​K Labs mette a tua disposizione i propri Trainers Certificati, i Laboratori Didattici, i Simulatori di Esame, il proprio Test Center e un Tutor a te dedicato per la preparazione all'esame.


Grazie al nostro supporto la percentuale di candidati che ottengono la certificazione al primo tentativo è prossima al 100%.​

fabio-oyxis2kalvg-unsplash (1).jpeg
939869167014516ec34430a26728e18e 2
939869167014516ec34430a26728e18e 2

Rimani aggiornato sulle novità formative.

Lasciaci la tua e-mail!​

Rimani aggiornato sulle novità formative.

Lasciaci la tua e-mail!​

logo k labs nuovo-white

RICERCA CORSI

logo k labs nuovo-white

K Labs S.r.l.

Tel. +39 059 821229 | info@klabs.it

P.Iva IT02034520367

NewCondition 2281.40
Pre-Order
big-data-bigda

NewCondition 2281.40
Pre-Order
ip-advanced-ipadv

NewCondition 2281.40
Pre-Order
ipv6-ipv6

NewCondition 2281.40
Pre-Order
wireless-lan-wlan

NewCondition 2281.40
Pre-Order
mpls-networks-mplsn

NewCondition 2281.40
Pre-Order
ip-routing-protocols-routi

NewCondition 1854.40
Pre-Order
integrated-control-safety-system

NewCondition 2281.40
Pre-Order
ip-management-ipmgm

NewCondition 2281.40
Pre-Order
network-analysis-and-troubleshooting-through-wireshark-atrws

NewCondition 2659.60
Pre-Order
certified-kubernetes-administrator-lfs458-cka

NewCondition 2659.60
Pre-Order
red-hat-openshift

NewCondition 2281.40
Pre-Order
dvb-architectures-management-and-testing-for-digital-television-dvbtv

NewCondition 3013.40
Pre-Order
full-stack-web-development

NewCondition 2000.00
Pre-Order
next-generation-ict-security-nxtsec

NewCondition 4000.00
Pre-Order
penetration-testing-pentest

NewCondition 2659.60
Pre-Order
blockchain-technology-and-applications-blkcn

NewCondition 2000.00
Pre-Order
5g-technologies-overview-5gtec

NewCondition 2281.40
Pre-Order
5g-network-infrastructures-5gnet

NewCondition 1854.40
Pre-Order
5g-access-network-5gan

NewCondition 1854.40
Pre-Order
implementing-lte-network-ltesae

1 2 3 4 5 18

JUNIPER
SECURITY
Introduction to Junos Security, JNCIA, JNCIA-SEC, Juniper Networks, Juniper Networks Certified Associate Security, ijsec

NewCondition 2440.00
Pre-Order
DURATION
3 days

LEVEL
Basic

OBJECTIVES
This course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. The course provides a brief overview of security problems and how Juniper Networks approaches a complete security solution with Juniper Connected Security. Key topics include configuration tasks for initial system configuration, interface configuration, security object configuration, security policy configuration, IPsec VPN configuration, and NAT configuration. The course then delves into Layer 7 security using UTM, IDP, and AppSecure to provide students with the understanding of application level security to block advanced threats. An overview of Sky ATP is included for students to understand zero-day network protection technologies. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations.

PREREQUISITES
Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite.

WHO SHOULD ATTEND
This course benefits Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers.

TOPICS
Juniper Security Concepts
Security Challenges
Security Design Overview
Juniper Connected Security

Juniper Connected Security – SRX Series Devices
SRX Architectural Overview
Traffic Processing
J-Web Overview
Initial Configuration
Interface Configuration
Lab 1: Initial Configuration

Security Objects
Security Zone Objects
Security Screen Objects
Security Address Objects
Security Services Objects
Lab 2: Creating Security Objects with J-Web

Security Policies
Security Policy Overview
Security Policy Components
Application Firewall with Unified Security Policies
Security Policy Case Study
Lab 3: Implementing Security Policies

Security Services – IDP and User Firewall
Introduction to IPS
IPS Policy Components
Configuring IPS Policies
User Firewall Overview
Configuring Integrated User Firewall
Lab 4: Implementing Security Services

Security Services - UTM
Content Filtering
Web Filtering
Antivirus
Antispam
Lab 5: Implementing UTM

Juniper Connected Security – Sky ATP
Sky ATP Overview
Sky ATP Features
Sky ATP Setup
Monitor Sky ATP
Lab 6: Demonstrating Sky ATP

Network Address Translation
NAT Overview
Source NAT
Destination NAT
Static NAT
Lab 7: Implementing Network Address Translation

Site-to-Site VPNs
IPsec Site-to-Site VPN Configuration
IPsec Site-to-Site VPN Case Study
Proxy IDs and Traffic Selectors
Monitoring Site-to-Site IPsec VPNs
Lab 8: Implementing Site-to-Site IPsec VPNs

Monitoring and Reporting
Monitor Platform and Interface Operations
J-Web Reporting options
Lab 9: Using Monitoring and Reporting
introduction-to-junos-security-ijsec

PRIVACY E COOKIE

PRIVACY E COOKIE

CODICE ETICO

©2024  K LABS Srl - TUTTI I DIRITTI RISERVATI


linkedin

©2024  K LABS Srl - TUTTI I DIRITTI RISERVATI


linkedin

FOLLOW US

FOLLOW US