757-216-3656 | Monday–Friday 8:30 AM – 4:30 PM | info@itdojo.com

Course Duration

3 Days

Audience

Employees of federal, state and local governments; and businesses working with the government.

Prerequisites

The following are the prerequisites for this course: Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite.

Course Description

This course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. The course provides a brief overview of security problems and how Juniper Networks approaches a complete security solution with Juniper Connected Security. Key topics include configuration tasks for initial system configuration, interface configuration, security object configuration, security policy configuration, IPsec VPN configuration, and NAT configuration The course then delves into Layer 7 security using UTM, IDP, and AppSecure to provide students with the understanding of application level security to block advanced threats. An overview of Sky ATP is included for students to understand zero-day network protection technologies Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 19.1R1.6.

Course Outline

  • Security Challenges
  • Security Design Overview
  • Juniper Connected Security
  • Connected Security
  • Interfaces
  • Initial Configuration
  • Security Zone Objects
  • Security Screen Objects
  • Security Address Objects
  • Security Services Objects
  • Security Policy Overview
  • Zone-Based Policies
  • Global Security Policies
  • Application Firewall with Unified Security Policies
  • IDP Security Services
  • Integrated User Firewall
  • Content Filtering
  • Web Filtering
  • Antivirus
  • Antispam
  • Sky ATP Overview
  • Blocking Threats
  • NAT Overview
  • Source NAT
  • Destination NAT
  • Static NAT
  • VPN Types
  • Secure VPN Requirements
  • IPsec Tunnel Establishment
  • IPsec Traffic Processing
Get More Information

We cannot work with the general public. We only work with Government Agencies, Military, government contractors, and corporate clients.