Cademy logoCademy Marketplace

Course Images

Advanced Junos Security

Advanced Junos Security

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online or In-Person

  • You travel to organiser or they travel to you

  • Redhill

  • 5 days

  • All levels

Description

Advanced Junos Security training course description

This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course.

What will you learn
  • Demonstrate the understanding of integrated user firewall.
  • Implement next generation Layer 2 security features.
  • Implement virtual routing instances in a security setting.
  • Utilize Junos tools for troubleshooting Junos security implementations.
  • Implement IPS policy.
Advanced Junos Security training course details
  • Who will benefit:
  • Individuals responsible for implementing, monitoring, and troubleshooting Junos security components.

  • Prerequisites:
  • Intro to the Junos Operating System

  • Duration
  • 5 days

Advanced Junos Security training course contents

  • Junos Layer 2 Packet Handling and Security Features
  • Transparent Mode Security
    Secure Wire
    Layer 2 Next Generation Ethernet Switching
    MACsec
    Lab 2 Implementing Layer 2 Security

  • Virtualization
  • Virtualization Overview
    Routing Instances
    Logical Systems
    Lab 3 Implementing Junos Virtual Routing

  • AppSecure Theory
  • AppSecure Overview
    AppID Overview
    AppID Techniques
    Application System Cache
    Custom Application Signatures

  • AppSecure Implementation
  • AppTrack
    AppFW
    AppQoS
    APBR
    SSL Proxy
    Lab 4 Implementing AppSecure

  • Working with Log Director
  • Log Director Overview
    Log Director Components
    Installing and setting up Log Director
    Clustering with the Log Concentrator VM
    Administrating Log Director
    Lab 5 Deploying Log Director

  • Sky ATP Theory
  • Sky ATP Overview
    Monitoring Sky ATP
    Analysis and Detection of Malware

  • Sky ATP Implementation
  • Configuring Sky ATP
    Installing Sky ATP
    Analysis and detection of Malware
    Infected Host Case Study
    Lab 6 Instructor Led Sky ATP Demo

  • Implementing UTM
  • UTM Overview
    AntiSpam
    AntiVirus
    Content and Web Filtering
    Lab 7 Implementing UTM

  • Introduction to IPS
  • IPS Overview
    Network Asset Protection
    Intrusion Attack Methods
    Intrusion Prevention Systems
    IPS Inspection Walkthrough
    IPS Policy and Configuration
    SRX IPS Requirements
    IPS Operation Modes
    Basic IPS Policy Review
    IPS Rulebase Operations
    Lab 8 Implementing Basic IPS Policy

  • SDSN
  • SDSN Overview, Components & Configuration
    Policy Enforcer Troubleshooting
    SDSN Use Cases
    Lab 9 Implementing SDSN

  • Enforcement, Monitoring, and Reporting
  • User Role Firewall and Integrated User Firewall Overview
    User Role Firewall Implementation
    Monitoring User Role Firewall
    Integrated User Firewall Implementation
    Monitoring Integrated User Firewall
    Lab 10 Configure User Role Firewall and Integrated User Firewall

  • Troubleshooting Junos Security
  • Troubleshooting Methodology
    Troubleshooting Tools
    Identifying IPsec Issues
    Lab 11 Performing Security Troubleshooting Techniques

  • Appendix A: SRX Series Hardware and Interfaces
  • Branch SRX Platform Overview
    High End SRX Platform Overview
    SRX Traffic Flow and Distribution
    SRX Interfaces

About The Provider

Tags

Reviews