• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

Advanced Junos Security

Advanced Junos Security

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online or In-Person

  • You travel to organiser or they travel to you

  • Redhill

  • 5 days

  • All levels

Description

Advanced Junos Security training course description

This course provides students with intermediate routing
knowledge and configuration examples. The course
includes an overview of protocol-independent routing
features, load balancing and filter-based forwarding,
OSPF, BGP, IP tunneling, and high availability (HA)
features. Junos Intermediate Routing (JIR) is an
intermediate-level course.

What will you learn

  • Demonstrate the understanding of integrated user
    firewall.

  • Implement next generation Layer 2 security features.

  • Implement virtual routing instances in a security
    setting.

  • Utilize Junos tools for troubleshooting Junos
    security implementations.

  • Implement IPS policy.

Advanced Junos Security training course details

  • Who will benefit:

Individuals responsible for implementing, monitoring, and
troubleshooting Junos security components.

  • Prerequisites:

Intro to the Junos Operating System

  • Duration

5 days

Advanced Junos Security training course contents
  • Junos Layer 2 Packet Handling and Security Features


Transparent Mode Security

Secure Wire

Layer 2 Next Generation Ethernet Switching

MACsec
Lab 2 Implementing Layer 2 Security

  • Virtualization


Virtualization Overview

Routing Instances

Logical Systems

Lab 3 Implementing Junos Virtual Routing

  • AppSecure Theory


AppSecure Overview

AppID Overview

AppID Techniques

Application System Cache

Custom Application Signatures

  • AppSecure Implementation


AppTrack

AppFW

AppQoS

APBR

SSL Proxy

Lab 4 Implementing AppSecure

  • Working with Log Director


Log Director Overview

Log Director Components

Installing and setting up Log Director

Clustering with the Log Concentrator VM

Administrating Log Director

Lab 5 Deploying Log Director

  • Sky ATP Theory


Sky ATP Overview

Monitoring Sky ATP

Analysis and Detection of Malware

  • Sky ATP Implementation


Configuring Sky ATP

Installing Sky ATP

Analysis and detection of Malware

Infected Host Case Study

Lab 6 Instructor Led Sky ATP Demo

  • Implementing UTM


UTM Overview

AntiSpam

AntiVirus

Content and Web Filtering

Lab 7 Implementing UTM

  • Introduction to IPS


IPS Overview

Network Asset Protection

Intrusion Attack Methods

Intrusion Prevention Systems

IPS Inspection Walkthrough

IPS Policy and Configuration

SRX IPS Requirements

IPS Operation Modes

Basic IPS Policy Review

IPS Rulebase Operations

Lab 8 Implementing Basic IPS Policy

  • SDSN


SDSN Overview, Components & Configuration

Policy Enforcer Troubleshooting

SDSN Use Cases

Lab 9 Implementing SDSN

  • Enforcement, Monitoring, and Reporting


User Role Firewall and Integrated User Firewall Overview

User Role Firewall Implementation

Monitoring User Role Firewall

Integrated User Firewall Implementation

Monitoring Integrated User Firewall

Lab 10 Configure User Role Firewall and Integrated User Firewall

  • Troubleshooting Junos Security


Troubleshooting Methodology

Troubleshooting Tools

Identifying IPsec Issues

Lab 11 Performing Security Troubleshooting Techniques

  • Appendix A: SRX Series Hardware and Interfaces


Branch SRX Platform Overview

High End SRX Platform Overview

SRX Traffic Flow and Distribution

SRX Interfaces

About The Provider

Tags

Reviews