> > > AJSEC Detailed outline

Advanced Junos Security (AJSEC)

Course Description Schedule Course Outline

Detailed Course Outline

Day 1

Chapter 1: Course Introduction

Chapter 2: Junos Layer 2 Packet Handling and Security Features

  • Transparent Mode Security
  • Secure Wire
  • Layer 2 Next Generation Ethernet Switching
  • MACsec

Lab 2: Implementing Layer 2 Security

Chapter 3: Virtualization

  • Virtualization Overview
  • Routing Instances
  • Logical Systems

Lab 3: Implementing Junos Virtual Routing

Chapter 4: AppSecure Theory

  • AppSecure Overview
  • AppID Overview
  • AppID Techniques
  • Application System Cache
  • Custom Application Signatures

Day 2

Chapter 5: AppSecure Implementation

  • AppTrack
  • AppFW
  • AppQoS
  • APBR
  • SSL Proxy

Lab 4: Implementing AppSecure

Chapter 6: Working with Log Director

  • Log Director Overview
  • Log Director Components
  • Installing and setting up Log Director
  • Clustering with the Log Concentrator VM
  • Administrating Log Director

Lab 5: Deploying Log Director

Day 3

Chapter 7: Sky ATP Theory

  • Sky ATP Overview
  • Monitoring Sky ATP
  • Analysis and Detection of Malware

Chapter 8: Sky ATP Implementation

  • Configuring Sky ATP
  • Installing Sky ATP
  • Analysis and detection of Malware
  • Infected Host Case Study

Lab 6: Instructor Led Sky ATP Demo

Chapter 9: Implementing UTM

  • UTM Overview
  • AntiSpam
  • AntiVirus
  • Content and Web Filtering

Lab 7: Implementing UTM

Day 4

Chapter 10: Introduction to IPS

  • IPS Overview
  • Network Asset Protection
  • Intrusion Attack Methods
  • Intrusion Prevention Systems
  • IPS Inspection Walkthrough

Chapter 11: IPS Policy and Configuration

  • SRX IPS Requirements
  • IPS Operation Modes
  • Basic IPS Policy Review
  • IPS Rulebase Operations

Lab 8: Implementing Basic IPS Policy

Day 5

Chapter 12: SDSN

  • SDSN Overview
  • SDSN Components
  • SDSN Configuration
  • Policy Enforcer Troubleshooting
  • SDSN Use Cases

Lab 9: Implementing SDSN

Chapter 13: Enforcement, Monitoring, and Reporting

  • User Role Firewall and Integrated User Firewall Overview
  • User Role Firewall Implementation
  • Monitoring User Role Firewall
  • Integrated User Firewall Implementation
  • Monitoring Integrated User Firewall

Lab 10: Configure User Role Firewall and Integrated User Firewall

Chapter 14: Troubleshooting Junos Security

  • Troubleshooting Methodology
  • Troubleshooting Tools
  • Identifying IPsec Issues

Lab 11: Performing Security Troubleshooting Techniques

Appendix A: SRX Series Hardware and Interfaces

  • Branch SRX Platform Overview
  • High End SRX Platform Overview
  • SRX Traffic Flow and Distribution
  • SRX Interfaces
 

Accessing our website tells us you are happy to receive all our cookies. However you can change your cookie settings at any time. Find out more.   Got it!