Detailed Course Outline
Day 1
Chapter 1: Course Introduction
Chapter 2: Junos Layer 2 Packet Handling and Security Features
- Transparent Mode Security
- Secure Wire
- Layer 2 Next Generation Ethernet Switching
- MACsec
Lab 2: Implementing Layer 2 Security
Chapter 3: Virtualization
- Virtualization Overview
- Routing Instances
- Logical Systems
Lab 3: Implementing Junos Virtual Routing
Chapter 4: AppSecure Theory
- AppSecure Overview
- AppID Overview
- AppID Techniques
- Application System Cache
- Custom Application Signatures
Day 2 Chapter 5: AppSecure Implementation
- AppTrack
- AppFW
- AppQoS
- APBR
- SSL Proxy
Lab 4: Implementing AppSecure
Chapter 6: Working with Log Director
- Log Director Overview
- Log Director Components
- Installing and setting up Log Director
- Clustering with the Log Concentrator VM
- Administrating Log Director
Lab 5: Deploying Log Director
Day 3
Chapter 7: Sky ATP Theory
- Sky ATP Overview
- Monitoring Sky ATP
- Analysis and Detection of Malware
Chapter 8: Sky ATP Implementation
- Configuring Sky ATP
- Installing Sky ATP
- Analysis and detection of Malware
- Infected Host Case Study
Lab 6: Instructor Led Sky ATP Demo
Chapter 9: Implementing UTM
- UTM Overview
- AntiSpam
- AntiVirus
- Content and Web Filtering
Lab 7: Implementing UTM
Day 4
Chapter 10: Introduction to IPS
- IPS Overview
- Network Asset Protection
- Intrusion Attack Methods
- Intrusion Prevention Systems
- IPS Inspection Walkthrough
Chapter 11: IPS Policy and Configuration
- SRX IPS Requirements
- IPS Operation Modes
- Basic IPS Policy Review
- IPS Rulebase Operations
Lab 8: Implementing Basic IPS Policy
Day 5
Chapter 12: SDSN
- SDSN Overview
- SDSN Components
- SDSN Configuration
- Policy Enforcer Troubleshooting
- SDSN Use Cases
Lab 9: Implementing SDSN
Chapter 13: Enforcement, Monitoring, and Reporting
- User Role Firewall and Integrated User Firewall Overview
- User Role Firewall Implementation
- Monitoring User Role Firewall
- Integrated User Firewall Implementation
- Monitoring Integrated User Firewall
Lab 10: Configure User Role Firewall and Integrated User Firewall
Chapter 14: Troubleshooting Junos Security
- Troubleshooting Methodology
- Troubleshooting Tools
- Identifying IPsec Issues
Lab 11: Performing Security Troubleshooting Techniques
Appendix A: SRX Series Hardware and Interfaces
- Branch SRX Platform Overview
- High End SRX Platform Overview
- SRX Traffic Flow and Distribution
- SRX Interfaces