Ijsec 1.0
Ijsec 1.0
Ijsec 1.0
Beschrijving:
This 3-day course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will
use the J-Web user interface to introduce students to the Junos operating system. The course provides a brief overview of security problems
and how Juniper Networks approaches a complete security solution with Juniper Connected Security. Key topics include configuration tasks for
initial system configuration, interface configuration, security object configuration, security policy configuration, IPsec VPN configuration, and
NAT configuration.
The course then delves into Layer 7 security using UTM, IDP, and AppSecure to provide students with the understanding of application-level
security to block advanced threats. An overview of Sky ATP is included for students to understand zero-day network protection technologies.
Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic
device operations.
Doelgroep:
Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers.
Doelstelling:
After completing this course you should be able to: Describe the UTM security services
Identify high-level security challenges in today’s networks List the available UTM services on the SRX Series device
Identify products that are incorporated into the Juniper Configure UTM filtering on a security policy with the J-Web user
Connected Security solution interface
Explain the value of implementing security solutions Explain Sky ATP’s use in security
Explain how Juniper Connected Security solves the cyber Describe how Sky ATP and SRX Series devices operate together in
security challenges of the future blocking threats
Explain the SRX Series devices and the added capabilities that Describe NAT and why it is used
next-generation firewalls provide
Explain source NAT and when to use it
Explain traffic flows through the SRX Series devices
Explain destination NAT and when to use it
List the different security objects and how to create them
Explain static NAT and its uses
Describe interface types and perform basic interface
configuration tasks Describe the operation and configuration the different types of NAT
Describe the initial configuration for an SRX Series device Identify various types of VPNs
Describe screens and their use Describe how IPsec VPNs are established
Describe services and their use Configure IPsec VPNs with the J-Web user interface
Describe the purpose for security policies on an SRX Series Describe and configure proxy IDs and traffic selectors with the
device J-Web user interface
Describe zone-based policies Monitor IPsec VPNs with the J-Web user interface
Configure unified security policies with the J-Web user interface Describe the Sky Enterprise service and how it can save resources
Describe IDP signatures Explain the functionality of Junos Space Security Director
Students should have basic networking knowledge and an JN0-230 - Security AssociateExam (JNCIA-SEC)
understanding of the Open Systems Interconnection (OSI)
reference model and the TCP/ IP protocol suite
Cursusinhoud:
Course Introduction Security Services - IDP and User Firewall Site-to-Site VPNs
line line line
IDP Security Services IPsec Configuration
Juniper Security Concepts Integrated User Firewall IPsec Site-to-Site Tunnel
line LAB 4: Adding IDP and User Firewall Lab 8: Implementing Site-to-Site IPsec
Security Challenges Security Services to Security Policies VPNs
Security Design Overview
Juniper Connected Security Security Services – UTM Monitoring and Reporting
line line
Juniper Connected Security – SRX Series Content Filtering J-Web monitoring options
Devices Web Filtering J-Web Reporting options
line Antivirus Lab 9: Using Monitoring and Reporting
Connected Security Antispam
Interfaces LAB 5: Adding UTM Security Services to Appendices
Initial Configuration Security Policies line
LAB 1: Initial Configuration Appendix A: SRX Series Hardware
Juniper Connected Security – Sky ATP Appendix B: Virtual SRX
Security Objects line Appendix C: CLI Primer
line Sky ATP Overview Appendix D: Sky Enterprise Services
Security Zone Objects Blocking Threats Appendix E: Junos Space Security
Security Screen Objects Lab 6: Demonstrating Sky ATP Director
Security Address Objects
Security Services Objects Network Address Translation
LAB 2: Creating Security Objects with line
J-Web NAT Overview
Source NAT
Security Policies Destination NAT
line Static NAT
Security Policy Overview Lab 7: Implementing Network Address
Zone-Based Policies Translation
Global Security Policies
Application Firewall with Unified Security IPsec VPN Concepts
Policies line
LAB 3: Creating Security Policies with VPN Types
J-Web Secure VPN Requirements
IPsec Tunnel Establishment
IPsec Traffic Processing