Junos Security (JSEC) – Outline

Detailed Course Outline

DAY 1

Module 1: Implementing Intrusion Detection and Prevention
  • Describe the purpose of IDP
  • Utilize and update the IDP signature database
  • Configure an IDP policy
  • Utilize and configure an IDP policy using a template
  • Monitor IDP operations

Lab 1: Implementing IDP

Module 2: Implementing SSL Proxy
  • Explain why SSL proxy is necessary
  • Describe and configure client-protection SSL proxy
  • Describe and configure server-protection SSL proxy
  • Discuss how to monitor SSL proxy
  • Explain the SSL mirror decrypt feature

Lab 2: Implementing SSL Proxy

Module 3: IPsec VPN Concepts
  • Identify various types of VPNs
  • Describe IPsec VPNs and their functionalities
  • Describe how IPsec VPNs are established
  • Describe IPsec traffic processing
Module 4: Implementing Site-to-Site IPsec VPNs
  • Describe the high-level configuration options for an IPsec VPN
  • Describe the functionality of proxy IDs and traffic selectors
  • Configure an IPsec site-to-site VPN
  • Monitor a site-to-site IPsec VPN

Lab 3: Implementing Site-to-Site IPsec VPNs

DAY 2

Module 5: Implementing Juniper Secure Connect
  • Describe Juniper Secure Connect features
  • Explain Juniper Secure Connect UI options
  • Configure Juniper Secure Connect on SRX Series devices
  • Connect Juniper Secure Connect Client

Lab 4: Implementing Juniper Secure Connect

Module 6: Implementing Identity Aware Security Policies
  • Describe identity-aware firewall and list supported identity sources
  • Describe Active Directory as identity source
  • Configure Active Directory as identity source
  • Describe Juniper Identity Management Service
  • Explain how to install Juniper Identity Management Service
  • Configure Juniper Identity Management Service
  • Describe how to troubleshoot Juniper Identity Management Service

Lab 5: Implementing Identity Aware Security Policies

Module 7: Introducing Security Director
  • Explain the benefits of Security Director
  • Explain Security Director deployment options
  • Demonstrate how to access and use the Security Director UI
  • Demonstrate how to onboard a device
  • Demonstrate how to manage security policies
  • Demonstrate how to deploy and validate configuration changes

Lab 6: Using Security Director

DAY 3

Module 8: Introducing Policy Enforcer
  • Explain the benefits of Policy Enforcer
  • Explain how to configure a secure fabric
  • Describe how infected host remediation occurs
Module 9: Implementing Juniper ATP Cloud Anti-Malware
  • Describe Juniper ATP Cloud anti-malware capabilities
  • Describe the Juniper ATP Cloud Web UI options
  • Configure the SRX Series Firewall to use Juniper ATP Cloud anti-malware
  • Discuss a Juniper ATP Cloud anti-malware case study

Lab 7: Enrolling Devices in Juniper ATP Cloud

Module 10: Implementing Juniper ATP Cloud Features
  • Explain Security Intelligence
  • Describe Encrypted Traffic Insights
  • Describe Adaptive Threat Profiling
  • Explain IoT Security

Lab 8: Implementing ATP Cloud Features

DAY 4

Module 11: Understanding Chassis Cluster Concepts
  • Describe why customers implement a chassis cluster
  • Identify chassis cluster components
  • Describe the causes of failover
Module 12: Implementing a Chassis Cluster
  • Configure a chassis cluster
  • Explain additional chassis cluster configuration options

Lab 9: Implementing a Chassis Cluster

Module 13: Troubleshooting a Chassis Cluster
  • Troubleshoot a chassis cluster
  • Explain the chassis cluster case studies

SELF-STUDY MODULE

Module 14: Explain Junos OS Routing Fundamentals
  • Explain the difference between directly connected, static, and dynamic routes
  • Explain how route preference determines the active route to a destination
  • Demonstrate how to display and examine the inet.0 and inet6.0 routing tables
  • Configure and validate static routing
  • Explain the flow process