> > > JSEC Detailed outline

Junos Security (JSEC)

Course Description Schedule Course Outline

Detailed Course Outline

Day 1

Chapter 1: Course Introduction

Chapter 2: Introduction to Junos Security

  • Traditional Routing
  • Traditional Security
  • The Junos OS Architecture

Chapter 3: Zones

  • The Definition of Zones
  • Zone Configuration
  • Monitoring Security Zones
  • Screen Options

Lab 1: Configuring and Monitoring Zones

Chapter 4: Security Policies

  • Security Policy Overview
  • Policy Components
  • Verifying Policy Operation
  • Policy Case Study

Lab 2: Security Policies

Day 2

Chapter 5: Advanced Policy Options

  • Session Management
  • Junos ALGs
  • Policy Scheduling
  • Logging

Chapter 6: Troubleshooting Security Zones and Policies

  • Troubleshoot Security Zones
  • Troubleshoot Security Policies
  • Case Studies

Lab 3: Troubleshooting Security Zones and Policies

Chapter 7: Network Address Translation

  • NAT Overview
  • Source NAT Operation and Configuration
  • Destination NAT Operation and Configuration
  • Static NAT Operation and Configuration
  • Proxy ARP
  • Monitoring and Verifying NAT Operation

Lab 4: Network Address Translation

Day 3

Chapter 8: Advanced NAT Concepts

  • NAT Interaction with Policy and ALGs
  • DNS Doctoring
  • Cone NAT
  • Multi-Tenant NAT
  • IPv4-to-IPv6 NA
  • Advanced NAT Scenarios

Lab 5: Advanced NAT Implementations

Chapter 9: IPsec VPN Concepts

  • VPN Types
  • Secure VPN Requirements
  • IPsec Overview
  • IPsec Details

Chapter 10: IPsec VPN Implementation

  • Configuration of IPsec VPNs
  • IPsec VPN Case Studies
  • Monitoring IPsec VPN
  • Traffic Selectors

Lab 6: Implementing IPsec VPNs

Day 4

Chapter 11: Group VPNs

  • Group VPN Overview
  • GDOI Protocol
  • Group VPN Configuration and Monitoring

Lab 7: Implementing Group VPNs

Chapter 12: ADVPNs

  • ADVPN Overview
  • ADVPN Member Roles
  • Shortcut Termination
  • Routing with ADVPNs
  • IKEv2
  • ADVPN Implementation

Lab 8: Implementing ADVPNs

Chapter 13: IPsec VPN Case Studies and Solutions

  • Routing over VPNs
  • NAT with IPsec
  • Enterprise VPN Deployment Best Practices

Lab 9: Implementing Routing over VPN Tunnels and IPsec Best Practices

Chapter 14: Troubleshooting IPsec

  • IKE Phase 1 Troubleshooting
  • IKE Phase 2 Troubleshooting
  • Case Studies

Lab 10: Troubleshooting IPsec

Day 5

Chapter 15: Virtualized SRX

  • vSRX Overview
  • Installation of vSRX
  • Chassis Clustering
  • Deployment Scenarios and Use Cases
  • Automated Deployments Options
  • AWS Deployment Scenarios

Chapter 16: High Availability Clustering Theory

  • High Availability Overview
  • Chassis Cluster Components
  • Advanced Chassis Cluster Topics

Chapter 17: High Availability Clustering Implementation

  • Chassis Cluster Configuration
  • Chassis Cluster Monitoring
  • Advanced Chassis Cluster Topics

Lab 12: Implementing High Availability Techniques

Chapter 18: Troubleshooting Chassis Clusters

  • Chassis Cluster Troubleshooting
  • Case Studies
  • IDP Policy Components and Configuration

Lab 13: Troubleshooting Chassis Clusters

Appendix A: SRX Series Hardware and Interfaces

  • Branch SRX Platform Overview
  • High-End SRX Platform Overview
  • SRX Traffic Flow and Distribution
  • SRX Interfaces
 

Accessing our website tells us you are happy to receive all our cookies. However you can change your cookie settings at any time. Find out more.   Got it!