Course Objectives
- Identify high-level security challenges in today’s networks.
- Identify products that are incorporated into the Juniper Connected Security solution.
- Explain the value of implementing security solutions.
- Explain how Juniper Connected Security solves the cyber security challenges of the future.
- Explain the SRX Series devices and the added capabilities that next-generation firewalls provide.
- Explain traffic flows through the SRX Series devices.
- List the different security objects and how to create them.
- Describe interface types and perform basic interface configuration tasks.
- Describe the initial configuration for an SRX Series device.
- Explain security zones.
- Describe screens and their use.
- Explain address objects.
- Describe services and their use.
- Describe the purpose for security policies on an SRX Series device.
- Describe zone-based policies.
- Describe global policies and their use.
- Explain unified security policies.
- Configure unified security policies with the J-Web user interface.
- Describe IDP signatures.
- Configure an IDP policy using predefined templates with the J-Web user interface.
- Describe the use and configuration of the integrated user firewall feature.
- Describe the UTM security services
- List the available UTM services on the SRX Series device.
- Configure UTM filtering on a security policy with the J-Web user interface.
- Explain Sky ATP’s use in security.
- Describe how Sky ATP and SRX Series devices operate together in blocking threats.
- Describe NAT and why it is used.
- Explain source NAT and when to use it.
- Explain destination NAT and when to use it.
- Explain static NAT and its uses.
- Describe the operation and configuration the different types of NAT.
- Identify various types of VPNs.
- Describe IPsec VPNs and their functionality.
- Describe how IPsec VPNs are established.
- Describe IPsec traffic processing.
- Configure IPsec VPNs with the J-Web user interface.
- Describe and configure proxy IDs and traffic selectors with the J-Web user interface.
- Monitor IPsec VPNs with the J-Web user interface.
- Describe the J-Web monitoring features.
- Explain the J-Web reporting features.
- Describe the Sky Enterprise service and how it can save resources.
- Explain the functionality of Junos Space Security Director.
Who Should Attend?
Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers.
- Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
- Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
- Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
- Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
- Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
- Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.
Agenda
Module 1: COURSE INTRODUCTION
Module 2: Juniper Security Concept
- Security Challenges
- Security Design Overview
- Juniper Connected Security
Module 3: Juniper Connected Security – SRX Series Devices
- Connected Security
- Interfaces
- Initial Configuration
- LAB 1: Initial Configuration
Module 4: Security Objects
- Security Zone Objects
- Security Screen Objects
- Security Address Objects
- Security Services Objects
- LAB 2: Creating Security Objects with J-Web
Module 5: Security Policies
- Security Policy Overview
- Zone-Based Policies
- Global Security Policies
- Application Firewall with Unified Security Policies
- LAB 3: Creating Security Policies with J-Web
Module 6: Security Services – IDP and User Firewall
- IDP Security Services
- Integrated User Firewall
- LAB 4: Adding IDP and User Firewall Security Services to Security Policies
Module 7: Security Services – UTM
- Content Filtering
- Web Filtering
- Antivirus
- Antispam
- LAB 5: Adding UTM Security Services to Security Policies
Module 8: Juniper Connected Security – Sky AT
- Sky ATP Overview
- Blocking Threats
- Lab 6: Demonstrating Sky ATP
Module 9: Network Address Translation
- NAT Overview
- Source NAT
- Destination NAT
- Static NAT
- Lab 7: Implementing Network Address Translation
Module 10: IPsec VPN Concepts
- VPN Types
- Secure VPN Requirements
- IPsec Tunnel Establishment
- IPsec Traffic Processing
Module 11: Site-to-Site VPNs
- IPsec Configuration
- IPsec Site-to-Site Tunne
- Lab 8: Implementing Site-to-Site IPsec VPNs
Module 12: Monitoring and Reporting
- J-Web monitoring options
- J-Web Reporting options
- Lab 9: Using Monitoring and Reporting