K Labs mette a tua disposizione i propri Trainers Certificati, i Laboratori Didattici, i Simulatori di Esame, il proprio Test Center e un Tutor a te dedicato per la preparazione all'esame.
Grazie al nostro supporto la percentuale di candidati che ottengono la certificazione al primo tentativo è prossima al 100%.
DURATION
5 days
LEVEL
Intermediate
OBJECTIVES
This five-day course is designed to cover best practices, theory, and design principles for security design, including traditional and modern security principles such as security design specifics for campus and branch, enterprise wide area network (WAN), service provider WAN, and data center deployments. This course also includes design principles for security management, automation, and virtualization.
PREREQUISITES
The following are the prerequisites for this course:
Knowledge of network security concepts, including:
• Traditional and next-generation firewalls;
• IPsec VPNs;
• Network Address Translation (NAT); and
• Security intelligence.
Knowledge of Juniper Networks products and solutions.
Network automation and virtualization concepts.
Basic knowledge of hypervisors and high availability concepts.
Completion of the Juniper Networks Design Fundamentals (JNDF) course.
WHO SHOULD ATTEND
This course is targeted specifically for those who have a solid understanding of operation and configuration and are looking to enhance their skill sets by learning the principles of security design.
TOPICS
Security in Network Design
The Value of Security in Network Design
Juniper’s Security Focus
Assessing Security in Network Design
Overview
Customer Security Requirements
Customer Scope
Data Analysis
Traditional Security Architectures
Traditional Security Practices
NAT
IPsec VPNs
Next Generation Firewalls
Unified Threat Management
Lab: Designing a Traditional Security Architecture
Modern Security Principles
Modern Security Models
Designing an Intelligent Network
Use Cases
Modularity in Security Design
Lab: Designing for Security Intelligence
Managing Security
Security Management Challenges
Junos Space Security Director
Juniper Secure Analytics
Lab: Security Management
Automating Security
Automating Security Introduction
Juniper Automation Stack
Juniper Automation Tools
Automating Security
Lab: Automating Security
Virtualizing Security
Security in a Virtualized Environment
Virtual SRX
Security with SDN and NFV
Container SRX
Network Virtualization with VMware NSX
Lab: Virtualizing Security
Providing High Availability in Security Design
Benefits of High Availability with Security Devices
Implementing Physical High Availability
Assymmetrical Traffic Handling
SRX Chassis Clustering
Lab: High Availability
Securing the Campus and Branch
Campus and Branch Security: An Overview
Network Segmentation and Perimeter Security
Application-Level Security
Access Control and Authentication
Layer 2 Security Functions
Case Studies and Example Architectures
Lab: Designing for Campus and Branch Security
Securing the Enterprise WAN
Security in the Enterprise WAN: An Overview
Best Practices and Considerations
Case Studies and Example Architectures
Lab: Designing for Enterprise WAN Security
Securing the Service Provider WAN
Security in the Service Provider WAN: An Overview
Best Practices and Considerations
Case Studies and Example Architectures
Lab: Designing for Service Provider WAN Security
Securing the Data Center
Overview of Data Center Security
Security Elements
Simplifying Security in the Data Center
Advanced Data Center Security
Lab: Securing the Data Center
Juniper Security Solutions
Security Products and Solutions