Detailed Course Outline
Day 1- Course Introduction- SSL Proxy
- Explain why SSL proxy is necessary
- Describe and configure client-protection SSL proxy
- Describe and configure server-protection SSL proxy
- Discuss how to monitor SSL proxy
- Explain SSL mirror decrypt feature
- Lab 1: SSL Proxy Client Protection
Application Security Theory
- Describe the functionality of the AppSecure suite
- Explain how application identification works
- Describe how to create custom application signatures
- Explain the purpose of the application system cache
Application Security Implementation
- Discuss in depth the AppSecure modules
- Lab 2: Implementing AppSecure
Unified Security Policies
- Explain unified security policy evaluation
- Explain URL Category options
- Lab 3: Unified Security Policies
Day 2- Security Policy Options
- Explain session management options
- Explain Junos ALG functionality
- Implement policy scheduling
- Explain logging
- Lab 4: Security Policy Options
Intrusion Detection and Prevention
- Describe the purpose of IPS
- Utilize and update the IPS signature database
- Configure IPS policy
- Utilize and configure IPS policy using a template
- Monitor IPS operations Lab 5: IPS
Juniper ATP Cloud
- Describe the Juniper ATP Cloud Web UI options
- Configure the SRX Series Firewall to use Juniper ATP Cloud anti-malware
- Discuss an Infected Host case study
- Lab 6: Juniper ATP Cloud Anti-Malware
Juniper ATP Cloud Features
- Explain Security Intelligence
- Describe Encrypted Traffic Insights
- Describe Adaptive Threat Profiling
- Explain IoT Security
- Lab 7: ATP Cloud Features
Day 3- Introduction to Security Director
- Explain how to use Security Director
- Describe how to configure firewall policies
- Deploy configuration changes using Security Director
- Lab 8: Working with Security Director
Security Director with Policy Enforcer
- Explain how to configure a secure fabric
- Describe how infected host remediation occurs
- Lab 9: Configuring Juniper Connected Security
Virtual SRX and cSRX
- Explain virtualization
- Discuss network virtualization and software-defined networking
- Review the virtual SRX platform
- Review the cSRX platform
- Deploy the virtual SRX
- Integrate the virtual SRX with public cloud services
- Lab 10: vSRX Implementation
Juniper Identity Management Service
- Explain how to install Juniper Identity Management Service
- Configure Juniper Identity Management Service
- Describe troubleshooting Juniper Identity Management Service
- Lab 11: Juniper Identity Management Service
Day 4- Chassis Cluster Concepts
- Describe chassis clusters
- Identify chassis cluster components
- Describe chassis cluster operation
Chassis Cluster Implementation
- Configure chassis clusters
- Describe advanced chassis cluster options
- Lab 12: Implementing Chassis Clusters
Chassis Cluster Troubleshooting
- Troubleshoot chassis clusters
- Review chassis cluster case studies
Lab 13: Troubleshooting Chassis Clusters Day 5- Juniper ATP Appliance—Overview
- Explain the Cyber Kill Chain model
- Define deployment models for Juniper ATP Appliance
Implementing Juniper ATP Appliance
- Describe how to configure an SRX Series device with ATP Appliance
- Describe how to mitigate a threat with the ATP Appliance Web UI
- Demo Video: Implementing Juniper ATP Appliance
Juniper Secure Analytics
- Describe the JSA Series device and its basic functionality
- Define how JSA processes log activity
- Explain how JSA processes network activity
- Explain how to customize the processing of information
- Lab 14: Monitoring with JSA