+44 (0)1737 821590
Advanced Junos Security  |    A 5 day   hands on   training course

Advanced Junos Security training course description

This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course.

What will you learn
  • Demonstrate the understanding of integrated user firewall.
  • Implement next generation Layer 2 security features.
  • Implement virtual routing instances in a security setting.
  • Utilize Junos tools for troubleshooting Junos security implementations.
  • Implement IPS policy.
Advanced Junos Security training course details

Advanced Junos Security training course contents

  • Junos Layer 2 Packet Handling and Security Features
  • Transparent Mode Security
    Secure Wire
    Layer 2 Next Generation Ethernet Switching
    Lab 2 Implementing Layer 2 Security

  • Virtualization
  • Virtualization Overview
    Routing Instances
    Logical Systems
    Lab 3 Implementing Junos Virtual Routing

  • AppSecure Theory
  • AppSecure Overview
    AppID Overview
    AppID Techniques
    Application System Cache
    Custom Application Signatures

  • AppSecure Implementation
  • AppTrack
    SSL Proxy
    Lab 4 Implementing AppSecure

  • Working with Log Director
  • Log Director Overview
    Log Director Components
    Installing and setting up Log Director
    Clustering with the Log Concentrator VM
    Administrating Log Director
    Lab 5 Deploying Log Director

  • Sky ATP Theory
  • Sky ATP Overview
    Monitoring Sky ATP
    Analysis and Detection of Malware

  • Sky ATP Implementation
  • Configuring Sky ATP
    Installing Sky ATP
    Analysis and detection of Malware
    Infected Host Case Study
    Lab 6 Instructor Led Sky ATP Demo

  • Implementing UTM
  • UTM Overview
    Content and Web Filtering
    Lab 7 Implementing UTM

  • Introduction to IPS
  • IPS Overview
    Network Asset Protection
    Intrusion Attack Methods
    Intrusion Prevention Systems
    IPS Inspection Walkthrough
    IPS Policy and Configuration
    SRX IPS Requirements
    IPS Operation Modes
    Basic IPS Policy Review
    IPS Rulebase Operations
    Lab 8 Implementing Basic IPS Policy

  • SDSN
  • SDSN Overview, Components & Configuration
    Policy Enforcer Troubleshooting
    SDSN Use Cases
    Lab 9 Implementing SDSN

  • Enforcement, Monitoring, and Reporting
  • User Role Firewall and Integrated User Firewall Overview
    User Role Firewall Implementation
    Monitoring User Role Firewall
    Integrated User Firewall Implementation
    Monitoring Integrated User Firewall
    Lab 10 Configure User Role Firewall and Integrated User Firewall

  • Troubleshooting Junos Security
  • Troubleshooting Methodology
    Troubleshooting Tools
    Identifying IPsec Issues
    Lab 11 Performing Security Troubleshooting Techniques

  • Appendix A: SRX Series Hardware and Interfaces
  • Branch SRX Platform Overview
    High End SRX Platform Overview
    SRX Traffic Flow and Distribution
    SRX Interfaces

Learning path



Based on all reviews

M. C. - Aker Subsea

"Explained everything required and was tailored to our needs during the course."

A. S. - Selex ES

"Good mix of theory and practice."

Training approach

This structured course uses Instructor Led Training to provide the best possible learning experience. Small class sizes ensure students benefit from our engaging and interactive style of teaching with delegates encouraged to ask questions throughout the course. Quizzes follow each major section allowing checking of learning. Hands on sessions are used throughout to allow delegates to consolidate their new skills.