Juniper Networks Specialist Security (JNCIS-SEC)
22002
Networking
30 horas
570 €
Convocatorias
Inicio - Fin
Horario  
No hay convocatorias abiertas
Descripción
Este curso se compone de dos cursos (JSEC y JUTM) y prepara para la obtención de la certifivcación de Juniper Networks Specialist Security. Esta certificación certifica que los alumnos entienden y conocen las tecnologías y las plataformas asociadas a los conceptos básicos de seguridad en networking y forma `parte del track de certificación de Junos.
Objetivos

Durante el curso se repasan conceptos como:

  • Zonas
  • Políticas de seguridad
  • Firewall user Authentication
  • Screens
  • NAT
  • IPsec VPNs
  • High Availability Clustering
  • Unified Threat Management (UTM)
Contenido


JSEC Junos for Security Platforms

Introduction to Junos security platforms

- Traditional Routing

- Traditional Security

- Breaking the Tradition

- The Junos OS Architecture

 Zones

- The Definition of Zones

- Zone Configuration

- Monitoring Security Zones

- Lab 1: Configuring and Monitoring Zones

Security Policies

- Overview of Security Policy

- Policy Components

- Verifying Policy Operation

- Policy Scheduling and Rematching

- Policy Case Study

- Lab 2: Security Policies

Firewall User Authentication

- Firewall User Authentication Overview

- Pass-Through Authentication

- Web Authentication

- Client Groups

- Using External Authentication Servers

- Verifying Firewall User Authentication

- Lab 3: Configuring Firewall Authentication

 SCREEN Options

- Multilayer Network Protection

- Stages and Types of Attacks

- Using Junos SCREEN Options - Reconnaissance Attack Handling

- Using Junos SCREEN Options - Denial of Service Attack Handling

- Using Junos SCREEN Options - Suspicious Packets Attack Handling

- Applying and Monitoring SCREEN Options

- Lab 4: Implementing SCREEN Options

 Network Address Translation

- NAT Overview

- Source NAT Operation and Configuration

- Destination NAT Operation and Configuration

- Static NAT Operation and Configuration

- Proxy ARP

- Monitoring and Verifying NAT Operation

- Lab 5: Network Address Translation

IPsec VPNs

- VPN Types

- Secure VPN Requirements

- IPsec Details

- Configuration of IPsec VPNs

- IPsec VPN Monitoring

- Lab 6: Implementing IPsec VPNs

Introduction to Intrusion Detection and Prevention

- Introduction to Junos IDP

- IDP Policy Components and Configuration

- Signature Database

- Case Study: Applying the Recommended IDP Policy

- Monitoring IDP Operation

- Lab 7: Implementing IDP

High Availability Clustering

- High Availability Overview

- Chassis Cluster Components

- Chassis Cluster Operation

- Chassis Cluster Configuration

- Chassis Cluster Monitoring

- Lab 8: Implementing Chassis Clusters


JUTM Junos Unified Threat Management

UTM Overview

- Branch Office Challenges

- UTM Feature Overview

- Design Basics

- Hardware Support

- Licensing of Features

- Lab 1: Connecting to the Lab Equipment and Testing Connectivity

Antispam

- Antispam Terminology

- Overview of Antispam Process

- UTM Policy Overview

- Configuration Steps

- Monitoring Antispam

- Lab 2: Configuring an Antispam Policy

Full File-Based and Express Antivirus

- Antivirus Terminology

- Overview of Antivirus Process

- AV Operation

- Full File-based AV Configuration

- Express AV Configuration

- Monitoring AV

- Lab 3: Antivirus Configuration and Testing

Content and Web Filtering

- Overview and Terminology

- Configuration

- Verification and Monitoring

- Lab 4: Configuring Content and Web Filtering