Introduction to Juniper Security (IJSEC)

Introduction to Juniper Security (IJSEC) 
This 3-day course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. The course provides a brief overview of security problems and how Juniper Networks approaches a complete security solution with Juniper Connected Security. Key topics include configuration tasks for initial system configuration, interface configuration, security object configuration, security policy configuration, IPsec VPN configuration, and NAT configuration. The course then delves into Layer 7 security using UTM, IDP, and AppSecure to provide students with the understanding of application-level security to block advanced threats. An overview of Sky ATP is included for students to understand zero-day network protection technologies. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 19.1R1.6.


Additional Details
3 Ways to Buy!
Enroll Below
Register for this course by clicking on an upcoming date below.
On-Demand
Better Value
Skip the wait and purchase instant On-Demand access to this course.
All Access Pass
Best Value
Purchase an All Access Pass and get instant access to all on-demand and instructor-led courses at one low price!

 

Click To Expand Full Course Outline

Course Level

IJSEC is an introductory-level course.

Intended Audience

Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers.

Prerequisites

The following are the prerequisites for this course:

  • Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite.
  • Objectives

    After successfully completing this course, you should be able to:

    • Identify high-level security challenges in today’s networks.
    • Identify products that are incorporated into the Juniper Connected Security solution.
    • Explain the value of implementing security solutions.
    • Explain how Juniper Connected Security solves the cyber security challenges of the future.
    • Explain the SRX Series devices and the added capabilities that next-generation firewalls provide.
    • Explain traffic flows through the SRX Series devices.
    • List the different security objects and how to create them.
    • Describe interface types and perform basic interface configuration tasks.
    • Describe the initial configuration for a SRX Series device.
    • Explain security zones.
    • Describe screens and their use.
    • Explain address objects.
    • Describe services and their use.
    • Describe the purpose for security policies on an SRX Series device.
    • Describe zone-based policies.
    • Describe global policies and their use.
    • Explain unified security policies.
    • Configure unified security policies with the J-Web user interface.
    • Describe IDP signatures.
    • Configure an IDP policy using predefined templates with the J-Web user interface.
    • Describe the use and configuration of the integrated user firewall feature.
    • Describe the UTM security services.
    • List the available UTM services on the SRX Series device.
    • Configure UTM filtering on a security policy with the J-Web user interface.
    • Explain Sky ATP’s use in security.
    • Describe how Sky ATP and SRX Series devices operate together in blocking threats.
    • Describe NAT and why it is used.
    • Explain source NAT and when to use it.
    • Explain destination NAT and when to use it.
    • Explain static NAT and its uses.
    • Describe the operation and configuration the different types of NAT.
    • Identify various types of VPNs.
    • Describe IPsec VPNs and their functionality.
    • Describe how IPsec VPNs are established.
    • Describe IPsec traffic processing.
    • Configure IPsec VPNs with the J-Web user interface.
    • Describe and configure proxy IDs and traffic selectors with the J-Web user interface.
    • Monitor IPsec VPNs with the J-Web user interface.
    • Describe the J-Web monitoring features.
    • Explain the J-Web reporting features.
    • Describe the Sky Enterprise service and how it can save resources.
    • Explain the functionality of Junos Space Security Director.

    Course Contents

    Day 1

    Chapter 1: Course Introduction

    Chapter 2: Juniper Security Concepts

    • Security Challenges
    • Security Design Overview
    • Juniper Connected Security

    Chapter 3: Juniper Connected Security – SRX Series Devices

    • SRX Architectural Overview
    • Traffic Processing
    • J-Web Overview
    • Initial Configuration
    • Interface Configuration
    • Lab 1: Initial Configuration

    Chapter 4: Security Objects

    • Security Zone Objects
    • Security Screen Objects
    • Security Address Objects
    • Security Services Objects
    • Lab 2: Creating Security Objects with J-Web

    Chapter 5: Security Policies

    • Security Policy Overview
    • Security Policy Components
    • Application Firewall with Unified Security Policies
    • Security Policy Case Study
    • Lab 3: Implementing Security Policies

    Day 2

    Chapter 6: Security Services – IDP and User Firewall

    • Introduction to IPS
    • IPS Policy Components
    • Configuring IPS Policies
    • User Firewall Overview
    • Configuring Integrated User Firewall
    • Lab 4: Implementing Security Services

    Chapter 7: Security Services - UTM

    • Content Filtering
    • Web Filtering
    • Antivirus
    • Antispam
    • Lab 5: Implementing UTM

    Chapter 8: Juniper Connected Security – Sky ATP

    • Sky ATP Overview
    • Sky ATP Features
    • Sky ATP Setup
    • Monitor Sky ATP
    • Lab 6: Demonstrating Sky ATP

    Day 3

    Chapter 9: Network Address Translation

    • NAT Overview
    • Source NAT
    • Destination NAT
    • Static NAT
    • Lab 7: Implementing Network Address Translation

    Chapter 10: Site-to-Site VPNs

    • IPsec Site-to-Site VPN Configuration
    • IPsec Site-to-Site VPN Case Study
    • Proxy IDs and Traffic Selectors
    • Monitoring Site-to-Site IPsec VPNs
    • Lab 8: Implementing Site-to-Site IPsec VPNs

    Chapter 11: Monitoring and Reporting

    • Monitor Platform and Interface Operations
    • J-Web Reporting options
    • Lab 9: Using Monitoring and Reporting

    Appendix A: SRX Series Hardware

    Appendix B: Virtual SRX

    Appendix C: Juniper Sky Enterprise

    Appendix D: IPsec VPN Concepts

    Schedule
      Below is a list of scheduled dates when this event will take place. Some events require registration for attendance so you will need to click on the date for more information regarding the specific event.

    If you don't see the date you prefer, please email us at training@juniper.net to request a date or schedule your custom training session.

    Display dates for 

     
    Date  Subject Region Location Facilitator Language Status
    11/30/2020 Introduction to Juniper Security (IJSEC) - ILO Asia Pacific (APAC) APAC Online Spectrum - APAC English Open
    12/7/2020 9:00 AM AEST Introduction to Junos Security Asia Pacific (APAC) Online Datacipher - Australia & New Zealand English Open
    12/7/2020 8:00 AM (Central America Standard Time) Introduction to Junos Security (IJSEC) Americas (AMER) Online Academia InSite Spanish Open
    12/10/2020 9:00 AM AEST Introduction to Junos Security Asia Pacific (APAC) Online Datacipher - Australia & New Zealand English Open
    12/16/2020 7:30 AM PST Introduction to Juniper Security (IJSEC) - ILO Americas (AMER) AMER Online Juniper Networks English Open
    2/1/2021 Introduction to Junos Security (IJSEC) - ILT & ILO Europe, Middle East and Africa (EMEA) London, United Kingdom + Online Arrow ECS - United Kingdom English Open
    2/8/2021 9:00 AM CET Introduction to Junos Security (IJSEC) - ILO Europe, Middle East and Africa (EMEA) EMEA Online Juniper Networks English Open
    3/8/2021 7:30 AM PST Introduction to Juniper Security (IJSEC) - ILO Americas (AMER) AMER Online Juniper Networks English Open
    3/9/2021 Introduction to Junos Security (IJSEC) Europe, Middle East and Africa (EMEA) Amsterdam + live online Tech Data English Open
    3/15/2021 9:00 AM SGT Introduction to Juniper Security (IJSEC) - ILO Asia Pacific (APAC) APAC Online Juniper Networks English Open
    4/12/2021 Introduction to Junos Security (IJSEC) - ILT & ILO Europe, Middle East and Africa (EMEA) London, United Kingdom + Online Arrow ECS - United Kingdom English Open
    5/10/2021 9:00 AM CET Introduction to Junos Security (IJSEC) - ILO Europe, Middle East and Africa (EMEA) EMEA Online Juniper Networks English Open
    5/17/2021 9:00 AM SGT Introduction to Juniper Security (IJSEC) - ILO Asia Pacific (APAC) APAC Online Juniper Networks English Open
    6/8/2021 Introduction to Junos Security (IJSEC) Europe, Middle East and Africa (EMEA) Amsterdam + live online Tech Data English Open
    6/28/2021 Introduction to Junos Security (IJSEC) - ILT & ILO Europe, Middle East and Africa (EMEA) London, United Kingdom + Online Arrow ECS - United Kingdom English Open
    9/13/2021 Introduction to Junos Security (IJSEC) - ILT & ILO Europe, Middle East and Africa (EMEA) London, United Kingdom + Online Arrow ECS - United Kingdom English Open
    11/22/2021 Introduction to Junos Security (IJSEC) - ILT & ILO Europe, Middle East and Africa (EMEA) London, United Kingdom + Online Arrow ECS - United Kingdom English Open