Implementing Juniper Networks Secure Analytics (IJSA)

Implementing Juniper Networks Secure Analytics (IJSA) 

This three-day course discusses the configuration of Juniper Networks Secure Analytics (JSA) in a typical network environment. Key topics include deploying a JSA Series device in the network, configuring network log and flow sources, running reports, and troubleshooting. Students will gain experience in configuring, testing, and troubleshooting the JSA Series device through demonstrations and hands-on labs. This course uses the Juniper Networks Secure Analytics (JSA) VM virtual appliance for the hands-on component. This course is based on JSA software 7.4.1.

Additional Details
2 Ways to Buy!
Enroll Below
Register for this course by clicking on an upcoming date below.
All Access Pass
Best Value
Purchase an All Access Pass and get instant access to all on-demand and instructor-led courses at one low price!


Click To Expand Full Course Outline

Course Level

Implementing Juniper Secure Analytics is an introductory-level course.

Intended Audience

This course is intended for network engineers, support personnel, reseller support, and anyone responsible for implementing the JSA system.


This course assumes that students have basic networking knowledge and experience in the following areas:

  • Understanding of TCP/IP operation;
  • Understanding of network security concepts; and
  • Experience in network security administration.


After successfully completing this course, you should be able to:

  • Define the JSA Series device and its components and their functionality
  • Administer the JSA application
  • Update the JSA application
  • Manage the JSA application
  • Describe how JSA collects data to detect suspicious activity
  • Search, filter, group security data
  • Analyze security data
  • Create customized reports
  • Troubleshoot and tune the JSA device
  • Analyze offenses generated by JSA
  • Investigate suspected attacks and policy breaches.

Course Contents

Day 1

Module 1: Course Introduction

Module 2: Define the JSA Series Device

  • Overview of the JSA Series Device
  • Describe components of JSA
  • Explain how JSA collects data
  • Describe the basic architecture of JSA

Module 3: Administer the JSA Application

  • Explain the JSA install process
  • Describe the JSA GUI
  • Configure users and roles
  • Explain the EPS Licensing
  • Lab 1: Initial Configuration

Module 4: Log Data

  • Explain how a DSM functions
  • Describe how JSA processes log data
  • Configure the Log Source Management App
  • Lab 2: Log Activity

Day 2

Module 5: Network Data

  • Describe how JSA processes network data
  • Configure Flow capture on JSA
  • Lab 2: Network Activity

Module 6: Assets and Vulnerabilities

  • Describe Network Hierarchies
  • Explain the Asset Interface
  • Describe Vulnerability Scanners
  • Lab 3: Assets and Vulnerabilities

Module 7: Domains and Tenants

  • Describe how to Segregate Data
  • Explain how to Collect Data from Multiple Organizations

Chapter 8: Rules and Building Blocks

  • Describe Rules in JSA
  • Explain How to Use Building Blocks
  • Configure Rules and Building Blocks
  • Lab 5: Rules

Day 3

Chapter 9: Investigate Offenses Found in Data

  • Describe Offense Types
  • Configure Offense Manager
  • Use Offense Manager to Investigate Offenses
  • Lab 6: Offense Manager

Chapter 10: Create and Customize Reports

  • Use the Reports Interface
  • Configure Reports
  • Customize Reports
  • Lab 7: Reporting

Chapter 11: Troubleshoot and Tune the JSA Application

  • Customize Dashboards
  • Troubleshoot JSA
  • Tuning JSA

Module 12: Discover Apps

  • Discover Apps that work with JSA
  • Configure new apps to work with JSA
  • Explain when to use Apps
  • Lab 8: Explore JSA Apps

Appendix A: High Availability

  • High Availability
  • Configuring High Availability

Appendix B: Configuring Junos Devices for Use with JSA


  Below is a list of scheduled dates when this event will take place. Some events require registration for attendance so you will need to click on the date for more information regarding the specific event.

If you don't see the date you prefer, please contact us to request a date or schedule your custom training session.

Display dates for 

Date  Subject Region Location Facilitator Language Status
1/10/2022 9:00 AM CET Implementing Juniper Networks Secure Analytics (IJSA) - ILO Europe, Middle East and Africa (EMEA) Instructor-led Online Juniper Networks English Open