> > > AJSEC Detailed outline

Advanced Junos Security (AJSEC)

Course Description Kurs tarihleri Course Outline

Detailed Course Outline

Day 1

Chapter 1: Course Introduction
Chapter 2: Junos Layer 2 Packet Handling and Security Features
  • Transparent Mode Security
  • Secure Wire
  • Layer 2 Next Generation Ethernet Switching
  • MACsec
  • Lab 2: Implementing Layer 2 Security
Chapter 3: Virtualization
  • Virtualization Overview
  • Routing Instances
  • Logical Systems
  • Lab 3: Implementing Junos Virtual Routing
Chapter 4: AppSecure Theory
  • AppSecure Overview
  • AppID Overview
  • AppID Techniques
  • Application System Cache
  • Custom Application Signatures

Day 2

Chapter 5: AppSecure Implementation
  • AppTrack
  • AppFW
  • AppQoS
  • APBR
  • SSL Proxy
  • Lab 4: Implementing AppSecure
Chapter 6: Working with Log Director
  • Log Director Overview
  • Log Director Components
  • Installing and setting up Log Director
  • Clustering with the Log Concentrator VM
  • Administrating Log Director
  • Lab 5: Deploying Log Director

Day 3

Chapter 7: Sky ATP Theory
  • Sky ATP Overview
  • Monitoring Sky ATP
  • Analysis and Detection of Malware
Chapter 8: Sky ATP Implementation
  • Configuring Sky ATP
  • Installing Sky ATP
  • Analysis and detection of Malware
  • Infected Host Case Study
  • Lab 6: Instructor Led Sky ATP Demo
Chapter 9: Implementing UTM
  • UTM Overview
  • AntiSpam
  • AntiVirus
  • Content and Web Filtering
  • Lab 7: Implementing UTM

Day 4

Chapter 10: Introduction to IPS
  • IPS Overview
  • Network Asset Protection
  • Intrusion Attack Methods
  • Intrusion Prevention Systems
  • IPS Inspection Walkthrough
Chapter 11: IPS Policy and Configuration
  • SRX IPS Requirements
  • IPS Operation Modes
  • Basic IPS Policy Review
  • IPS Rulebase Operations
  • Lab 8: Implementing Basic IPS Policy

Day 5

Chapter 12: SDSN
  • SDSN Overview
  • SDSN Components
  • SDSN Configuration
  • Policy Enforcer Troubleshooting
  • SDSN Use Cases
  • Lab 9: Implementing SDSN
Chapter 13: Enforcement, Monitoring, and Reporting
  • User Role Firewall and Integrated User Firewall Overview
  • User Role Firewall Implementation
  • Monitoring User Role Firewall
  • Integrated User Firewall Implementation
  • Monitoring Integrated User Firewall
  • Lab 10: Configure User Role Firewall and Integrated User Firewall
Chapter 14: Troubleshooting Junos Security
  • Troubleshooting Methodology
  • Troubleshooting Tools
  • Identifying IPsec Issues
  • Lab 11: Performing Security Troubleshooting Techniques
Appendix A: SRX Series Hardware and Interfaces
  • Branch SRX Platform Overview
  • High End SRX Platform Overview
  • SRX Traffic Flow and Distribution
  • SRX Interfaces
 

Cookies help us deliver our services. By using our services, you agree to our use of cookies.   Got it!