Junos Security (JSEC) Online

Total time
Location
Online
Starting date and place

Junos Security (JSEC) Online

Fast Lane Institute for Knowledge Transfer GmbH
Logo Fast Lane Institute for Knowledge Transfer GmbH
Provider rating: starstarstarstarstar_half 8.7 Fast Lane Institute for Knowledge Transfer GmbH has an average rating of 8.7 (out of 21 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places

computer Online: Online Training
14 Mar 2022 until 18 Mar 2022
computer Online: Online Training
8 Aug 2022 until 12 Aug 2022
computer Online: Online Training
21 Nov 2022 until 25 Nov 2022

Description

Kursinhalt

  • Course Introduction
  • CLI Overview
  • Advanced Security Policy
  • Application Security Theory
  • Application Security Implementation
  • Intrusion Detection and Prevention
  • Security Director
  • Sky ATP Implementation
  • Policy Enforcer
  • JATP Overview
  • JATP Implementation
  • Juniper Secure Analytics (JSA)
  • JIMS
  • vSRX and cSRX
  • SSL Proxy
  • Cluster Concepts
  • Chassis Cluster Implementation
  • Chassis Cluster Troubleshooting

Voraussetzungen

The following are the prerequisites for this course:

  • Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite; and
  • Successful completion of the Introduction to Juniper Security (…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: Junos, Security, CompTIA A+ / Network+ / Security+, Internet Security, and IT Security.

Kursinhalt

  • Course Introduction
  • CLI Overview
  • Advanced Security Policy
  • Application Security Theory
  • Application Security Implementation
  • Intrusion Detection and Prevention
  • Security Director
  • Sky ATP Implementation
  • Policy Enforcer
  • JATP Overview
  • JATP Implementation
  • Juniper Secure Analytics (JSA)
  • JIMS
  • vSRX and cSRX
  • SSL Proxy
  • Cluster Concepts
  • Chassis Cluster Implementation
  • Chassis Cluster Troubleshooting

Voraussetzungen

The following are the prerequisites for this course:

  • Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite; and
  • Successful completion of the Introduction to Juniper Security (IJSEC) course.

Zielgruppe

The primary audiences for this course are the following:

  • Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers.

Detaillierter Kursinhalt

Day 1

Chapter 1: Course Introduction

Chapter 2: CLI Overview

  • User Interface Options
  • Command-Line Interface
  • Initial Configuration
  • Interface Configuration
  • Lab 1: CLI Overview

Chapter 3: Advanced Security Policy

  • Session Management
  • Junos ALGs
  • Policy Scheduling
  • Policy Logging
  • Lab 2: Advanced Security Policy

Chapter 4: Application Security Theory

  • Application ID
  • Application Signatures
  • App Track
  • App Firewall
  • App QoS
  • App QoE

Chapter 5: Application Security Implementation

  • AppTrack Implementation
  • AppFW Implementation
  • AppQos Implementation
  • APBR Implementation
  • Lab 3: Application Security

Chapter 6: Intrusion Detection and Prevention

  • IPS Overview
  • IPS Policy
  • Attack Objects
  • IPS Configuration
  • IPS Monitoring
  • Lab 4: Implementing IPS

Day 2

Chapter 7: Security Director

  • Overview
  • Security Director Objects
  • Security Director Policy Management
  • Lab 5: Security Director

Chapter 8: Sky ATP Implementation

  • Architecture and Key Components
  • Features and Benefits
  • Configuration
  • Compromised Hosts
  • Command and Control
  • File Scanning
  • E-mail Scanning
  • Geo IP
  • Security Policy Integration
  • Troubleshooting
  • Lab 6: Sky ATP Implementation

Chapter 9: Policy Enforcer

  • Policy Enforcer Concepts
  • Configuration Options
  • Policy Enforcer Installation
  • Lab 7: Policy Enforcer

Day 3

Chapter 10: JATP Overview

  • Traffic Inspection
  • Threat Detection
  • Threat Analysis
  • JATP Architecture

Chapter 11: JATP Implementation

  • Data Collectors
  • Configure SmartCore Analytics Engine
  • Log Ingestion
  • Incident Management
  • SRX Threat Prevention
  • 3rd Party support for Threat Prevention
  • Reporting
  • Lab 8: JATP

Chapter 12: Juniper Secure Analytics (JSA)

  • JSA Overview
  • Data Collection
  • Log Analytics
  • Threat Analytics
  • Vulnerability Management
  • Risk Management
  • Lab 9: JSA

Day 4

Chapter 13: JIMS

  • JIMS Overview
  • JIMS Integration
  • Lab 10: JIMS

Chapter 14: vSRX and cSRX

  • vSRX Overview
  • vSRX Supported Features
  • vSRX Use Cases
  • cSRX Overview
  • Lab 11: vSRX Installation

Chapter 15: SSL Proxy

  • SSL Proxy Overview
  • SSL Concepts
  • SSL Proxy Configurations
  • Troubleshooting
  • LI>Lab 12: SSL Proxy

Day 5

Chapter 16: Cluster Concepts

  • Chassis Cluster Concepts
  • Chassis Cluster Operation

Chapter 17: Chassis Cluster Implementation

  • Chassis Cluster Configuration
  • Chassis Cluster Advanced Options
  • Lab 13: Chassis Cluster Implementation

Chapter 18: Chassis Cluster Troubleshooting

  • Chassis Cluster Case Studies
  • Troubleshooting Examples
  • Lab 14: Chassis Cluster Troubleshooting

Appendix A: Juniper Sky Enterprise

Appendix B: SRX Series Hardware and Interfaces

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate $1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.