Junos Security (JSEC) – Outline

Detailed Course Outline

Day 1- Course Introduction- SSL Proxy

  • Explain why SSL proxy is necessary
  • Describe and configure client-protection SSL proxy
  • Describe and configure server-protection SSL proxy
  • Discuss how to monitor SSL proxy
  • Explain SSL mirror decrypt feature
  • Lab 1: SSL Proxy Client Protection

Application Security Theory

  • Describe the functionality of the AppSecure suite
  • Explain how application identification works
  • Describe how to create custom application signatures
  • Explain the purpose of the application system cache

Application Security Implementation

  • Discuss in depth the AppSecure modules
  • Lab 2: Implementing AppSecure

Unified Security Policies

  • Explain unified security policy evaluation
  • Explain URL Category options
  • Lab 3: Unified Security Policies

Day 2- Security Policy Options

  • Explain session management options
  • Explain Junos ALG functionality
  • Implement policy scheduling
  • Explain logging
  • Lab 4: Security Policy Options

Intrusion Detection and Prevention

  • Describe the purpose of IPS
  • Utilize and update the IPS signature database
  • Configure IPS policy
  • Utilize and configure IPS policy using a template
  • Monitor IPS operations Lab 5: IPS

Juniper ATP Cloud

  • Describe the Juniper ATP Cloud Web UI options
  • Configure the SRX Series Firewall to use Juniper ATP Cloud anti-malware
  • Discuss an Infected Host case study
  • Lab 6: Juniper ATP Cloud Anti-Malware

Juniper ATP Cloud Features

  • Explain Security Intelligence
  • Describe Encrypted Traffic Insights
  • Describe Adaptive Threat Profiling
  • Explain IoT Security
  • Lab 7: ATP Cloud Features

Day 3- Introduction to Security Director

  • Explain how to use Security Director
  • Describe how to configure firewall policies
  • Deploy configuration changes using Security Director
  • Lab 8: Working with Security Director

Security Director with Policy Enforcer

  • Explain how to configure a secure fabric
  • Describe how infected host remediation occurs
  • Lab 9: Configuring Juniper Connected Security

Virtual SRX and cSRX

  • Explain virtualization
  • Discuss network virtualization and software-defined networking
  • Review the virtual SRX platform
  • Review the cSRX platform
  • Deploy the virtual SRX
  • Integrate the virtual SRX with public cloud services
  • Lab 10: vSRX Implementation

Juniper Identity Management Service

  • Explain how to install Juniper Identity Management Service
  • Configure Juniper Identity Management Service
  • Describe troubleshooting Juniper Identity Management Service
  • Lab 11: Juniper Identity Management Service

Day 4- Chassis Cluster Concepts

  • Describe chassis clusters
  • Identify chassis cluster components
  • Describe chassis cluster operation

Chassis Cluster Implementation

  • Configure chassis clusters
  • Describe advanced chassis cluster options
  • Lab 12: Implementing Chassis Clusters

Chassis Cluster Troubleshooting

  • Troubleshoot chassis clusters
  • Review chassis cluster case studies

Lab 13: Troubleshooting Chassis Clusters Day 5- Juniper ATP Appliance—Overview

  • Explain the Cyber Kill Chain model
  • Define deployment models for Juniper ATP Appliance

Implementing Juniper ATP Appliance

  • Describe how to configure an SRX Series device with ATP Appliance
  • Describe how to mitigate a threat with the ATP Appliance Web UI
  • Demo Video: Implementing Juniper ATP Appliance

Juniper Secure Analytics

  • Describe the JSA Series device and its basic functionality
  • Define how JSA processes log activity
  • Explain how JSA processes network activity
  • Explain how to customize the processing of information
  • Lab 14: Monitoring with JSA