Got a Question?     Call 1800-8892-877

Juniper Security (JSEC)

This five-day course is designed to provide students with the knowledge required to work with Juniper Connected Security devices. This course uses Junos CLI, Security Directory, J-Web, and other Web user interfaces to introduce students to Juniper Connected Security devices. The
course provides further instruction on how Juniper Networks approaches a complete security solution for current and future security problems, called Juniper Connected Security. Key topics include tasks for advanced security policies, application-layer security using the AppSecure suite,
intrusion prevention system (IPS) rules and custom attack objects, Security Director management, Juniper Advanced Threat Prevention (ATP) Cloud management, Juniper ATP Appliance management, Juniper Secure Analytics (JSA) management, Policy Enforcer management, Juniper Identity Management Service (JIMS), vSRX and cSRX usage, SSL Proxy configuration, and SRX high availability configuration and troubleshooting. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 22.1R2, Junos Space 22.2R1, Security Director 22.2R1, JATP 5.0.6.0, JSA v7.3.2, Policy
Enforcer 22.2R1, and JIMS 1.1.5R1.

Show More

Virtual Classroom Live

Prerequisites

• Basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite• Successful completion of the Introduction to Juniper Security (IJSEC) course

Target Audience

  • Benefits individuals responsible for security operations using Juniper Networks security
  • solutions, including network engineers, security engineers, administrators, support personnel, and resellers.
What You’ll Learn
  • • Identify security challenges in today’s networks.
  • • Identify products that are incorporated into the Juniper Connected Security solution.
  • • Explain the value of implementing security solutions.
  • • Explain how Juniper Connected Security solves the cyber security challenges of the future.
  • • Explain SRX Series session management.
  • • Explain Junos ALG functions and when to use them.
  • • Describe policy logging on the SRX series device.
  • • Explain security policy scheduling.
  • • Describe application security theory.
  • • Explain application signature usage in AppID.
  • • Describe the AppTrack service.
  • • Describe the AppFW service.
  • • Describe the AppQoS service.
  • • Configure security policies using the AppSecure suite of services.
  • • Explain unified security policies.
  • • Describe IPS signatures.
  • • Configure an IPS policy using pre-defined templates.
  • • Describe how to update the IPS attack object database.
  • • Describe IPS rules and rule bases.
  • • Configure custom attack objects.
  • • Describe Junos Space and Security Director.
  • • Configure policy management using Security Director.
  • • Describe Security Director objects.
  • • Explain the different licensing options for Sky ATP
  • • List Sky ATP’s features and benefits.
  • • Configure Sky ATP profiles and enroll an SRX Series device.
  • • Configure file scanning on Sky ATP.
  • • Configure Sky ATP to scan email
  • • Configure GeoIP on Sky ATP.
  • • Describe the JATP features and benefits
  • • List the JATP device options.
  • • Explain the JATP architecture.
  • • List 3rd party support options for JATP.
  • • Explain JATP SmartCore analytics processes.
  • • Describe Policy Enforcer configuration options.
  • • Describe Policy Enforcer integration with Sky ATP.
  • • Configure Policy Enforcer to block lateral malware movement.
  • • Explain Juniper Secure Analytics features and benefits.
  • • Describe JSA log collection.
  • • Describe JSA network flow collection.
  • • Describe the JSA Offense Management workspace.
  • • Explain the JSA Risk Manager features.
  • • Configure JSA to collect network and log collection.
  • • Explain the features of JIMS.
  • • Describe JIMS integration into the current AD network.
  • • Describe the Sky Enterprise service and how it can save resources.
  • • Explain the Sky Enterprise monitoring service.
  • • Explain the vSRX Series device benefits.
  • • Describe use cases for the vSRX.
  • • Explain the cSRX Series device benefits.
  • • Describe use cases for the cSRX.
  • • Describe SSL Proxy Concepts.
  • • Explain Forward and Reverse Proxy and the limitations of each.
  • • Configure both Forward and Reverse Proxy.
  • • Troubleshoot SSL Proxy configurations.
  • • Explain how to cluster the SRX Series.
  • • Describe chassis cluster interfaces.
  • • Explain advanced chassis clustering options.
  • • Configure chassis clustering on the vSRX.
  • • Troubleshoot chassis clustering on the vSRX.
Course Outline
Labs Outline
Related Certifications

Explain the function of SSL Proxy.
• Explain how application security theory works.
• Discuss in depth the AppSecure modules.
• Describe unified security policies.
• Review the different security policy options.
• Explain the basics of intrusion detection.
• Describe the Juniper ATP Cloud solutions.
• Describe the ATP Cloud features.
• Introduce Security Director.
• Explain the purpose of Policy Enforcer.
• Examine the different virtualized SRX instances.
• Describe the Juniper Identity Management Service.
• Explain chassis cluster concepts.
• Explain how to set up a chassis cluster.
• Review troubleshooting steps for chassis clusters.
• Explain Juniper ATP Appliance components.
• Explain how to set up a Juniper ATP Appliance.
• Explain how the Juniper Secure Analytics device works.