ARR_JUN_JSEC Juniper Security (JSEC)
This four-day, intermediate-level course provides students with the knowledge required to work with Juniper Connected Security devices. This course uses Junos CLI, Junos Space® Security Director. The course provides further instruction on how Juniper Networks approaches a complete security solution for current and future security problems, called Juniper Connected Security. Key topics include tasks for intrusion detection and prevention (IDP) rules and custom attack objects, IPSec VPNs, Security Director management, Juniper® Advanced Threat Prevention management (ATP) Cloud management, Policy Enforcer management, Identity aware security policies, Secure Sockets Layer (SSL) Proxy configuration, and Juniper Networks® SRX Series Firewalls high availability configuration and troubleshooting. Through demonstrations and hands-on labs, students will gain experience with the features of each of these devices.Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 24.2R1, Junos Space 23.1R1, Security Director 23.1R1, and JIMS 1.7.0R2.
COURSE OBJECTIVE:
After successfully completing this course, you should be able to: • Explain the basics of intrusion detection. • Explain the function of SSL Proxy. • Explain IPsec VPN concepts. • Implement site-to-site IPsec VPNs. • Implement Juniper® Secure Connect. • Implement identity-aware security policies. • Explain Security Director. • Introduce Policy Enforcer. • Describe the Juniper ATP Cloud Anti-Malware. • Describe the Juniper ATP Cloud features.
TARGET AUDIENCE:
Individuals responsible for security operations using Juniper Networks security solutions, including network engineers, security engineers, administrators, support personnel, and resellers.
COURSE PREREQUISITES:
• Basic networking knowledge • Understanding of the OSI reference model and the TCP/IP protocol suite • Completion of the Introduction to Juniper Security course
COURSE CONTENT:
DAY 1Module 1: Implementing Intrusion Detection and Prevention • Describe the purpose of IDP • Utilize and update the IDP signature database • Configure an IDP policy • Utilize and configure an IDP policy using a template • Monitor IDP operationsLab 1: Implementing IDPModule 2: Implementing SSL Proxy • Explain why SSL proxy is necessary • Describe and configure client-protection SSL proxy • Describe and configure server-protection SSL proxy • Discuss how to monitor SSL proxy • Explain the SSL mirror decrypt featureLab 2: Implementing SSL ProxyModule 3: IPsec VPN Concepts • Identify various types of VPNs • Describe IPsec VPNs and their functionalities • Describe how IPsec VPNs are established • Describe IPsec traffic processingModule 4: Implementing Site-to-Site IPsec VPNs • Describe the high-level configuration options for an IPsec VPN • Describe the functionality of proxy IDs and traffic selectors • Configure an IPsec site-to-site VPN • Monitor a site-to-site IPsec VPNLab 3: Implementing Site-to-Site IPsec VPNsDAY 2Module 5: Implementing Juniper Secure Connect • Describe Juniper Secure Connect features • Explain Juniper Secure Connect UI options • Configure Juniper Secure Connect on SRX Series devices • Connect Juniper Secure Connect ClientLab 4: Implementing Juniper Secure ConnectModule 6: Implementing Identity Aware Security Policies • Describe identity-aware firewall and list supported identity sources • Describe Active Directory as identity source • Configure Active Directory as identity source • Describe Juniper Identity Management Service • Explain how to install Juniper Identity Management Service • Configure Juniper Identity Management Service • Describe how to troubleshoot Juniper Identity Management ServiceLab 5: Implementing Identity Aware Security PoliciesModule 7: Introducing Security Director • Explain the benefits of Security Director • Explain Security Director deployment options • Demonstrate how to access and use the Security Director UI • Demonstrate how to onboard a device • Demonstrate how to manage security policies • Demonstrate how to deploy and validate configuration changesLab 6: Using Security DirectorDAY 3Module 8: Introducing Policy Enforcer • Explain the benefits of Policy Enforcer • Explain how to configure a secure fabric • Describe how infected host remediation occursModule 9: Implementing Juniper ATP Cloud Anti-Malware • Describe Juniper ATP Cloud anti-malware capabilities • Describe the Juniper ATP Cloud Web UI options • Configure the SRX Series Firewall to use Juniper ATP Cloud anti-malware • Discuss a Juniper ATP Cloud anti-malware case studyLab 7: Enrolling Devices in Juniper ATP CloudModule 10: Implementing Juniper ATP Cloud Features • Explain Security Intelligence • Describe Encrypted Traffic Insights • Describe Adaptive Threat Profiling • Explain IoT SecurityLab 8: Implementing ATP Cloud FeaturesDAY 4Module 11: Understanding Chassis Cluster Concepts • Describe why customers implement a chassis cluster • Identify chassis cluster components • Describe the causes of failoverModule 12: Implementing a Chassis Cluster • Configure a chassis cluster • Explain additional chassis cluster configuration optionsLab 9: Implementing a Chassis ClusterModule 13: Troubleshooting a Chassis Cluster • Troubleshoot a chassis cluster • Explain the chassis cluster case studies Lab 10: Troubleshooting a Chassis ClusterSELF-STUDY MODULEModule 14: Explain Junos OS Routing Fundamentals • Explain the difference between directly connected, static, and dynamic routes • Explain how route preference determines the active route to a destination • Demonstrate how to display and examine the inet.0 and inet6.0 routing tables • Configure and validate static routing • Explain the flow process
FOLLOW ON COURSES:
Advanced Juniper Security (AJSEC)
Tilleggsinformasjon
| Varighet | 4 dag(er) |
|---|---|
| Sted | Virtuelt (90% av våre virtuelle kurs blir tatt opp). Kurset kan leveres i Oslo, Bergen, Stavanger, Trondheim og alle andre steder kunden ønsker |
| Språk | Engelsk/norsk kursmateriell , englesk/norsk kursholder |
| Dato | 23.02.2026 – 4 dag(er) – Virtuelt, 11.05.2026 – 4 dag(er) – Virtuelt, 14.09.2026 – 4 dag(er) – Virtuelt |
Relaterte produkter
- ARR_CKT_CCVS Check Point Certified VSX Specialist (CCVS) R81.X (includes 180 days' lab access)Les mer
This 2-day course provides a comprehensive understanding of the Check Point VSX solution and describe how to deploy it within the corporate network environment.
- ARR_F5N_BIG-IRULE-CFG Developing iRules for BIG-IP v.17.1Les mer
This 3-day course provides networking professionals a functional understanding of iRules development. The course builds on the foundation of the Administering BIG-IP or Configuring LTM course, demonstrating how to…
- ARR_CKT_CCSA_R81_20 Check Point Certified Security Administrator (CCSA) R81.20 (includes 180 days' lab access)Les mer
This core course covers the fundamentals needed to deploy, configure, and manage daily operations of Check Point Security Gateways and Management Software Blades that run on the Gaia operating…