Juniper Security (JSEC)
- Course Code JUN_JSEC
- Duration 4 days
Course Delivery
Jump to:
Course Delivery
This course is available in the following formats:
-
Public Classroom
Traditional Classroom Learning
-
Virtual Learning
Learning that is virtual
Request this course in a different delivery format.
Course Overview
TopThis four-day, intermediate-level course provides students with the knowledge required to work with Juniper Connected Security devices. This course uses Junos CLI, Junos Space® Security Director. The course provides further instruction on how Juniper Networks approaches a complete security solution for current and future security problems, called Juniper Connected Security. Key topics include tasks for intrusion detection and prevention (IDP) rules and custom attack objects, IPSec VPNs, Security Director management, Juniper® Advanced Threat Prevention management (ATP) Cloud management, Policy Enforcer management, Identity aware security policies, Secure Sockets Layer (SSL) Proxy configuration, and Juniper Networks® SRX Series Firewalls high availability configuration and troubleshooting. Through demonstrations and hands-on labs, students will gain experience with the features of each of these devices.
Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 24.2R1, Junos Space 23.1R1, Security Director 23.1R1, and JIMS 1.7.0R2.
Course Schedule
Top-
- Delivery Format: Virtual Learning
- Date: 23-26 February, 2026 | 9:00 AM to 5:00 PM
- Location: Virtual (GMT Standa)
- Language: English
-
- Delivery Format: Virtual Learning
- Date: 11-14 May, 2026 | 9:00 AM to 5:00 PM
- Location: Virtual (GMT Standa)
- Language: English
-
- Delivery Format: Virtual Learning
- Date: 14-17 September, 2026 | 9:00 AM to 5:00 PM
- Location: Virtual (GMT Standa)
- Language: English
-
- Delivery Format: Virtual Learning
- Date: 09-12 November, 2026 | 9:00 AM to 5:00 PM
- Location: Virtual (GMT Standa)
- Language: English
Target Audience
TopIndividuals responsible for security operations using Juniper Networks security solutions, including network engineers, security engineers, administrators, support personnel, and resellers.
Course Objectives
TopAfter successfully completing this course, you should be able to:
- Explain the basics of intrusion detection.
- Explain the function of SSL Proxy.
- Explain IPsec VPN concepts.
- Implement site-to-site IPsec VPNs.
- Implement Juniper® Secure Connect.
- Implement identity-aware security policies.
- Explain Security Director.
- Introduce Policy Enforcer.
- Describe the Juniper ATP Cloud Anti-Malware.
- Describe the Juniper ATP Cloud features.
Course Content
TopDAY 1
Module 1: Implementing Intrusion Detection and Prevention
- Describe the purpose of IDP
- Utilize and update the IDP signature database
- Configure an IDP policy
- Utilize and configure an IDP policy using a template
- Monitor IDP operations
Lab 1: Implementing IDP
Module 2: Implementing SSL Proxy
- Explain why SSL proxy is necessary
- Describe and configure client-protection SSL proxy
- Describe and configure server-protection SSL proxy
- Discuss how to monitor SSL proxy
- Explain the SSL mirror decrypt feature
Lab 2: Implementing SSL Proxy
Module 3: IPsec VPN Concepts
- Identify various types of VPNs
- Describe IPsec VPNs and their functionalities
- Describe how IPsec VPNs are established
- Describe IPsec traffic processing
Module 4: Implementing Site-to-Site IPsec VPNs
- Describe the high-level configuration options for an IPsec VPN
- Describe the functionality of proxy IDs and traffic selectors
- Configure an IPsec site-to-site VPN
- Monitor a site-to-site IPsec VPN
Lab 3: Implementing Site-to-Site IPsec VPNs
DAY 2
Module 5: Implementing Juniper Secure Connect
- Describe Juniper Secure Connect features
- Explain Juniper Secure Connect UI options
- Configure Juniper Secure Connect on SRX Series devices
- Connect Juniper Secure Connect Client
Lab 4: Implementing Juniper Secure Connect
Module 6: Implementing Identity Aware Security Policies
- Describe identity-aware firewall and list supported identity sources
- Describe Active Directory as identity source
- Configure Active Directory as identity source
- Describe Juniper Identity Management Service
- Explain how to install Juniper Identity Management Service
- Configure Juniper Identity Management Service
- Describe how to troubleshoot Juniper Identity Management Service
Lab 5: Implementing Identity Aware Security Policies
Module 7: Introducing Security Director
- Explain the benefits of Security Director
- Explain Security Director deployment options
- Demonstrate how to access and use the Security Director UI
- Demonstrate how to onboard a device
- Demonstrate how to manage security policies
- Demonstrate how to deploy and validate configuration changes
Lab 6: Using Security Director
DAY 3
Module 8: Introducing Policy Enforcer
- Explain the benefits of Policy Enforcer
- Explain how to configure a secure fabric
- Describe how infected host remediation occurs
Module 9: Implementing Juniper ATP Cloud Anti-Malware
- Describe Juniper ATP Cloud anti-malware capabilities
- Describe the Juniper ATP Cloud Web UI options
- Configure the SRX Series Firewall to use Juniper ATP Cloud anti-malware
- Discuss a Juniper ATP Cloud anti-malware case study
Lab 7: Enrolling Devices in Juniper ATP Cloud
Module 10: Implementing Juniper ATP Cloud Features
- Explain Security Intelligence
- Describe Encrypted Traffic Insights
- Describe Adaptive Threat Profiling
- Explain IoT Security
Lab 8: Implementing ATP Cloud Features
DAY 4
Module 11: Understanding Chassis Cluster Concepts
- Describe why customers implement a chassis cluster
- Identify chassis cluster components
- Describe the causes of failover
Module 12: Implementing a Chassis Cluster
- Configure a chassis cluster
- Explain additional chassis cluster configuration options
Lab 9: Implementing a Chassis Cluster
Module 13: Troubleshooting a Chassis Cluster
- Troubleshoot a chassis cluster
- Explain the chassis cluster case studies
Lab 10: Troubleshooting a Chassis Cluster
SELF-STUDY MODULE
Module 14: Explain Junos OS Routing Fundamentals
- Explain the difference between directly connected, static, and dynamic routes
- Explain how route preference determines the active route to a destination
- Demonstrate how to display and examine the inet.0 and inet6.0 routing tables
- Configure and validate static routing
- Explain the flow process
Course Prerequisites
Top• Basic networking knowledge
• Understanding of the OSI reference model and the TCP/IP protocol suite
• Completion of the Introduction to Juniper Security course
Test Certification
TopJNCIS-SEC exam topics are based on the content of the recommended instructor-led training courses, as well as the additional resources.
• Exam code: JN0-335
• Written exam
• Administered by Pearson VUE
• Exam length: 90 minutes
• Exam type: 65 multiple-choice questions
• Pass/fail status is available immediately
• Junos OS 22.3
The JNCIS-SEC certification is valid for three years.
Follow on Courses
TopAdvanced Juniper Security (AJSEC)
Further Information
TopDelegates will receive an official set of e-kit courseware approximately 1 week prior to the start of the course.