Junos Security (JSEC) Online
Starting dates and places
computer Online: Online Training 8 Aug 2022 until 12 Aug 2022 |
computer Online: Online Training 21 Nov 2022 until 25 Nov 2022 |
Description
Kursinhalt
- Course Introduction
- CLI Overview
- Advanced Security Policy
- Application Security Theory
- Application Security Implementation
- Intrusion Detection and Prevention
- Security Director
- Sky ATP Implementation
- Policy Enforcer
- JATP Overview
- JATP Implementation
- Juniper Secure Analytics (JSA)
- JIMS
- vSRX and cSRX
- SSL Proxy
- Cluster Concepts
- Chassis Cluster Implementation
- Chassis Cluster Troubleshooting
Voraussetzungen
The following are the prerequisites for this course:
- Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite; and
- Successful completion of the Introduction to Juniper Security (…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Kursinhalt
- Course Introduction
- CLI Overview
- Advanced Security Policy
- Application Security Theory
- Application Security Implementation
- Intrusion Detection and Prevention
- Security Director
- Sky ATP Implementation
- Policy Enforcer
- JATP Overview
- JATP Implementation
- Juniper Secure Analytics (JSA)
- JIMS
- vSRX and cSRX
- SSL Proxy
- Cluster Concepts
- Chassis Cluster Implementation
- Chassis Cluster Troubleshooting
Voraussetzungen
The following are the prerequisites for this course:
- Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite; and
- Successful completion of the Introduction to Juniper Security (IJSEC) course.
Zielgruppe
The primary audiences for this course are the following:
- Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers.
Detaillierter Kursinhalt
Day 1
Chapter 1: Course Introduction
Chapter 2: CLI Overview
- User Interface Options
- Command-Line Interface
- Initial Configuration
- Interface Configuration
- Lab 1: CLI Overview
Chapter 3: Advanced Security Policy
- Session Management
- Junos ALGs
- Policy Scheduling
- Policy Logging
- Lab 2: Advanced Security Policy
Chapter 4: Application Security Theory
- Application ID
- Application Signatures
- App Track
- App Firewall
- App QoS
- App QoE
Chapter 5: Application Security Implementation
- AppTrack Implementation
- AppFW Implementation
- AppQos Implementation
- APBR Implementation
- Lab 3: Application Security
Chapter 6: Intrusion Detection and Prevention
- IPS Overview
- IPS Policy
- Attack Objects
- IPS Configuration
- IPS Monitoring
- Lab 4: Implementing IPS
Day 2
Chapter 7: Security Director
- Overview
- Security Director Objects
- Security Director Policy Management
- Lab 5: Security Director
Chapter 8: Sky ATP Implementation
- Architecture and Key Components
- Features and Benefits
- Configuration
- Compromised Hosts
- Command and Control
- File Scanning
- E-mail Scanning
- Geo IP
- Security Policy Integration
- Troubleshooting
- Lab 6: Sky ATP Implementation
Chapter 9: Policy Enforcer
- Policy Enforcer Concepts
- Configuration Options
- Policy Enforcer Installation
- Lab 7: Policy Enforcer
Day 3
Chapter 10: JATP Overview
- Traffic Inspection
- Threat Detection
- Threat Analysis
- JATP Architecture
Chapter 11: JATP Implementation
- Data Collectors
- Configure SmartCore Analytics Engine
- Log Ingestion
- Incident Management
- SRX Threat Prevention
- 3rd Party support for Threat Prevention
- Reporting
- Lab 8: JATP
Chapter 12: Juniper Secure Analytics (JSA)
- JSA Overview
- Data Collection
- Log Analytics
- Threat Analytics
- Vulnerability Management
- Risk Management
- Lab 9: JSA
Day 4
Chapter 13: JIMS
- JIMS Overview
- JIMS Integration
- Lab 10: JIMS
Chapter 14: vSRX and cSRX
- vSRX Overview
- vSRX Supported Features
- vSRX Use Cases
- cSRX Overview
- Lab 11: vSRX Installation
Chapter 15: SSL Proxy
- SSL Proxy Overview
- SSL Concepts
- SSL Proxy Configurations
- Troubleshooting
- LI>Lab 12: SSL Proxy
Day 5
Chapter 16: Cluster Concepts
- Chassis Cluster Concepts
- Chassis Cluster Operation
Chapter 17: Chassis Cluster Implementation
- Chassis Cluster Configuration
- Chassis Cluster Advanced Options
- Lab 13: Chassis Cluster Implementation
Chapter 18: Chassis Cluster Troubleshooting
- Chassis Cluster Case Studies
- Troubleshooting Examples
- Lab 14: Chassis Cluster Troubleshooting
Appendix A: Juniper Sky Enterprise
Appendix B: SRX Series Hardware and Interfaces
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.