DAY 1
1. Course Introduction
2. SSL Proxy
- Explain why SSL proxy is necessary
- Describe and configure client-protection SSL proxy
- Describe and configure server-protection SSL proxy
- Discuss how to monitor SSL proxy
- Explain SSL mirror decrypt feature
Lab 1: SSL Proxy Client Protection
3. Application Security Theory
- Describe the functionality of the AppSecure suite
- Explain how application identification works
- Describe how to create custom application signatures
- Explain the purpose of the application system cache
4. Application Security Implementation
- Discuss in depth the AppSecure modules
Lab 2: Implementing AppSecure
5. Unified Security Policies
- Explain unified security policy evaluation
- Explain URL Category options
Lab 3: Unified Security Policies
DAY 2
6. Security Policy Options
- Explain session management options
- Explain Junos ALG functionality
- Implement policy scheduling
- Explain logging
Lab 4: Security Policy Options
7. Intrusion Detection and Prevention
- Describe the purpose of IPS
- Utilize and update the IPS signature database
- Configure IPS policy
- Utilize and configure IPS policy using a template
- Monitor IPS operations
Lab 5: IPS
8. Juniper ATP Cloud
- Describe the Juniper ATP Cloud Web UI options
- Configure the SRX Series Firewall to use Juniper ATP Cloud anti-malware
- Discuss an Infected Host case study
Lab 6: Juniper ATP Cloud Anti-Malware
9. Juniper ATP Cloud Features
- Explain Security Intelligence
- Describe Encrypted Traffic Insights
- Describe Adaptive Threat Profiling
- Explain IoT Security
Lab 7: ATP Cloud Features
DAY 3
10. Introduction to Security Director
- Explain how to use Security Director
- Describe how to configure firewall policies
- Deploy configuration changes using Security Director
Lab 8: Working with Security Director
11. Security Director with Policy Enforcer
- Explain how to configure a secure fabric
- Describe how infected host remediation occurs
Lab 9: Configuring Juniper Connected Security
12. Virtual SRX and cSRX
- Explain virtualization
- Discuss network virtualization and software-defined networking
- Review the virtual SRX platform
- Review the cSRX platform
- Deploy the virtual SRX
- Integrate the virtual SRX with public cloud services
Lab 10: vSRX Implementation
13. Juniper Identity Management Service
- Explain how to install Juniper Identity Management Service
- Configure Juniper Identity Management Service
- Describe troubleshooting Juniper Identity Management Service
Lab 11: Juniper Identity Management Service
DAY 4
14. Chassis Cluster Concepts
- Describe chassis clusters
- Identify chassis cluster components
- Describe chassis cluster operation
15. Chassis Cluster Implementation
- Configure chassis clusters
- Describe advanced chassis cluster options
Lab 12: Implementing Chassis Clusters
16. Chassis Cluster Troubleshooting
- Troubleshoot chassis clusters
- Review chassis cluster case studies
Lab 13: Troubleshooting Chassis Clusters
DAY 5
17. Juniper ATP Appliance—Overview
- Explain the Cyber Kill Chain model
- Define deployment models for Juniper ATP Appliance
18. Implementing Juniper ATP Appliance
- Describe how to configure an SRX Series device with ATP Appliance
- Describe how to mitigate a threat with the ATP Appliance Web UI
- Demo Video: Implementing Juniper ATP Appliance
19. Juniper Secure Analytics
- Describe the JSA Series device and its basicfunctionality
- Define how JSA processes log activity
- Explain how JSA processes network activity
- Explain how to customize the processing of information
Lab 14: Monitoring with JSA