This self-paced On-Demand eLearning intermediate-level course provides students with the knowledge required to work with Juniper Connected Security devices. This course uses Junos CLI, Junos Space® Security Director. The course provides further instruction on how Juniper Networks approaches a complete security solution for current and future security problems, called Juniper Connected Security. Key topics include tasks for intrusion detection and prevention (IDP) rules and custom attack objects, IPSec VPNs, Security Director management, Juniper® Advanced Threat Prevention management (ATP) Cloud management, Policy Enforcer management, Identity-Aware security policies, Secure Sockets Layer (SSL) Proxy configuration, and Juniper Networks® SRX Series Firewalls high availability configuration and troubleshooting. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring Junos OS and monitoring basic device operations. This course is based on Junos OS Release 24.2R1, Junos Space 23.1R1, Security Director 23.1R1, and JIMS 1.7.0R2. Watch a Sneak Peek

Note: Please note this course has been updated to the new version on Jan 12, 2026. Your current progress has carried over to the new version. This course includes audio and closed captioning in English, and AI-generated closed captioning for German, French, Portuguese, Spanish, Chinese and Japanese.


Purchase Includes: 365 Days of Access
Certification Track: Security
Difficulty Level: Intermediate
Additional Details
  • Termed access to the online course materials and labs begins at the time of purchase.
  • This course includes audio and closed captioning in English, and AI-generated closed captioning for German, French, Portuguese, Spanish, Chinese and Japanese.
  • On-Demand courses do not include an eBook.
  • See complete terms & conditions.
  • Regional pricing is available in APAC. Please contact our Education APAC Sales Team.
  • Contact Education Services Sales: AMER Sales | APAC Sales | EMEA Sales
  • Need Support? Please contact us
Course Modules
#ModuleDurationLabRequired
0
How to use the Course and the Labs

To launch the course, click the module titles below. Please be patient as the content downloads to your system. As you complete each module, close the module window and launch the next module from this page. You will need to launch all required modules for the course to be considered complete.

If the course module includes a lab, you'll have access to the virtual lab environment. To enable access, go to the “Access Lab Environment” section and click Enable Lab Access. This will enable your lab account and display your lab-specific username and password. Follow the instructions in each module to use the labs as directed. First-time users should, Watch a Quick Lab Tutorial.

Important: For the best experience with this course we recommend that you use the latest version of Chrome, Edge, FireFox, or Safari. Older versions of Internet Explorer have been shown to have issues, therefore, we do not recommend using this browser.

If you have any technical problems with the course modules or the lab environment view the labs documentation or submit a support ticket.

5m
1
Welcome to Juniper Security
This module introduces the Juniper Security Course and its objectives.
2m
2
Implementing Intrusion Detection and Prevention
This module describes the purpose of intrusion detection and prevention (IDP) and continues to show how to use and update the IDP signature database and how to configure an IDP policy. Finally, it shows how to monitor the IDP operations.

Lab 1: Implementing IDP
1h 46m
3
Implementing SSL Proxy
This module explains why SSL proxy is necessary and how to configure client and server protection SSL proxy. It also explains the SSL mirror decrypt feature.

Lab 2: Implementing SSL Proxy
1h 14m
4
IPsec VPN Concepts
This module describes types of VPNs, their functionalities, how IPsec VPNs are established, and how IPsec traffic is processed.
1h 18m
5
Implementing Site-to-Site IPsec VPNs
This module describes the configuration options for an IPsec VPN and the functionality of proxy IDs and traffic selectors. It then covers how to configure and monitor an IPsec site-to-site VPN.

Lab 3: Implementing Site-to-Site IPsec VPNs
55m
6
JSEC Activity 01
This activity reinforces concepts taught in the previous modules.
10m
7
Implementing Juniper Secure Connect
This module describes and explains Juniper Secure Connect features and UI options and how to configure it on SRX devices. The module also explains how to connect a Juniper Secure Connect client.

Lab 4: Implementing Juniper Secure Connect
1h 15m
8
Implementing Identity-Aware Security Policies
This module describes identity-aware firewall. The module also lists supported identity sources, how to configure Active Directory as Identity Source, how to install and configure Juniper Identity Management Service, and how to troubleshoot Juniper Identity Management Service.

Lab 5: Implementing Identity-Aware Security Policies
1h 49m
9
Introducing Security Director
This module introduces the benefits and deployment options of Security Director. It then demonstrates how to access and use the Security Director UI to onboard a device, manage security policies, and deploy and validate configuration changes.

Lab 6: Using Security Director
2h 10m
10
JSEC Activity 02
This activity reinforces concepts taught in the previous modules.
10m
11
Introducing Policy Enforcer
This module introduces the benefits of Policy Enforcer and how to configure a secure fabric and how infected hosts remediation occurs.
51m
12
Implementing Juniper ATP Cloud Anti-Malware
This module describes Juniper ATP Cloud anti-malware capabilities, Juniper ATP Cloud Web UI options, and how to configure the SRX Series Firewall to use Juniper ATP Cloud anti-malware. It concludes with a Juniper ATP Cloud anti-malware case study.

Lab 7: Enrolling Devices in Juniper ATP Cloud
1h 42m
13
Implementing Juniper ATP Cloud Features
This module explains Security Intelligence and describes Encrypted Traffic Insights, Adaptive Threat Profiling, and IoT Security.

Lab 8: Implementing ATP Cloud Features
2h 12m
14
JSEC Activity 03
This activity reinforces concepts taught in the previous modules.
10m
15
Understanding Chassis Cluster Concepts
This module discusses why customers implement a chassis cluster, what are the components of a chassis cluster, and the causes of failover.
53m
16
Implementing a Chassis Cluster
This module covers chassis cluster configuration and additional chassis cluster configuration options.

Lab 9: Implementing a Chassis Cluster
2h 1m
17
Troubleshooting a Chassis Cluster
This module contains steps and commands to troubleshoot a chassis cluster and explains the chassis cluster case studies.

Lab 10: Troubleshooting a Chassis Cluster
53m
18
JSEC Activity 04
This activity reinforces concepts taught in the previous modules.
10m
19
Self-Study: Understanding Junos OS Routing Fundamentals
This module explains the difference between directly connected, static, and dynamic routers, and how route preference determines the active route to a destination. The module examines the inet.0 and inet6.0 routing tables and explains how to configure and validate static routing. Finally, it explains the flow process.
1h 21m
$4,000 USD