Advanced Junos Security Training (AJSEC)

Print Friendly, PDF & Email

Juniper Advanced Junos Security Training (AJSEC) Course Hands-on

Learn to configure and monitor SRX Series devices while preparing for the JNCIP-SEC exam through instructor-led demonstrations and hands on Advanced Junos Security Training (AJSEC).

In this Advanced Junos Security Training (AJSEC) course, you will learn how to configure and monitor the advanced Junos OS security features with advanced coverage of virtualization, AppSecure, advanced Network Address Translation (NAT) deployments, Layer 2 security, and Sky ATP. This Advanced Junos Security Training (AJSEC) course uses Juniper Networks SRX Series Services Gateways for the hands-on component and is based on Junos OS Release 15.1X49-D70.3 and Junos Space Security Director 16.1.

Duration: 5 days

Advanced Junos Security Training (AJSEC) Related Courses

Customize It

• If you are familiar with some aspects of this Advanced Junos Security Training (AJSEC) course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Advanced Junos Security Training (AJSEC) course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Advanced Junos Security Training (AJSEC) course in manner understandable to lay audiences.

Audience / Target Group

• This Advanced Junos Security Training (AJSEC) course benefits individuals responsible for implementing, monitoring, and troubleshooting Junos security components.

Advanced Junos Security Training (AJSEC) - Prerequisites:

• Students should have a strong level of TCP/IP networking and security knowledge.
• Introduction to the Junos Operating System (IJOS)
• Junos Security (JSEC)

Advanced Junos Security Training (AJSEC) - Objectives:

After completing this Advanced Junos Security Training (AJSEC) course, attendees will be able to:

• Various forms of security supported by the Junos OS
• Implement features of the AppSecure suite, including AppID, AppFW, AppTrack, AppQoS, and SSL
• Proxy
• Configure custom application signatures
• Junos security handling at Layer 2 versus Layer 3
• Implement next generation Layer 2 security features
• Logical Systems (LSYS)
• Use Junos debugging tools to analyze traffic flows and identify traffic processing patterns and problems
• Junos routing instance types used for virtualization
• Implement virtual routing instances in a security setting
• Configure route sharing between routing instances using logical tunnel interfaces
• Utilize Junos tools for troubleshooting Junos security implementations
• Perform successful troubleshooting of some common Junos security issues
• Sky ATP and its function in the network
• Configure UTM functions
• IPS and its function in the network
• Implement IPS policy
• Implement SDSN in a network
• Implement user role firewall in a network
• Demonstrate the understanding of integrated user firewall

Advanced Junos Security Training (AJSEC) - Course Content:

Chapter 1: Course Introduction

Chapter 2: Junos Layer 2 Packet Handling and Security Features
Transparent Mode Security
Secure Wire
Layer 2 Next Generation Ethernet Switching
Lab 2: Implementing Layer 2 Security

Chapter 3: Virtualization

Virtualization Overview
Routing Instances
Logical Systems
Lab 3: Implementing Junos Virtual Routing

Chapter 4: AppSecure Theory

AppSecure Overview
AppID Overview
AppID Techniques
Application System Cache
Custom Application Signatures

Chapter 5: AppSecure Implementation

SSL Proxy
Lab 4: Implementing AppSecure

Chapter 6: Working with Log Director

Log Director Overview
Log Director Components
Installing and setting up Log Director
Clustering with the Log Concentrator VM
Administrating Log Director
Lab 5: Deploying Log Director

Chapter 7: Sky ATP Theory

Sky ATP Overview
Monitoring Sky ATP
Analysis and Detection of Malware

Chapter 8: Sky ATP Implementation

Configuring Sky ATP
Installing Sky ATP
Analysis and detection of Malware
Infected Host Case Study
Lab 6: Instructor Led Sky ATP Demo

Chapter 9: Implementing UTM

UTM Overview
Content and Web Filtering
Lab 7: Implementing UTM

Chapter 10: Introduction to IPS

IPS Overview
Network Asset Protection
Intrusion Attack Methods
Intrusion Prevention Systems
IPS Inspection Walkthrough

Chapter 11: IPS Policy and Configuration

SRX IPS Requirements
IPS Operation Modes
Basic IPS Policy Review
IPS Rulebase Operations
Lab 8: Implementing Basic IPS Policy

Chapter 12: SDSN

SDSN Overview
SDSN Components
SDSN Configuration
Policy Enforcer Troubleshooting
SDSN Use Cases
Lab 9: Implementing SDSN

Chapter 13: Enforcement, Monitoring, and Reporting

User Role Firewall and Integrated User Firewall Overview
User Role Firewall Implementation
Monitoring User Role Firewall
Integrated User Firewall Implementation
Monitoring Integrated User Firewall
Lab 10: Configure User Role Firewall and Integrated User Firewall

Chapter 14: Troubleshooting Junos Security

Troubleshooting Methodology
Troubleshooting Tools
Identifying IPsec Issues
Lab 11: Performing Security Troubleshooting Techniques

Appendix A: SRX Series Hardware and Interfaces

Branch SRX Platform Overview
High End SRX Platform Overview
SRX Traffic Flow and Distribution
SRX Interfaces

Request More Information

Time Frame: 0-3 Months4-12 Months