Global Knowledge is now a Skillsoft company.  LEARN MORE >

Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-800-268-7737 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Introduction to Juniper Security (IJSEC)

This course is designed to provide students with the foundational knowledge required to work with SRX Series devices.

GK# 101139

Course Overview

TOP

This course will use the J-Web user interface to introduce students to the Junos operating system. The course provides a brief overview of security problems and how Juniper Networks approaches a complete security solution with Juniper Connected Security. Key topics include configuration tasks for initial system configuration, interface configuration, security object configuration, security policy configuration, IPsec VPN configuration, and NAT configuration

The course then delves into Layer 7 security using UTM, IDP, and AppSecure to provide students with the understanding of application level security to block advanced threats. An overview of Sky ATP is included for students to understand zero-day network protection technologies

Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 19.1R1.6.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

Class is Full
This session is full. Please select a different session.

What You'll Learn

TOP

After successfully completing this course, you should be able to:

  • Identify high-level security challenges in today’s networks.
  • Identify products that are incorporated into the Juniper Connected Security solution.
  • Explain the value of implementing security solutions.
  • Explain how Juniper Connected Security solves the cyber security challenges of the future.
  • Explain the SRX Series devices and the added capabilities that next-generation firewalls provide.
  • Explain traffic flows through the SRX Series devices.
  • List the different security objects and how to create them.
  • Describe interface types and perform basic interface configuration tasks.
  • Describe the initial configuration for an SRX Series device.
  • Explain security zones.
  • Describe screens and their use.
  • Explain address objects.
  • Describe services and their use.
  • Describe the purpose for security policies on an SRX Series device.
  • Describe zone-based policies.
  • Describe global policies and their use.
  • Explain unified security policies.
  • Configure unified security policies with the J-Web user interface.
  • Describe IDP signatures.
  • Configure an IDP policy using predefined templates with the J-Web user interface.
  • Describe the use and configuration of the integrated user firewall feature.
  • Describe the UTM security services
  • List the available UTM services on the SRX Series device.
  • Configure UTM filtering on a security policy with the J-Web user interface.
  • Explain Sky ATP’s use in security.
  • Describe how Sky ATP and SRX Series devices operate together in blocking threats.
  • Describe NAT and why it is used.
  • Explain source NAT and when to use it.
  • Explain destination NAT and when to use it.
  • Explain static NAT and its uses.
  • Describe the operation and configuration the different types of NAT.
  • Identify various types of VPNs.
  • Describe IPsec VPNs and their functionality.
  • Describe how IPsec VPNs are established.
  • Describe IPsec traffic processing.
  • Configure IPsec VPNs with the J-Web user interface.
  • Describe and configure proxy IDs and traffic selectors with the J-Web user interface.
  • Monitor IPsec VPNs with the J-Web user interface.
  • Describe the J-Web monitoring features.
  • Explain the J-Web reporting features.
  • Describe the Sky Enterprise service and how it can save resources.

Outline

TOP
Viewing outline for:

Virtual Classroom Live Outline

Module 1: COURSE INTRODUCTION

Module 2: Juniper Security Concept

  • Security Challenges
  • Security Design Overview
  • Juniper Connected Security

Module 3: Juniper Connected Security – SRX Series Devices

  • Connected Security
  • Interfaces
  • Initial Configuration

Module 4: Security Objects

  • Security Zone Objects
  • Security Screen Objects
  • Security Address Objects
  • Security Services Objects

Module 5: Security Policies

  • Security Policy Overview
  • Zone-Based Policies
  • Global Security Policies
  • Application Firewall with Unified Security Policies

Module 6: Security Services – IDP and User Firewall

  • IDP Security Services
  • Integrated User Firewall

Module 7: Security Services – UTM

  • Content Filtering
  • Web Filtering
  • Antivirus
  • Antispam

Module 8: Juniper Connected Security – Sky AT

  • Sky ATP Overview
  • Blocking Threats

Module 9: Network Address Translation

  • NAT Overview
  • Source NAT
  • Destination NAT
  • Static NAT

Module 10: IPsec VPN Concepts

  • VPN Types
  • Secure VPN Requirements
  • IPsec Tunnel Establishment
  • IPsec Traffic Processing

Module 11: Site-to-Site VPNs

  • IPsec Configuration
  • IPsec Site-to-Site Tunne

Module 12: Monitoring and Reporting

  • J-Web monitoring options
  • J-Web Reporting options

Labs

TOP
Viewing labs for:

Virtual Classroom Live Labs

  • LAB 1: Initial Configuration
  • LAB 2: Creating Security Objects with J-Web
  • LAB 3: Creating Security Policies with J-Web
  • LAB 4: Adding IDP and User Firewall Security Services to Security Policies
  • LAB 5: Adding UTM Security Services to Security Policies
  • Lab 6: Demonstrating Sky ATP
  • Lab 7: Implementing Network Address Translation
  • Lab 8: Implementing Site-to-Site IPsec VPNs
  • Lab 9: Using Monitoring and Reporting
  • Appendix A: SRX Series Hardware
  • Appendix D: Sky Enterprise Services
  • Appendix B: Virtual SRX
  • Appendix EJunos Space Security Director
  • Appendix CCLI Prime

Prerequisites

TOP

The following are the prerequisites for this course:

  • Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite.

Who Should Attend

TOP

The primary audiences for this course are the following:

  • Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers.
Course Delivery

This course is available in the following formats:

Virtual Classroom Live

Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 3 day

Request this course in a different delivery format.
Enroll