Sécurité avancée Junos - Juniper
- Référence AJSEC
- Durée 3 jour(s)
- Version 20.1R
Modalité pédagogique
Options de paiement complémentaires
-
GTC 57 TTC
Les GTC sont proposés en exclusivité aux partenaires autorisés afin de gagner du temps et de fluidifier le processus d'achat des formations chez Global Knowledge. Il s’agit d’un crédit universel qui peut être utilisé dans les centres Global Knowledge à travers le monde.
Classe inter à distance Prix
EUR4 090,00
hors TVA
Demander une formation en intra-entreprise S'inscrireAller à:
Modalité pédagogique
La formation est disponible dans les formats suivants:
-
Classe inter à distance
Depuis n'importe quelle salle équipée d'une connexion internet, rejoignez la classe de formation délivrée en inter-entreprises.
-
Classe inter en présentiel
Formation délivrée en inter-entreprises. Cette méthode d'apprentissage permet l'interactivité entre le formateur et les participants en classe.
-
Intra-entreprise
Cette formation est délivrable en groupe privé, et adaptable selon les besoins de l’entreprise. Nous consulter.
Demander cette formation dans un format différent
Résumé
Haut de pageThis four-day course, which is designed to build off the current Juniper Security (JSEC) offering, delves deeper into Junos security, next-generation security features, and ATP supporting software. Through demonstrations and hands-on labs, you will gain experience in configuring and monitoring the advanced Junos OS security features with advanced coverage of advanced logging and reporting, next generation Layer 2 security, next generation advanced anti-malware with Juniper ATP On-Prem and SecIntel. This course uses Juniper Networks SRX Series Services Gateways for the hands-on component. This course is based on Junos OS Release 20.1R1.11, Junos Space Security Director 19.4, Juniper ATP On-Prem version 5.0.7.
Prochaines dates
Haut de pagePublic
Haut de page- This course benefits individuals responsible for implementing, monitoring, and troubleshooting Juniper security components.
Objectifs de la formation
Haut de page- Demonstrate understanding of concepts covered in the prerequisite Juniper Security courses.
- Describe the various forms of security supported by the Junos OS.
- Describe the Juniper Connected Security model.
- Describe Junos security handling at Layer 2 versus Layer 3.
- Implement next generation Layer 2 security features.
- Demonstrate understanding of Logical Systems (LSYS).
- Demonstrate understanding of Tenant Systems (TSYS).
- Implement virtual routing instances in a security setting.
- Describe and configure route sharing between routing instances using logical tunnel interfaces.
- Describe and discuss Juniper ATP and its function in the network.
- Describe and implement Juniper Connected Security with Policy Enforcer in a network.
- Describe firewall filters use on a security device.
- Implement firewall filters to route traffic.
- Explain how to troubleshoot zone problems.
- Describe the tools available to troubleshoot SRX Series devices.
- Describe and implement IPsec VPN in a hub-and-spoke model.
- Describe the PKI infrastructure.
- Implement certificates to build an ADVPN network.
- Describe using NAT, CoS and routing protocols over IPsec VPNs.
- Implement NAT and routing protocols over an IPsec VPN.
- Describe the logs and troubleshooting methodologies to fix IPsec VPNs.
- Implement working IPsec VPNs when given configuration that are broken.
- Describe Incident Reporting with Juniper ATP On-Prem device.
- Configure mitigation response to prevent spread of malware.
- Explain SecIntel uses and when to use them.
- Describe the systems that work with SecIntel.
- Describe and implement advanced NAT options on the SRX Series devices.
- Explain DNS doctoring and when to use it.
- Describe NAT troubleshooting logs and techniques.
