Introduction to Juniper Security (IJSEC) Training

Introduction to Juniper Security (IJSEC) Certification Training Course Overview

Enroll for this 3-day course from Koenig Solutions which provides students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. The course provides a brief overview of security problems and how Juniper Networks approaches a complete security solution with Juniper Connected Security. Key topics include configuration tasks for initial system configuration, interface configuration, security object configuration, security policy configuration, IPsec VPN configuration, and NAT configuration. The course then delves into Layer 7 security using UTM, IDP, and AppSecure to provide students with the understanding of application-level security to block advanced threats. An overview of Sky ATP is included for students to understand zero-day network protection technologies. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 19.1R1.6.
 
Target Audience:
Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers.
 
Learning Objectives:
  • Identify high-level security challenges in today’s networks.
  • Identify products that are incorporated into the Juniper Connected Security solution.
  • Explain the value of implementing security solutions, how Juniper Connected Security solves the cyber security challenges of the future, the SRX Series devices and the added capabilities that next-generation firewalls provide.
  • Explain traffic flows through the SRX Series devices.
  • List the different security objects and how to create them.
  • Describe interface types and perform basic interface configuration tasks and the initial configuration for a SRX Series device.
  • Explain security zones.
  • Describe screens and their use, services and their use.
  • Explain address objects.
  • Describe the purpose for security policies on an SRX Series device, zone-based policies and global policies and their use.
  • Explain unified security policies.
  • Configure unified security policies with the J-Web user interface.
  • Describe IDP signatures, the use and configuration of the integrated user firewall feature and the UTM security services.
  • Configure an IDP policy using predefined templates with the J-Web user interface.
  • List the available UTM services on the SRX Series device.
  • Configure UTM filtering on a security policy with the J-Web user interface.
  • Explain Sky ATP’s use in security.
  • Describe how Sky ATP and SRX Series devices operate together in blocking threats, NAT and why it is used.
  • Explain source NAT and when to use it, destination NAT and when to use it and static NAT and its uses.
  • Describe the operation and configuration the different types of NAT.
  • Identify various types of VPNs.
  • Describe IPsec VPNs and their functionality, how IPsec VPNs are established and IPsec traffic processing.
  • Configure IPsec VPNs with the J-Web user interface.
  • Describe and configure proxy IDs and traffic selectors with the J-Web user interface.
  • Monitor IPsec VPNs with the J-Web user interface.
  • Describe the J-Web monitoring features.
  • Explain the J-Web reporting features.
  • Describe the Sky Enterprise service and how it can save resources.
  • Explain the functionality of Junos Space Security Director.

Introduction to Juniper Security (IJSEC) Training (Duration : 24 Hours) Download Course Contents

Live Virtual Classroom Fee On Request
Group Training
15 - 17 Nov GTR 09:00 AM - 05:00 PM CST
(8 Hours/Day)

06 - 08 Dec 09:00 AM - 05:00 PM CST
(8 Hours/Day)

1-on-1 Training (GTR)
4 Hours
8 Hours
Week Days
Weekend

Start Time : At any time

12 AM
12 PM

GTR=Guaranteed to Run
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Special Solutions for Corporate Clients! Click here
Hire Our Trainers! Click here

Request More Information

Course Prerequisites
  • Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite.