This self-paced On-Demand eLearning course provides you with the foundational knowledge required to work with the Junos operating system and to configure Junos security devices. The course provides a brief overview of the Juniper security products and discusses the key architectural components of the Junos software. Key topics include UI options with a heavy focus on CLI, configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos Security devices. The course then delves into foundational knowledge of security objects, security policies, and configuration examples including types of security objects, security policies, security services NAT, site-to-site IPsec VPN, and Juniper Secure Connect VPN. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring Junos OS and monitoring basic device operations on the SRX Series device. This course is based on Junos OS Release 21.2R1.10. Watch a Sneak Peek

Purchase Includes: 365 Days of Access
Certification Track: Security
Difficulty Level: Foundational
Last Updated: Thursday, April 6, 2023
Additional Details
Course Modules
How to Use this On Demand Course

To launch the course, click the module titles below. Please be patient as the content downloads to your system. As you complete each module, close the module window and launch the next module from this page. You will need to launch all required modules for the course to be considered complete.

If the module has a lab component, you will have access to our virtual lab environment. In order to use the lab portion of the training you will need to enable your lab access. Click the "Enable Lab Access" button to enable your lab access and follow the instructions in the individual training modules to access the labs when instructed. If this is your first time using the On Demand lab environment, please Watch a Quick Lab Tutorial.

Important: For the best experience with this course we recommend that you use the latest version of Firefox, Chrome, Safari or Microsoft Edge. Older versions of Internet Explorer have been shown to have issues, therefore, we do not recommend using this browser.

If you have any technical problems with the course modules or the lab environment please open a ticket.

Introduction to Juniper Security
This module introduces the topics taught in the IJSEC course.
Juniper Connected Security Overview
Identify the high-level security challenges in today’s network. Describe basic network security design. Identify the key factors in Juniper Networks security focus.
Juniper SRX Overview
Describe the Junos architecture and SRX features. Explain the traffic processing and logical packet flow on an SRX Series device. Describe the Junos J-Web UI and its features.
Juniper SRX Initial Configuration
List and perform initial configuration tasks. Perform basic interface configuration tasks.

Lab 1: Initial System Configuration
1h 53m
UI Options: The Junos CLI
Perform Junos CLI basics. Describe Junos operational mode. Describe Junos configuration mode.
Security Zones and Screen Objects
Describe and configure security zones objects. Describe and configure screen objects.
Address Objects and Service Objects
Describe and configure address objects. Describe and configure service objects.

Lab 2: Creating Security Objects
1h 46m
IJSEC Activity 01
This module reinforces concepts taught in the IJSEC course
Security Policies
Describe the purpose and types of security policies. Define the security policy components. Configure an application firewall with unified security policies. Implement security policy for a given use case.

Lab 3: Creating Security Policies
2h 24m
Security Services: IPS
Explain the purpose of IPS. Define the IPS policy components. Configure IPS policies.
Security Services: Integrated User-Based Firewall
Explain the purpose of user-based firewall. Configure integrated user-based firewall.

Lab 4: Security Services—IPS Integrated User Firewall
2h 3m
UTM: Antivirus and Antispam
Describe the purpose of UTM services. Explain antispam and its functionality.
UTM: Content Filtering and Web Filtering
Explain the functionality of Content filtering. Explain the functionality of Web filtering.

Lab 5: Implementing UTM Virtual SRX
1h 37m
Juniper Connected Security: Juniper ATP Cloud
Explain the purpose of JATP. Describe the features of JATP. Describe the process to enroll devices with JATP Cloud. Monitor JATP.

Lab 6: JATP Overview
1h 22m
IJSEC Activity 02
This activity reinforces concepts taught in the IJSEC course.
Source Network Address Translation
Describe the purpose and functionality of NAT and PAT. Configure and monitor source NAT. Explain the purpose of proxy ARP.
Destination Network Address Translation and Static Network Address Translation
Configure and monitor destination NAT. Configure and monitor static NAT.

Lab 7: Implementing NAT
1h 50m
Site-to-Site IPsec VPN
Describe the high-level overview and configuration options for IPsec VPN. Implement IPsec VPN for a given use case. Describe the functionality of proxy-id and traffic selectors. Monitor site-to-site IPsec VPN.

Lab 8: Implementing IPsec VPN
1h 22m
Juniper Secure Connect
Describe Juniper Secure Connect features. Explain Juniper Secure Connect UI options. Deploy Juniper Secure Connect. Monitor Juniper Secure Connect.

Lab 9: Implementing Juniper Secure Connect
SRX Troubleshooting
Discuss SRX and vSRX licensing. Describe how to use packet capture. Describe the traceoptions on the SRX Series device. Discuss how to verify Content Security policy usage.
Monitoring and Reporting
Explain the basic monitoring features. Explain the use of network utility tools on the SRX Series device. Describe the procedure of maintaining Junos OS. Identify the various reports available on SRX J-Web interface.

Lab 10: Monitoring and Reporting
1h 30m
SRX Series Hardware and Interfaces Overview
This module describes the various SRX models and interface types.
Virtual SRX
This module explains how to manage and configure the Juniper vSRX device.
Juniper Sky Enterprise Overview
This module explains how to use the Juniper Sky Enterprise software to manage SRX devices.
IPsec VPN Concepts
This module shows how to use the SRX device as a VPN.
IJSEC Activity 03
This activity reinforces concepts taught in the IJSEC course
$3,000 USD