Advanced Junos Security training course description
This course provides students with intermediate routing
knowledge and configuration examples. The course
includes an overview of protocol-independent routing
features, load balancing and filter-based forwarding,
OSPF, BGP, IP tunneling, and high availability (HA)
features. Junos Intermediate Routing (JIR) is an
intermediate-level course.
What will you learn
Demonstrate the understanding of integrated user
firewall.
Implement next generation Layer 2 security features.
Implement virtual routing instances in a security
setting.
Utilize Junos tools for troubleshooting Junos
security implementations.
Implement IPS policy.
Advanced Junos Security training course details
Who will benefit:
Individuals responsible for implementing, monitoring, and
troubleshooting Junos security components.
Prerequisites:
Intro to the Junos Operating System
Duration
5 days
Advanced Junos Security training course contents
Junos Layer 2 Packet Handling and Security Features
Transparent Mode Security
Secure Wire
Layer 2 Next Generation Ethernet Switching
MACsec
Lab 2 Implementing Layer 2 Security
Virtualization
Virtualization Overview
Routing Instances
Logical Systems
Lab 3 Implementing Junos Virtual Routing
AppSecure Theory
AppSecure Overview
AppID Overview
AppID Techniques
Application System Cache
Custom Application Signatures
AppSecure Implementation
AppTrack
AppFW
AppQoS
APBR
SSL Proxy
Lab 4 Implementing AppSecure
Working with Log Director
Log Director Overview
Log Director Components
Installing and setting up Log Director
Clustering with the Log Concentrator VM
Administrating Log Director
Lab 5 Deploying Log Director
Sky ATP Theory
Sky ATP Overview
Monitoring Sky ATP
Analysis and Detection of Malware
Sky ATP Implementation
Configuring Sky ATP
Installing Sky ATP
Analysis and detection of Malware
Infected Host Case Study
Lab 6 Instructor Led Sky ATP Demo
Implementing UTM
UTM Overview
AntiSpam
AntiVirus
Content and Web Filtering
Lab 7 Implementing UTM
Introduction to IPS
IPS Overview
Network Asset Protection
Intrusion Attack Methods
Intrusion Prevention Systems
IPS Inspection Walkthrough
IPS Policy and Configuration
SRX IPS Requirements
IPS Operation Modes
Basic IPS Policy Review
IPS Rulebase Operations
Lab 8 Implementing Basic IPS Policy
SDSN
SDSN Overview, Components & Configuration
Policy Enforcer Troubleshooting
SDSN Use Cases
Lab 9 Implementing SDSN
Enforcement, Monitoring, and Reporting
User Role Firewall and Integrated User Firewall Overview
User Role Firewall Implementation
Monitoring User Role Firewall
Integrated User Firewall Implementation
Monitoring Integrated User Firewall
Lab 10 Configure User Role Firewall and Integrated User Firewall
Troubleshooting Junos Security
Troubleshooting Methodology
Troubleshooting Tools
Identifying IPsec Issues
Lab 11 Performing Security Troubleshooting Techniques
Appendix A: SRX Series Hardware and Interfaces
Branch SRX Platform Overview
High End SRX Platform Overview
SRX Traffic Flow and Distribution
SRX Interfaces