This course is designed to provide students with the foundational knowledge required to work with SRX Series devices.
This course will use the J-Web user interface to introduce students to the Junos operating system.
The course provides a brief overview of security problems and how Juniper Networks approaches a complete security solution with Juniper Connected Security.
Key topics include configuration tasks for initial system configuration, interface configuration, security object configuration, security policy configuration, IPsec VPN configuration, and NAT configuration.
The course then delves into Layer 7 security using UTM, IDP, and AppSecure to provide students with the understanding of application level security to block advanced threats.
An overview of Sky ATP is included for students to understand zero-day network protection technologies.
Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations.
This course is based on Junos OS Release 19.1R1.6.
IJSEC is an introductory-level course.
- Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite.
Delegates will learn how to
- Identify high-level security challenges in today’s networks.
- Identify products that are incorporated into the Juniper Connected Security solution.
- Explain the value of implementing security solutions.
- Explain how Juniper Connected Security solves the cyber security challenges of the future.
- Explain the SRX Series devices and the added capabilities that next-generation firewalls provide.
- Explain traffic flows through the SRX Series devices.
- List the different security objects and how to create them.
- Describe interface types and perform basic interface configuration tasks.
- Describe the initial configuration for an SRX Series device.
- Explain security zones.
- Describe screens and their use.
- Explain address objects.
- Describe services and their use.
- Describe the purpose for security policies on an SRX Series device.
- Describe zone-based policies.
- Describe global policies and their use.
- Explain unified security policies.
- Configure unified security policies with the J-Web user interface.
- Describe IDP signatures.
- Configure an IDP policy using predefined templates with the J-Web user interface.
- Describe the use and configuration of the integrated user firewall feature.
- Describe the UTM security services
- List the available UTM services on the SRX Series device.
- Configure UTM filtering on a security policy with the J-Web user interface.
- Explain Sky ATP’s use in security.
- Describe how Sky ATP and SRX Series devices operate together in blocking threats.
- Describe NAT and why it is used.
- Explain source NAT and when to use it.
- Explain destination NAT and when to use it.
- Explain static NAT and its uses.
- Describe the operation and configuration the different types of NAT.
- Identify various types of VPNs.
- Describe IPsec VPNs and their functionality.
- Describe how IPsec VPNs are established.
- Describe IPsec traffic processing.
- Configure IPsec VPNs with the J-Web user interface.
- Describe and configure proxy IDs and traffic selectors with the J-Web user interface.
- Monitor IPsec VPNs with the J-Web user interface.
- Describe the J-Web monitoring features.
- Explain the J-Web reporting features.
- Describe the Sky Enterprise service and how it can save resources.
- Explain the functionality of Junos Space Security Director.
1 COURSE INTRODUCTION
2 Juniper Security Concepts
- Security Challenges
- Security Design Overview
- Juniper Connected Security
3 Juniper Connected Security – SRX Series Devices
- Connected Security
- Initial Configuration
LAB 1: Initial Configuration
4 Security Objects
- Security Zone Objects
- Security Screen Objects
- Security Address Objects
- Security Services Objects
LAB 2: Creating Security Objects with J-Web
5 Security Policies
- Security Policy Overview
- Zone-Based Policies
- Global Security Policies
- Application Firewall with Unified Security Policies
LAB 3: Creating Security Policies with J-Web
6 Security Services – IDP and User Firewall
- IDP Security Services
- Integrated User Firewall
LAB 4: Adding IDP and User Firewall Security Services to Security Policies
7 Security Services – UTM
- Content Filtering
- Web Filtering
LAB 5: Adding UTM Security Services to Security Policies
8 Juniper Connected Security – Sky ATP
- Sky ATP Overview
- Blocking Threats
Lab 6: Demonstrating Sky ATP
9 Network Address Translation
- NAT Overview
- Source NAT
- Destination NAT
- Static NAT
Lab 7: Implementing Network Address Translation
10 IPsec VPN Concepts
- VPN Types
- Secure VPN Requirements
- IPsec Tunnel Establishment
- IPsec Traffic Processing
11 Site-to-Site VPNs
- IPsec Configuration
- IPsec Site-to-Site Tunnel
Lab 8: Implementing Site-to-Site IPsec VPNs
12 Monitoring and Reporting
- J-Web monitoring options
- J-Web Reporting options
Lab 9: Using Monitoring and Reporting
- Appendix A: SRX Series Hardware
- Appendix B: Virtual SRX
- Appendix C: CLI Primer
- Appendix D: Sky Enterprise Services
- Appendix E: Junos Space Security Director
Frequently asked questionsSee all of our FAQs
How can I create an account on myQA.com?
There are a number of ways to create an account. If you are a self-funder, simply select the "Create account" option on the login page.
If you have been booked onto a course by your company, you will receive a confirmation email. From this email, select "Sign into myQA" and you will be taken to the "Create account" page. Complete all of the details and select "Create account".
If you have the booking number you can also go here and select the "I have a booking number" option. Enter the booking reference and your surname. If the details match, you will be taken to the "Create account" page from where you can enter your details and confirm your account.
Find more answers to frequently asked questions in our FAQs: Bookings & Cancellations page.
How do QA’s virtual classroom courses work?
Our virtual classroom courses allow you to access award-winning classroom training, without leaving your home or office. Our learning professionals are specially trained on how to interact with remote attendees and our remote labs ensure all participants can take part in hands-on exercises wherever they are.
We use the WebEx video conferencing platform by Cisco. Before you book, check that you meet the WebEx system requirements and run a test meeting (more details in the link below) to ensure the software is compatible with your firewall settings. If it doesn’t work, try adjusting your settings or contact your IT department about permitting the website.
Learn more about our Virtual Classrooms.
How do QA’s online courses work?
QA online courses, also commonly known as distance learning courses or elearning courses, take the form of interactive software designed for individual learning, but you will also have access to full support from our subject-matter experts for the duration of your course. When you book a QA online learning course you will receive immediate access to it through our e-learning platform and you can start to learn straight away, from any compatible device. Access to the online learning platform is valid for one year from the booking date.
All courses are built around case studies and presented in an engaging format, which includes storytelling elements, video, audio and humour. Every case study is supported by sample documents and a collection of Knowledge Nuggets that provide more in-depth detail on the wider processes.
Learn more about QA’s online courses.
When will I receive my joining instructions?
Joining instructions for QA courses are sent two weeks prior to the course start date, or immediately if the booking is confirmed within this timeframe. For course bookings made via QA but delivered by a third-party supplier, joining instructions are sent to attendees prior to the training course, but timescales vary depending on each supplier’s terms. Read more FAQs.
When will I receive my certificate?
Certificates of Achievement are issued at the end the course, either as a hard copy or via email. Read more here.