Security Specialist Bootcamp (JNCIS-SEC)
This bootcamp is designed to prepare students for the JNCIS-SEC certification exam. The content of the Junos Security (JSEC) and Unified Threat Management (JUTM) courses will be covered. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the JUNOS Software and monitoring device operations.
JSEC: This course covers configuration, operation, and implementation of SRX Series Services Gateways in a typical network environment. Key topics within this course include security technologies such as security zones, security policies, intrusion detection and prevention (IDP), Network Address Translation (NAT), and high availability clusters, as well as details pertaining to basic implementation, configuration, and management.
JUTM: This one-day course includes detailed coverage of Web filtering, antivirus (AV), antispam, and content filtering. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Unified Threat Management (UTM) features of the Junos operating system.
Target audience: This course benefits individuals responsible for configuring and monitoring SRX Series Services Gateways and individuals who want to achieve the JNCIS-SEC certification.
Prerequisites: Students should have basic networking knowledge and an understanding of the OSI model and the TCP/IP protocol suite. Students should have attended the Introduction to Junos OS (IJOS) and Junos Routing Essentials (JRE) courses or should have equivalent knowledge and experience.
Objectives: After successfully completing this course, you should be able to:
- Describe traditional routing and security and the current trends in internetworking
- Provide an overview of the JUNOS security platforms and software architecture
- Describe the logical packet flow and session creation performed by JUNOS security platforms
- Describe, configure, and monitor zones
- Describe, configure, and monitor security policies
- Describe, configure, and monitor firewall user authentication
- Describe various types of network attacks
- Configure and monitor SCREEN options to prevent network attacks
- Explain, implement, and monitor NAT as implemented on JUNOS security platforms
- Explain the purpose and mechanics of IPsec VPNs
- Implement and monitor policy-based and route-based IPsec VPNs
- Utilize and update the IDP signature database on JUNOS security platforms
- Configure and monitor IDP policy with policy templates
- Describe, configure, and monitor high availability chassis clusters.
- Describe the challenges that branch offices present to network managers.
- List the major features that UTM offers.
- Explain how each major feature addresses the challenges of the branch office.
- List the SRX Series Services Gateways hardware devices on which UTM is available.
- Describe the UTM features that require specific licenses.
- Define terms used in the creation of effective antispam UTM policies.
- Describe the process by which UTM examines traffic for spam.
- Describe the overall process of configuring an antispam UTM policy.
- Describe the kinds of information available from the device when it has detected spam.
- Describe how the AV process examines traffic.
- Describe the differences between full file-based AV versus express AV.
- Describe the settings that are required for configuring AV protection.
- Explain how these settings affect scanning performance and effectiveness.
- Describe options available for scanning supported protocols.
- List the general steps required to configure AV.
- Describe the statistical information available to verify AV functionality.
- Describe content and Web filtering and their purpose.
- List and describe each of the parameters used when configuring Web and content filtering.
- Describe in general terms the steps necessary to configure web and content filtering.
- Monitor Web and content filtering.
Certification: JSEC + JUTM + exam = JNCIS-SEC
Duration: 3 days