Programme détaillé
Haut de pageDay 1
1 COURSE INTRODUCTION
2 Junos Layer 2 Packet Handling and Security Features
- Transparent Mode Security
- Secure Wire
- Layer 2 Next Generation Ethernet Switching
- MACsec
LAB 1: Implementing Layer 2 Security
3 Firewall Filters
- Using Firewall Filters to Troubleshoot
- Routing Instances
- Filter-Based Forwarding
LAB 2: Implementing Firewall Filters
4 Troubleshooting Zones and Policies
- General Troubleshooting for Junos Devices
- Troubleshooting Tools
- Troubleshooting Zones and Policies
- Zone and Policy Case Studies
LAB 3: Troubleshooting Zones and Policies
Day 2
5 Hub-and-Spoke VPN
- Overview
- Configuration and Monitoring
LAB 4: Implementing Hub-and-Spoke VPNs
6 Advanced NAT
- Configuring Persistent NAT
- Demonstrate DNS Doctoring
- Configure IPv6 NAT Operations
- Troubleshooting NAT
LAB: 5: Implementing Advanced NAT Features
7 Logical and Tenant Systems
- Overview
- Administrative Roles
- Differences Between LSYS and TSYS
- Configuring LSYS
- Configuring TSYS
LAB 6: Implementing TSYS
Day 3
8 PKI and ADVPNs
- PKI Overview
- PKI Configuration
- ADVPN Overview
- ADVPN Configuration and Monitoring
LAB 7: Implementing ADVPNs
9 Advanced IPsec
- NAT with IPsec
- Class of Service with IPsec
- Best Practices
- Routing OSPF over VPNs
LAB 8: Implementing Advanced IPsec Solutions
10 Troubleshooting IPsec
- IPsec Troubleshooting Overview
- Troubleshooting IKE Phase 1 and 2
- IPsec Logging
- IPsec Case Studies
LAB 9: Troubleshooting IPsec
Day 4
11 Juniper Connected Security
- Security Models
- Enforcement on Every Network Device
12 SecIntel
- Security Feed
- Encrypted Traffic Analysis
- Use Cases for SecIntel
LAB 10: Implementing SecIntel
13 Advanced Juniper ATP On-Prem
- Collectors
- Private Mode
- Incident Response
- Deployment Models
LAB 11: Implementing Advanced ATP On-Prem
14 Automated Threat Mitigation
- Identify and Mitigate Malware Threats
- Automate Security Mitigation
LAB 12: Identifying and Mitigating Threats
A Group VPNs
- Overview
- Implementing Group VPNs
Pré-requis
Haut de page- Strong level of TCP/IP networking and security knowledge
- Complete the Juniper Security (JSEC) course prior to attending this class
Produits associés
Haut de page- /fr-fr/-/media/global-knowledge/merchandising/right-side-column/fr/reviews/review-juniper.png #000000
- <table style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;" border="3" cellspacing="2" cellpadding="5" data-mce-style="width: 100%; border-collapse: collapse; border-style: solid; border-color: #141c36; float: left;"><tbody><tr><td style="width: 100%;" data-mce-style="width: 100%;"><p style="text-align: left;" data-mce-style="text-align: left;"><strong><span style="color: #141c36;" data-mce-style="color: #141c36;">Délais d’inscription</span></strong></p><hr /><p style="text-align: left;" data-mce-style="text-align: left;">Avant le début de la formation <strong>jusqu’à 5 jours ouvrés sous réserve de disponibilité </strong>sauf dans le cas d'un financement <a title="compte CPF" href="https://www.globalknowledge.com/fr-fr/formations/compte-personnel-de-formation-cpf" data-mce-href="https://www.globalknowledge.com/fr-fr/formations/compte-personnel-de-formation-cpf">CPF,</a> jusqu'à 11 jours ouvrés. <a rel="noopener noreferrer" title="formations éligibles CPF" href="mailto:cpf@globalknowledge.fr" target="_blank" rel="noopener noreferrer" data-mce-href="mailto:cpf@globalknowledge.fr">Contactez-nous</a> pour connaître les formations éligibles.</p></td></tr></tbody></table><p><br /></p>
- #000000
- #000000
- AJSEC
- Sécurité avancée Junos - Juniper
- Securite
- Formation Juniper AJSEC - sécurté avancée Junos
- Juniper