COURSE OBJECTIVE:
After successfully completing this course, you should be able to: • Explain the function of SSL Proxy. • Explain how application security theory works. • Discuss in depth the AppSecure modules. • Describe unified security policies. • Review the different security policy options. • Explain the basics of intrusion detection. • Describe the Juniper ATP Cloud solutions. • Describe the ATP Cloud features. • Introduce Security Director. • Explain the purpose of Policy Enforcer. • Examine the different virtualized SRX instances. • Describe the Juniper Identity Management Service. • Explain chassis cluster concepts. • Explain how to set up a chassis cluster. • Review troubleshooting steps for chassis clusters. • Explain Juniper ATP Appliance components. • Explain how to set up a Juniper ATP Appliance.• Explain how the Juniper Secure Analytics device works.
TARGET AUDIENCE:
Benefits individuals responsible for security operations using Juniper Networks security solutions, including network engineers, security engineers, administrators, support personnel, and resellers.
COURSE PREREQUISITES:
• Basic networking knowledge • Understanding of the OSI reference model and the TCP/IP protocol suite • Completion of the Introduction to Juniper Security course
COURSE CONTENT:
Day 1Course IntroductionSSL Proxy • Explain why SSL proxy is necessary • Describe and configure client-protection SSL proxy • Describe and configure server-protection SSL proxy • Discuss how to monitor SSL proxy • Explain SSL mirror decrypt feature Lab 1: SSL Proxy Client Protection Application Security Theory • Describe the functionality of the AppSecure suite • Explain how application identification works • Describe how to create custom application signatures • Explain the purpose of the application system cache Application Security Implementation • Discuss in depth the AppSecure modules Lab 2: Implementing AppSecure Unified Security Policies • Explain unified security policy evaluation • Explain URL Category options Lab 3: Unified Security PoliciesDay 2Security Policy Options • Explain session management options • Explain Junos ALG functionality • Implement policy scheduling • Explain logging Lab 4: Security Policy Options Intrusion Detection and Prevention • Describe the purpose of IPS • Utilize and update the IPS signature database • Configure IPS policy • Utilize and configure IPS policy using a template • Monitor IPS operations Lab 5: IPS Juniper ATP Cloud • Describe the Juniper ATP Cloud Web UI options • Configure the SRX Series Firewall to use Juniper ATP Cloud anti-malware • Discuss an Infected Host case study Lab 6: Juniper ATP Cloud Anti-Malware Juniper ATP Cloud Features • Explain Security Intelligence • Describe Encrypted Traffic Insights • Describe Adaptive Threat Profiling • Explain IoT Security Lab 7: ATP Cloud FeaturesDay 3Introduction to Security Director • Explain how to use Security Director • Describe how to configure firewall policies • Deploy configuration changes using Security Director Lab 8: Working with Security Director Security Director with Policy Enforcer • Explain how to configure a secure fabric • Describe how infected host remediation occurs Lab 9: Configuring Juniper Connected Security Virtual SRX and cSRX • Explain virtualization • Discuss network virtualization and software-defined networking • Review the virtual SRX platform • Review the cSRX platform • Deploy the virtual SRX • Integrate the virtual SRX with public cloud services Lab 10: vSRX Implementation Juniper Identity Management Service • Explain how to install Juniper Identity Management Service • Configure Juniper Identity Management Service • Describe troubleshooting Juniper Identity Management Service Lab 11: Juniper Identity Management ServiceDay 4Chassis Cluster Concepts • Describe chassis clusters • Identify chassis cluster components • Describe chassis cluster operation Chassis Cluster Implementation • Configure chassis clusters • Describe advanced chassis cluster options Lab 12: Implementing Chassis Clusters Chassis Cluster Troubleshooting • Troubleshoot chassis clusters • Review chassis cluster case studies Lab 13: Troubleshooting Chassis ClustersDay 5Juniper ATP Appliance—Overview • Explain the Cyber Kill Chain model • Define deployment models for Juniper ATP Appliance Implementing Juniper ATP Appliance • Describe how to configure an SRX Series device with ATP Appliance • Describe how to mitigate a threat with the ATP Appliance Web UI • Demo Video: Implementing Juniper ATP Appliance Juniper Secure Analytics • Describe the JSA Series device and its basic functionality • Define how JSA processes log activity • Explain how JSA processes network activity • Explain how to customize the processing of information Lab 14: Monitoring with JSA
FOLLOW ON COURSES:
Advanced Juniper Security (AJSEC)