Detailed Course Outline
DAY 1
Module 1: Implementing Intrusion Detection and Prevention
- Describe the purpose of IDP
- Utilize and update the IDP signature database
- Configure an IDP policy
- Utilize and configure an IDP policy using a template
- Monitor IDP operations
Lab 1: Implementing IDP
Module 2: Implementing SSL Proxy
- Explain why SSL proxy is necessary
- Describe and configure client-protection SSL proxy
- Describe and configure server-protection SSL proxy
- Discuss how to monitor SSL proxy
- Explain the SSL mirror decrypt feature
Lab 2: Implementing SSL Proxy
Module 3: IPsec VPN Concepts
- Identify various types of VPNs
- Describe IPsec VPNs and their functionalities
- Describe how IPsec VPNs are established
- Describe IPsec traffic processing
Module 4: Implementing Site-to-Site IPsec VPNs
- Describe the high-level configuration options for an IPsec VPN
- Describe the functionality of proxy IDs and traffic selectors
- Configure an IPsec site-to-site VPN
- Monitor a site-to-site IPsec VPN
Lab 3: Implementing Site-to-Site IPsec VPNs
DAY 2
Module 5: Implementing Juniper Secure Connect
- Describe Juniper Secure Connect features
- Explain Juniper Secure Connect UI options
- Configure Juniper Secure Connect on SRX Series devices
- Connect Juniper Secure Connect Client
Lab 4: Implementing Juniper Secure Connect
Module 6: Implementing Identity Aware Security Policies
- Describe identity-aware firewall and list supported identity sources
- Describe Active Directory as identity source
- Configure Active Directory as identity source
- Describe Juniper Identity Management Service
- Explain how to install Juniper Identity Management Service
- Configure Juniper Identity Management Service
- Describe how to troubleshoot Juniper Identity Management Service
Lab 5: Implementing Identity Aware Security Policies
Module 7: Introducing Security Director
- Explain the benefits of Security Director
- Explain Security Director deployment options
- Demonstrate how to access and use the Security Director UI
- Demonstrate how to onboard a device
- Demonstrate how to manage security policies
- Demonstrate how to deploy and validate configuration changes
Lab 6: Using Security Director
DAY 3
Module 8: Introducing Policy Enforcer
- Explain the benefits of Policy Enforcer
- Explain how to configure a secure fabric
- Describe how infected host remediation occurs
Module 9: Implementing Juniper ATP Cloud Anti-Malware
- Describe Juniper ATP Cloud anti-malware capabilities
- Describe the Juniper ATP Cloud Web UI options
- Configure the SRX Series Firewall to use Juniper ATP Cloud anti-malware
- Discuss a Juniper ATP Cloud anti-malware case study
Lab 7: Enrolling Devices in Juniper ATP Cloud
Module 10: Implementing Juniper ATP Cloud Features
- Explain Security Intelligence
- Describe Encrypted Traffic Insights
- Describe Adaptive Threat Profiling
- Explain IoT Security
Lab 8: Implementing ATP Cloud Features
DAY 4
Module 11: Understanding Chassis Cluster Concepts
- Describe why customers implement a chassis cluster
- Identify chassis cluster components
- Describe the causes of failover
Module 12: Implementing a Chassis Cluster
- Configure a chassis cluster
- Explain additional chassis cluster configuration options
Lab 9: Implementing a Chassis Cluster
Module 13: Troubleshooting a Chassis Cluster
- Troubleshoot a chassis cluster
- Explain the chassis cluster case studies
SELF-STUDY MODULE
Module 14: Explain Junos OS Routing Fundamentals
- Explain the difference between directly connected, static, and dynamic routes
- Explain how route preference determines the active route to a destination
- Demonstrate how to display and examine the inet.0 and inet6.0 routing tables
- Configure and validate static routing
- Explain the flow process