K Labs goes along with you providing you with its Certified Trainers, Training Laboratories, Exam Simulators, the Test Center and a dedicated Tutor that helps you to prepare for the exam.
Thanks to our support, the percentage of candidates who obtain the certification at the first attempt is very close to 100%.
DURATION
3 days
LEVEL
Basic
OBJECTIVES
This 3-day course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. The course provides a brief overview of security problems and how Juniper Networks approaches a complete security solution with Juniper Connected Security. Key topics include configuration tasks for initial system configuration, interface configuration, security object configuration, security policy configuration, IPsec VPN configuration, and NAT configuration. The course then delves into Layer 7 security using UTM, IDP, and AppSecure to provide students with the understanding of application-level security to block advanced threats. An overview of Sky ATP is included for students to understand zero-day network protection technologies. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 19.1R1.6.
PREREQUISITES
Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite.
WHO SHOULD ATTEND
This course benefits Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers.
TOPICS
Juniper Security Concepts
Security Challenges
Security Design Overview
Juniper Connected Security
Juniper Connected Security – SRX Series Devices
SRX Architectural Overview
Traffic Processing
J-Web Overview
Initial Configuration
Interface Configuration
Lab 1: Initial Configuration
Security Objects
Security Zone Objects
Security Screen Objects
Security Address Objects
Security Services Objects
Lab 2: Creating Security Objects with J-Web
Security Policies
Security Policy Overview
Security Policy Components
Application Firewall with Unified Security Policies
Security Policy Case Study
Lab 3: Implementing Security Policies
Security Services – IDP and User Firewall
Introduction to IPS
IPS Policy Components
Configuring IPS Policies
User Firewall Overview
Configuring Integrated User Firewall
Lab 4: Implementing Security Services
Security Services - UTM
Content Filtering
Web Filtering
Antivirus
Antispam
Lab 5: Implementing UTM
Juniper Connected Security – Sky ATP
Sky ATP Overview
Sky ATP Features
Sky ATP Setup
Monitor Sky ATP
Lab 6: Demonstrating Sky ATP
Network Address Translation
NAT Overview
Source NAT
Destination NAT
Static NAT
Lab 7: Implementing Network Address Translation
Site-to-Site VPNs
IPsec Site-to-Site VPN Configuration
IPsec Site-to-Site VPN Case Study
Proxy IDs and Traffic Selectors
Monitoring Site-to-Site IPsec VPNs
Lab 8: Implementing Site-to-Site IPsec VPNs
Monitoring and Reporting
Monitor Platform and Interface Operations
J-Web Reporting options
Lab 9: Using Monitoring and Reporting
K Labs S.R.L.
Tel. +39 059 8212 29 | info@klabs.it
VAT IT02034520367