Juniper Networks Certification Specialist Security Bootcamp, JSEC and JUTM (JNCIS-SEC BC)

Our classes are always live and instructor led from our Exton, PA or EPIC Partner locations. Springhouse AnywhereLive options require Internet Access. Select classes are Guaranteed to Run (GTR). View our complete schedule policies.

 

 

 

 

Overview

JUNOS SECURITY (JSEC) COURSE OVERVIEW
This course covers the configuration, operation, and implementation of SRX Series Services Gateways in a typical network environment. Key topics within this course include security technologies such as security zones, security policies, intrusion detection and prevention (IDP), Network Address Translation (NAT), and high availability clusters, as well as details pertaining to basic implementation, configuration, and management.

Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring device operations. This course uses Juniper Networks SRX Series Services Gateways for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS.


JUNOS UNIFIED THREAT MANAGEMENT (JUTM) COURSE OVERVIEW
This course includes detailed coverage of Web filtering, antivirus (AV), antispam, and content filtering. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Unified Threat Management (UTM) features of the Junos operating system.

Intended Audience

JUNOS SECURITY (JSEC) TARGET AUDIENCE: 
This course benefits operators of SRX Series devices. These operators include network engineers, administrators, support personnel, and reseller support personnel.
Course Level: JSEC is an intermediate-level course.


JUNOS UNIFIED THREAT MANAGEMENT (JUTM) TARGET AUDIENCE: 
This course benefits individuals responsible for implementing and monitoring the UTM features available on branch SRX Services Gateways and J Series Services Routers.
Course Level: JUTM is an intermediate-level course.


At Completion

JUNOS SECURITY (JSEC) OBJECTIVES:
After successfully completing this course, you should be able to:

  • Describe traditional routing and security and the current trends in internetworking.
  • Provide an overview of SRX Series devices and software architecture.
  • Describe the logical packet flow and session creation performed by SRX Series devices.
  • Describe, configure, and monitor zones.
  • Describe, configure, and monitor security policies.
  • Describe, configure, and monitor firewall user authentication.
  • Describe various types of network attacks.
  • Configure and monitor Screen options to prevent network attacks.
  • Explain, implement, and monitor NAT, as implemented on Junos security platforms.
  • Explain the purpose and mechanics of IP Security (IPsec) virtual private networks (VPNs).
  • Implement and monitor policy-based and route-based IPsec VPNs.
  • Utilize and update the IDP signature database.
  • Configure and monitor IDP policy with policy templates.
  • Describe, configure, and monitor high availability chassis clusters.

JUNOS UNIFIED THREAT MANAGEMENT (JUTM) OBJECTIVES:
After successfully completing this course, you should be able to:
  • Describe the challenges that branch offices present to network managers.
  • List the major features that UTM offers.
  • Explain how each major feature addresses the challenges of the branch office.
  • List the SRX Series Services Gateways hardware devices on which UTM is available.
  • Describe the UTM features that require specific licenses.
  • Define terms used in the creation of effective antispam UTM policies.
  • Describe the process by which UTM examines traffic for spam.
  • Describe the overall process of configuring an antispam UTM policy.
  • Describe the kinds of information available from the device when it has detected spam.
  • Describe how the AV process examines traffic.
  • Describe the differences between full file-based AV versus express AV.
  • Describe the settings that are required for configuring AV protection.
  • Explain how these settings affect scanning performance and effectiveness.
  • Describe options available for scanning supported protocols.
  • List the general steps required to configure AV.
  • Describe the statistical information available to verify AV functionality.
  • Describe content and Web filtering and their purpose.
  • List and describe each of the parameters used when configuring Web and content filtering.
  • Describe in general terms the steps necessary to configure web and content filtering.
  • Monitor Web and content filtering.

Prerequisites

JUNOS SECURITY (JSEC) PREREQUISITES
Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite. Students should also attend the Introduction to the Junos Operating System (IJOS) course and the Junos Routing Essentials (JRE) course, or have equivalent experience prior to attending this class.


JUNOS UNIFIED THREAT MANAGEMENT (JUTM) PREREQUISITES: 
Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) model and the TCP/IP protocol suite. Students should also have working knowledge of security policies. 

Students should also attend the Introduction to the Junos Operating System (IJOS), Junos Routing Essentials (JRE), and Junos Security (JSEC) courses prior to attending this class.


Exams & Certifications


Materials


Course Outline

JUNOS SECURITY (JSEC) COURSE OUTLINE: 

  • Module 1: Course Introduction
  • Module 2: Introduction to Junos Security
  • Module 3: Zones
  • Module 4: Security Policies
  • Module 5: Firewall User Authentication
  • Module 6: Screen Options
  • Module 7: Network Address Translation
  • Module 8: IPsec VPNs
  • Module 9: Introduction to Intrusion Detection and Prevention
  • Module 10: High Availability Clustering Theory
  • Module 11: High Availability Clustering Implementation


JUNOS UNIFIED THREAT MANAGEMENT (JUTM) 
  • Module 1: Course Introduction
  • Module 2: UTM Overview
  • Module 3: Antispam
  • Module 4: Full File-Based and Express Antivirus
  • Module 5: Content and Web Filtering

 

 

Juniper Networks Certification Specialist Security Bootcamp, JSEC and JUTM (JNCIS-SEC BC)http://springhouse.com/course-catalog/JNCIS-SEC BCJuniper Networks Certification Specialist Security Bootcamp, JSEC and JUTM (JNCIS-SEC BC)

Get More Information
Name:

Phone:  

Email:  

Comments:

Help us prove you're not a robot:
 

 ‭(Hidden)‬ Catalog-Item Reuse

Microsoft Gold Partner

PMI R.E.P.

The PMI R.E.P. logo is a mark of the Project Management Institute, Inc.
The Microsoft Gold CPLS logo is a mark of Microsoft, Inc.

Connect with us

Springhouse Education & Consulting Services

Corporate HQ:Eagleview Corporate Park
707 Eagleview Boulevard
Suite 207
Exton, PA 19341

610-321-3500 - info@springhouse.com