Junos Unified Threat Management (JUTM)

Overview

Junos Unified Threat Management (JUTM) is an intermediate-level course that includes detailed coverage of Web filtering, antivirus (AV), antispam, and content filtering. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Unified Threat Management (UTM) features of the Junos operating system. This course is based on the Junos OS Release 12.1X47-D30.4.

Audience : This course benefits individuals responsible for implementing and monitoring the UTM features available on branch SRX Services Gateways and J Series Services Routers.

This course prepares you for Exam JN0-332. Download Course Contents
Schedule & Prices
Course Details Schedule
Classroom Training*
Duration : 2 Days
Fee : Dubai : USD 1,800 Sydney : USD 1,800 London : USD 1,700 India : USD 1,300
March
02-03 (Delhi)
08-09 (Dubai)
09-10 (Bangalore)
16-17 (Chennai)
April
13-14 (Bangalore)
20-21 (Chennai)
May
18-19 (Chennai)
July
06-07 (Delhi)
12-13 (Dubai)
13-14 (Bangalore)
20-21 (Chennai)
Instructor-Led Online Training
Duration : 2 Days
Fee : USD 1,200 (1-on-1)†
March
02-03
08-09
09-10
16-17
April
13-14
20-21
May
18-19
July
06-07
12-13
13-14
20-21
Fly-Me-a-Trainer
Duration : 2 Days
Fee : On Request
Client's Location
As per mutual convenience

Enquire Now




Input symbols

Course Prerequisites

  • Basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) model and the TCP/IP protocol suite. 
  • Students should also attend the Introduction to the Junos Operating System (IJOS), Junos Routing Essentials (JRE), and Junos Security (JSEC) courses prior to attending this class.


Upon Completion of this Course, you will accomplish following:-

  • Describe the challenges that branch offices present to network managers.
  • List the major features that UTM offers.
  • Explain how each major feature addresses the challenges of the branch office.
  • List the SRX Series Services Gateways hardware devices on which UTM is available.
  • Describe the UTM features that require specific licenses.
  • Define terms used in the creation of effective antispam UTM policies.
  • Describe the process by which UTM examines traffic for spam.
  • Describe the overall process of configuring an antispam UTM policy.
  • Describe the kinds of information available from the device when it has detected spam.
  • Describe how the AV process examines traffic.
  • Describe the differences between full file-based AV versus express AV.
  • Describe the settings that are required for configuring AV protection.
  • Explain how these settings affect scanning performance and effectiveness.
  • Describe options available for scanning supported protocols.
  • List the general steps required to configure AV.
  • Describe the statistical information available to verify AV functionality.
  • Describe content and Web filtering and their purpose.
  • List and describe each of the parameters used when configuring Web and content filtering
  • Describe in general terms the steps necessary to configure web and content filtering.
  • Monitor Web and content filtering.
)