic RAID and RAID-TP. Understand common protocols used in storage systems. Understand operating principles and characteristics of different protocols. Understand storage network architecture evolution. Understand storage networking technology evolution. Be familiar with the features and positioning of storage products. Understand DeviceManager, CLI, and UltraPath storage system management tools. Understand service characteristics, implementation principles, and application scenarios of resource-tuning technologies. Understand service characteristics, implementation principles, and application scenarios of data protection technologies. Be familiar with standard storage system O&M management tools and typical O&M processes.
This five-day course gives students a good command of the concepts and working principles of the Hyper and Smart series flash storage technologies. Be familiar with the application scenarios and configuration methods of Hyper and Smart series technologies. Master the process, content, and standard storage planning and design tools. Be familiar with the installation and deployment of flash storage and distributed storage. Be familiar with features, principles, application scenarios, and configuration processes of distributed storage technologies. Be familiar with various storage devices’ product positioning, software and hardware architecture. Have a good command of critical features and typical application scenarios of storage products. Have a good knowledge of storage O&M operations. Be familiar with the storage troubleshooting process and method.
This ten-day course makes students to be familiar with storage solution technologies. Have a good command of the planning and design process of storage solutions. Have a basic command of typical storage solution architecture and application practices. Be familiar with the concepts, contents, and processes of storage planning and design. Have general knowledge of the basic concepts and process of system optimization. Have a good command of key technologies for system optimization. Understand the contents and process of storage system O&M management. Have a good command of Huawei storage O&M tools. Have a good command of the storage system troubleshooting methodology. Be familiar with the product positioning, software and hardware architecture, key features, and typical application scenarios of Huawei storage products. Know about the Huawei storage documentation system and certification learning path.
This ten-day course makes students understand the definition of data communication and the capability model of data communication engineers. Understand the network reference model and the entire data communication process. Be familiar with the VRP system and be able to perform basic operations. Understand IPv4 address protocol and related concepts. Understand the forwarding principles of Layer 3 devices such as routers and Layer 3 switches. Understand the concept of routing and use static route or OSPF to build a Layer 3 network. Understand basic Ethernet concepts and describe the functions and working principles of Layer 2 switching devices.
Be familiar with common Ethernet protocols, such as VLAN, Spanning Tree Protocol , link aggregation and stacking. Configure ACLs and AAA to provide basic security solutions for the network. Be familiar with the NAT protocol and master the NAT configuration in different scenarios. Master the configuration of common services on enterprise networks, such as DHCP, FTP and Telnet. Understand basic WLAN concepts and complete basic configurations of small or medium-sized WLAN networks. Understand basic WAN concepts and WAN solutions such as MPLS and SR. Have general knowledge of basic concepts of enterprise network management. Be familiar with traditional network management and SDN-based network management solutions. Have a good command of IPv6 protocols and be able to build small-scale IPv6 networks. Have a good command of the campus network construction process. Be able to independently construct small-sized campus networks. Understand the basic concepts of SDN and programming automation and master the basics of Python.
After completing this fifteen-day course, you will be able to understand the entire process of forwarding data packets by network devices. Understand the working principles and configurations of OSPF, IS-IS, and BGP. Deploy route control and traffic path control. Understand the working principles of RSTP/MSTP. Understand the operating principles of stacking technology. Understand the working principle of multicast and set up a multicast network: Configure ICMPv6, NDP, and IPv6 addresses. Master Huawei firewall technologies. Configure basic security features for network devices. Master the basic configurations for network reliability. Describe standard network management protocols. Understand Huawei enterprise datacom solutions.
After completing this fifteen-day program, the participants can describe OSPF and IS-IS fast convergence technologies. Configure OSPF and IS-IS equal-cost routes. Describe OSPF and IS-IS default routes advertisement. Describe the application scenarios of OSPF and IS-IS multi-process. Describe the GR and NSR principles of OSPF and IS-IS. Describe the application scenarios of OSPF forwarding addresses. Describe the working principles of IS-IS LSP fragment extension. Use AS_Path Filter and Community Filter to implement BGP route control. Apply the ORF function and peer group function of BGP. Understand basic configuration for implementing BGP security. Describe the concept and usage of the 4-byte AS number. Describe the networking of BGP RRs. Clarify the types and designs of port isolation. Clarify the technical principles of port security. Detect MAC address flapping. Clarify switch traffic suppression and storm control functions. Describe application scenarios of DHCP snooping. Clarify how IP Source Guard works. Describe the functional systems of dual-system hot backup. Describe the basic concepts and terms of MPLS. Describe the working principles of MPLS. Configure static LSPs. Describe the MPLS forwarding process. Describe the basic concepts and working mechanism of LDP. Describe the MPLS label distribution control mode, advertisement mode, and retention mode. Understand Basic LDP configuration. escribe the MPLS VPN model.
Describe the basic concepts of MPLS VPN. Describe MPLS VPN routing and label distribution. Describe the MPLS VPN data forwarding process. Perform basic MPLS VPN configurations. Describe the principles of the three cross-domain solutions. Understand the basic design of three cross-domain solutions. Describe the application scenarios of the three cross-domain solutions. Describe the development histories of EVPN. Describe how EVPN solves VPLS problems. Describe the common routing types and working principles of EVPN. Describe the principles of inter-AS EVPN. Describe typical application scenarios of EVPN. Configure IPv6 static routes. Analyse the differences between OSPFv3 and OSPFv2. Understand basic OSPFv3 configuration. Describes IS-IS extensions to IPv6. Understand basic IS-IS (IPv6) configuration.
On completion of this five-day program, the participants will be able to describe the definition and characteristics of network security, describe the development history and trend of network security, understand the data definition and transmission process, describe the working principles of the TCP/IP protocol stack, describe the working principles of standard protocols, describe common security threats to enterprise networks, describe how to cope with common network security threats, describe firewall security zones, describe the stateful inspection and session mechanisms of the firewall, describe the technical background of NAT, know the classification and working principles of NAT, know the application scenarios of different types of NAT, understand the hot standby fundamentals, master the basic hot standby configurations, describe user authentication technologies, describe the different types of intrusion prevention, describe the fundamentals of intrusion prevention, deploy network antivirus policies, development of encryption and decryption technologies, processes of various encryption and decryption methods, principles of encryption and decryption algorithms, describe data communication security technologies, describe the PKI certificate system architecture, describe the PKI working mechanism, application scenarios of encryption technologies, configuration methods for different VPN technologies.
On completion of this ten-day program, the participants will be able to describe the principles of firewall high reliability technologies, understand the high reliability networking mode of the firewall, describe the application scenarios of firewall high reliability technologies, describe the application scenarios of bandwidth management, describe the fundamentals of bandwidth management, describe the application scenarios of quota control policies, describe the fundamentals of quota control policies, master the configurations of firewall traffic management, describe the application scenarios of virtual systems, describe the basic concepts of virtual systems, master how to configure virtual systems, describe basic concepts of intelligent uplink selection, describe the application scenarios of intelligent uplink selection, master the configuration procedure of intelligent uplink selection, understand the basic principles of IPsec VPN, understand the typical application scenarios of IPsec VPN, master the highly reliable IPsec VPN configuration method, master IPsec VPN troubleshooting method, understand application scenarios of SSL VPN, master the main functions and principles of SSL VPN, understand the SSL VPN networking, master the configuration of SSL VPN, describe the principles of common single-packet attacks, describe the principles of common DDoS attacks, describe the principles of defending against single-packet attacks, describe the principles of defending against DDoS attacks, describe the anti-DDoS solution and related defense principles, describe the cyber kill chain, describe the harm of vulnerabilities, master vulnerability defense measures, describe the technical background of the content security filtering technologies, describe basic principles of content security filtering technologies, master the configuration of content security filtering technologies, describe the basic concepts of cyber security emergency response, describe the handling process of cyber security emergency response, understand technologies related to cyber security emergency response, describe the basic concepts of NAC, describe the working principles of user identity authentication, describe common access authentication modes and their working principles, configure user access authentication, apply various network security technologies, design the network security solution, deploy the network security solution, be familiar with network security O&M.