K Labs goes along with you providing you with its Certified Trainers, Training Laboratories, Exam Simulators, the Test Center and a dedicated Tutor that helps you to prepare for the exam.
Thanks to our support, the percentage of candidates who obtain the certification at the first attempt is very close to 100%.
DURATION
5 days
LEVEL
Basic
OBJECTIVES
This five-day course uses the Junos J-Web, CLI, Junos Space, and other user interfaces to introduce students to the concept of Juniper Connected Security. Key topics include tasks for advanced security policies, application layer security using the AppSecure suite, IPS rules and custom attack objects, Security Director management, Sky ATP management, JATP management, JSA management, Policy Enforcer management, JIMS management, Juniper Sky Enterprise usage, vSRX and cSRX usage, SSL Proxy configuration, and SRX chassis clustering configuration and troubleshooting.
Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations.
PREREQUISITES
Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite; and
Successful completion of the Introduction to Junos Security (IJSEC) course is also a prerequisite.
WHO SHOULD ATTEND
This course benefits Operators of Juniper Networks security solutions, including network engineers, administrators, support, personnel, and resellers.
TOPICS
CLI Overview
User Interface Options
Command-Line Interface
Initial Configuration
Interface Configuration
Lab 1: CLI Overview
Advanced Security Policy
Session Management
Junos ALGs
Policy Scheduling
Policy Logging
Lab 2: Advanced Security Policy
Application Security Theory
Application ID
Application Signatures
App Track
App Firewall
App QoS
App QoE
Application Security Implementation
AppTrack Implementation
AppFW Implementation
AppQos Implementation
APBR Implementation
Lab 3: Application Security
Intrusion Detection and Prevention
IPS Overview
IPS Policy
Attack Objects
IPS Configuration
IPS Monitoring
Lab 4: Implementing IPS
Security Director
Overview
Security Director Objects
Security Director Policy Management
Lab 5: Security Director
Sky ATP Implementation
Architecture and Key Components
Features and Benefits
Configuration
Compromised Hosts
Command and Control
File Scanning
E-mail Scanning
Geo IP
Security Policy Integration
Troubleshooting
Lab 6: Sky ATP Implementation
Policy Enforcer
Policy Enforcer Concepts
Configuration Options
Policy Enforcer Installation
Lab 7: Policy Enforcer
JATP Overview
Traffic Inspection
Threat Detection
Threat Analysis
JATP Architecture
JATP Implementation
Data Collectors
Configure SmartCore Analytics Engine
Log Ingestion
Incident Management
SRX Threat Prevention
3rd Party support for Threat Prevention
Reporting
Lab 8: JATP
Juniper Secure Analytics (JSA)
JSA Overview
Data Collection
Log Analytics
Threat Analytics
Vulnerability Management
Risk Management
Lab 9: JSA
JIMS
JIMS Overview
JIMS Integration
Lab 10: JIMS
vSRX and cSRX
vSRX Overview
vSRX Supported Features
vSRX Use Cases
cSRX Overview
Lab 11: vSRX Installation
SSL Proxy
SSL Proxy Overview
SSL Concepts
SSL Proxy Configurations
Troubleshooting
Lab 12: SSL Proxy
Cluster Concepts
Chassis Cluster Concepts
Chassis Cluster Operation
Chassis Cluster Implementation
Chassis Cluster Configuration
Chassis Cluster Advanced Options
Lab 13: Chassis Cluster Implementation
Chassis Cluster Troubleshooting
Chassis Cluster Case Studies
Troubleshooting Examples
Lab 14: Chassis Cluster Troubleshooting
K Labs S.R.L.
Tel. +39 059 8212 29 | info@klabs.it
VAT IT02034520367