Speak to our team now +44 (0)1737 821590

Advanced Junos Security

A 5 day
training course

Advanced Junos Security training course description

This course is designed to build off of the current Junos Security offering, delving deeper into Junos security. Through demonstrations and hands-on labs, you will gain experience in configuring and monitoring the advanced Junos OS security features with advanced coverage of virtualization, AppSecure, advanced Network Address Translation (NAT) deployments, Layer 2 security, and Sky ATP.

Key outcomes from this course

By the end of the course delegates will be able to:
  • Demonstrate the understanding of integrated user firewall.
  • Implement next generation Layer 2 security features.
  • Implement virtual routing instances in a security setting.
  • Utilize Junos tools for troubleshooting Junos security implementations.
  • Implement IPS policy.

Advanced Junos Security training course details

Who will benefit:
Individuals responsible for implementing, monitoring, and troubleshooting Junos security components.
Advanced Junos Security training course prerequisites:
Junos Security
5 days

Training approach

This structured course uses Instructor Led Training to provide the best possible learning experience. Small class sizes ensure students benefit from our engaging and interactive style of teaching with delegates encouraged to ask questions throughout the course. Quizzes follow each major section allowing checking of learning. Hands on sessions are used throughout to allow delegates to consolidate their new skills.

Overall rating:

Customer reviews

"Explained everything required and was tailored to our needs during the course. "
M. C. Aker Subsea
"Good mix of theory and practice."
A. S. Selex ES

Advanced Junos Security training course contents

Junos Layer 2 Packet Handling and Security Features
Transparent Mode Security
Secure Wire
Layer 2 Next Generation Ethernet Switching
Lab 2: Implementing Layer 2 Security

Virtualization Overview
Routing Instances
Logical Systems
Lab 3: Implementing Junos Virtual Routing

AppSecure Theory
AppSecure Overview
AppID Overview
AppID Techniques
Application System Cache
Custom Application Signatures

AppSecure Implementation
SSL Proxy
Lab 4: Implementing AppSecure

Working with Log Director
Log Director Overview
Log Director Components
Installing and setting up Log Director
Clustering with the Log Concentrator VM
Administrating Log Director
Lab 5: Deploying Log Director

Sky ATP Theory
Sky ATP Overview
Monitoring Sky ATP
Analysis and Detection of Malware

Sky ATP Implementation
Configuring Sky ATP
Installing Sky ATP
Analysis and detection of Malware
Infected Host Case Study
Lab 6: Instructor Led Sky ATP Demo

Implementing UTM
UTM Overview
Content and Web Filtering
Lab 7: Implementing UTM

Introduction to IPS
IPS Overview
Network Asset Protection
Intrusion Attack Methods
Intrusion Prevention Systems
IPS Inspection Walkthrough

IPS Policy and Configuration
SRX IPS Requirements
IPS Operation Modes
Basic IPS Policy Review
IPS Rulebase Operations
Lab 8: Implementing Basic IPS Policy

SDSN Overview, Components & Configuration
Policy Enforcer Troubleshooting
SDSN Use Cases
Lab 9: Implementing SDSN

Enforcement, Monitoring, and Reporting
User Role Firewall and Integrated User Firewall Overview
User Role Firewall Implementation
Monitoring User Role Firewall
Integrated User Firewall Implementation
Monitoring Integrated User Firewall
Lab 10: Configure User Role Firewall and Integrated User Firewall

Troubleshooting Junos Security
Troubleshooting Methodology
Troubleshooting Tools
Identifying IPsec Issues
Lab 11: Performing Security Troubleshooting Techniques

Appendix A: SRX Series Hardware and Interfaces
Branch SRX Platform Overview
High End SRX Platform Overview
SRX Traffic Flow and Distribution
SRX Interfaces

Why Choose Us

SNT trainers score an average of over 90% on the three main areas of:
  • Ability to teach
  • Technical knowledge
  • Answering questions
“Excellently presented by a very knowledgeable and enthusiastic trainer.” P.D. General Dynamics

We limit our maximum class size to 8 delegates; often we have less than this. This ensures optimal interactivity between delegates and instructor.
"Excellent course. The small class size was a great benefit…" M.B. IBM

We write our own courses; courseware does not just consist of slides and our slides are diagrams not bullet point text. A typical chapter provides clearly defined objectives with a chapter overview, slides with text underneath, a quiz at the end to check the learning of the students. Hands on exercises are at the end and are used to reinforce the theory.

See Dates & Prices for this course

To enquire about this course

To reserve this course online