Discover Classes. Earn Rewards.

Introduction to Juniper Security is unfortunately unavailable

Thankfully we have 7 other Cybersecurity Classes for you to choose from. Check our top choices below or see all classes for more options.

Fullstack Academy Cybersecurity Analytics Bootcamp

Fullstack Academy @ Virtual Classroom

Transform your career and join the fight against cybercrime with Fullstack Academy's immersive Fullstack Cybersecurity Analytics Bootcamp. Gain the defensive and offensive cybersecurity skills you need to succeed in this high-growth field. Don't miss out on the opportunity to build a successful cybersecurity career.

Monday, Mar 25th, 9:30am–12:30pm Eastern Time

 (78 sessions)

$14,995

78 sessions

Give as a Gift

Certified Information Systems Security Professional

Technical Institute of America @ Virtual Classroom

Become a cybersecurity expert with the nation's leading provider of CISSP certification training. Join thousands of successful students and unlock exclusive resources and networking opportunities with an (ISC)² membership. Prove your skills, advance your career, and earn the salary you deserve with the Technical Institute of America.

Saturday, Feb 24th, 10am–6pm Eastern Time

 (5 sessions)

$1,499

5 sessions

Give as a Gift

Cybersecurity Engineering Bootcamp

The Flatiron School

There’s never been a better time to join the mission to prevent global cybercrime. Developed in collaboration with top employers and industry pros, this 15-week will fast-track the tech skills you need for a new career as a tier 1+ cyber professional in Washington, D.C. Safeguard our systems from threats with a career in cybersecurity Looking for a career with purpose? Cybersecurity professionals work to protect the digital networks, data and...

Monday, Apr 1st, 9am–6pm Eastern Time

 (75 sessions)

$16,900

75 sessions

Give as a Gift

CompTIA Security+ Certification (Virtual)

Technical Institute of America @ Virtual Classroom

Gain the knowledge and skills to protect information and secure networks with the CompTIA Security+ Certification course at the Technical Institute of America. Prepare for the Security+ exam through lectures, hands-on labs, and practice questions. Become a certified security professional with TIA's top training center.

Monday, Mar 18th, 10am–6pm Eastern Time

 (4 sessions)

CEH: Certified Ethical Hacker Training Course (Virtual)

Technical Institute of America @ Virtual Classroom

Become a respected security professional with the Certified Ethical Hacker Training Course at the Technical Institute of America. Learn the latest security concepts and penetration testing techniques to secure systems and understand how hackers operate. Gain hands-on experience and prepare for the Certified Ethical Hacker certification exam in just five days.

Monday, Mar 25th, 10am–6pm Eastern Time

 (5 sessions)

$1,999

5 sessions

Give as a Gift
See all Cybersecurity classes Online

Introduction to Juniper Security

at Dynamic Worldwide Training Consultants

Discover the foundational knowledge required to work with SRX Series devices and gain hands-on experience in configuring and monitoring the Junos OS. Join us for an in-depth exploration of Juniper security solutions and learn how to implement unified security policies, configure IPsec VPNs, and utilize advanced threat protection technologies like Sky ATP. This course is ideal for network engineers, administrators, support personnel, and resellers.

Course Details
Price $2,850
Start Date

This class isn't on the schedule at the moment, but save it to your Wish List to find out when it comes back!
If you're enrolled in an upcoming date, this simply means that date has now sold out.

Booking for 8+? See private group options
Location Real-ILT (Live Virtual Classroom)
Important
Class Level Beginner
Age Requirements 18 and older
Average Class Size 8
System Requirements

You will need an Internet connection and administrator access on your computer or laptop.

Class Delivery

Additional information on how to log into the online environment will be provided after purchasing the class.

Purchase Options

Start Dates (0)

Save to WishList Purchase a Gift Card

Class Description

Description

What you'll learn in this cybersecurity training:

This course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. The course provides a brief overview of security problems and how Juniper Networks approaches a complete security solution with Juniper Connected Security. Key topics include configuration tasks for initial system configuration, interface configuration, security object configuration, security policy configuration, IPsec VPN configuration, and NAT configuration

The course then delves into Layer 7 security using UTM, IDP, and AppSecure to provide students with the understanding of application level security to block advanced threats. An overview of Sky ATP is included for students to understand zero-day network protection technologies

Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 19.1R1.6.

Intended Audience

The primary audiences for this course are the following:

  • Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers.

Course Objectives

After successfully completing this course, you should be able to:

  • Identify high-level security challenges in today’s networks.
  • Identify products that are incorporated into the Juniper Connected Security solution.
  • Explain the value of implementing security solutions.
  • Explain how Juniper Connected Security solves the cyber security challenges of the future.
  • Explain the SRX Series devices and the added capabilities that next-generation firewalls provide.
  • Explain traffic flows through the SRX Series devices.
  • List the different security objects and how to create them.
  • Describe interface types and perform basic interface configuration tasks.
  • Describe the initial configuration for an SRX Series device.
  • Explain security zones.
  • Describe screens and their use.
  • Explain address objects.
  • Describe services and their use.
  • Describe the purpose for security policies on an SRX Series device.
  • Describe zone-based policies.
  • Describe global policies and their use.
  • Explain unified security policies.
  • Configure unified security policies with the J-Web user interface.
  • Describe IDP signatures.
  • Configure an IDP policy using predefined templates with the J-Web user interface.
  • Describe the use and configuration of the integrated user firewall feature.
  • Describe the UTM security services
  • List the available UTM services on the SRX Series device.
  • Configure UTM filtering on a security policy with the J-Web user interface.
  • Explain Sky ATP’s use in security.
  • Describe how Sky ATP and SRX Series devices operate together in blocking threats.
  • Describe NAT and why it is used.
  • Explain source NAT and when to use it.
  • Explain destination NAT and when to use it.
  • Explain static NAT and its uses.
  • Describe the operation and configuration the different types of NAT.
  • Identify various types of VPNs.
  • Describe IPsec VPNs and their functionality.
  • Describe how IPsec VPNs are established.
  • Describe IPsec traffic processing.
  • Configure IPsec VPNs with the J-Web user interface.
  • Describe and configure proxy IDs and traffic selectors with the J-Web user interface.
  • Monitor IPsec VPNs with the J-Web user interface.
  • Describe the J-Web monitoring features.
  • Explain the J-Web reporting features.
  • Describe the Sky Enterprise service and how it can save resources.
  • Explain the functionality of Junos Space Security Director.

Prerequisite

The following are the prerequisites for this course:

  • Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite.

Course Outline

Day 1

Module 1: Course Introduction

Module 2: Juniper Security Concept

  • Security Challenges
  • Security Design Overview
  • Juniper Connected Security

Module 3: Juniper Connected Security – SRX Series Devices

  • Connected Security
  • Interfaces
  • Initial Configuration

LAB 1: Initial Configuration

Module 4: Security Objects

  • Security Zone Objects
  • Security Screen Objects
  • Security Address Objects
  • Security Services Objects

LAB 2: Creating Security Objects with J-Web

Module 5: Security Policies

  • Security Policy Overview
  • Zone-Based Policies
  • Global Security Policies
  • Application Firewall with Unified Security Policies

LAB 3: Creating Security Policies with J-Web

Module 6: Security Services – IDP and User Firewall

  • IDP Security Services
  • Integrated User Firewall

LAB 4: Adding IDP and User Firewall Security Services to Security Policies

Day 2

Module 7: Security Services – UTM

  • Content Filtering
  • Web Filtering
  • Antivirus
  • Antispam

LAB 5: Adding UTM Security Services to Security Policies

Module 8: Juniper Connected Security – Sky AT

  • Sky ATP Overview
  • Blocking Threats

Lab 6: Demonstrating Sky ATP

Module 9: Network Address Translation

  • NAT Overview
  • Source NAT
  • Destination NAT
  • Static NAT

Lab 7: Implementing Network Address Translation

Day 3

Module 10: IPsec VPN Concepts

  • VPN Types
  • Secure VPN Requirements
  • IPsec Tunnel Establishment
  • IPsec Traffic Processing

Module 11: Site-to-Site VPNs

  • IPsec Configuration
  • IPsec Site-to-Site Tunne

Lab 8: Implementing Site-to-Site IPsec VPNs

Module 12: Monitoring and Reporting

  • J-Web monitoring options
  • J-Web Reporting options

Lab 9: Using Monitoring and Reporting

Appendix A: SRX Series Hardware

Appendix D: Sky Enterprise Services

Appendix B: Virtual SRX

Appendix EJunos Space Security Director

Appendix CCLI Prime


Remote Learning

This course is available for "remote" learning and will be available to anyone with access to an internet device with a microphone (this includes most models of computers, tablets). Classes will take place with a "Live" instructor at the date/times listed below.

Upon registration, the instructor will send along additional information about how to log-on and participate in the class.

Refund Policy

There is no charge for rescheduling or canceling your class 10 business days before the class start date. A charge of $75.00 or 10% of the retail class price (whichever is greater) will be assessed for rescheduling your class if done less than 10 days before the class start date.

There is no charge for cancelling your class 10 business days before the class start date. If you cancel with less than 10 business days prior to your class, you are not entitled to a refund. A charge of $75.00 or 10% of the retail class price (whichever is greater) will also be assessed for rescheduling your class if done less than 10 business days before the class start date.

If there is a possibility that you may miss your training class, please contact the school.

In any event where a customer wants to cancel their enrollment and is eligible for a full refund, a 5% processing fee will be deducted from the refund amount.


Benefits of Booking Through CourseHorse

  • Booking is safe. When you book with us your details are protected by a secure connection.
  • Lowest price guaranteed. Classes on CourseHorse are never marked up.
  • This class will earn you 28500 points. Points give you money off your next class!

Questions about this class?

Get help now from an expert!

Contact us

Questions & Answers (0)

Get quick answers from CourseHorse and past students.

School: Dynamic Worldwide Training Consultants

Dynamic Worldwide Training Consultants

Founded in 2003, Dynamic Worldwide (DWWTC) started as Juniper Networks’ first national training provider and has been presented the “Americas Partner of the Year” award for the following 15 years. With a solid foundation in IT training, DWWTC has expanded into corporate, career, and professional...

Read more about Dynamic Worldwide Training Consultants

CourseHorse Approved

This school has been carefully vetted by CourseHorse and is a verified Online educator.

Want to take this class?

Save to Wish List

Give This Course as a Gift Card

  • Thousands of classes
  • No expiration
  • Unique and memorable gifts for any occasion
  • Personalized
  • Explore a passion, gain a new skill, discover a new hobby, engage in a memorable experience
  • Instant delivery

Buy a Gift Card

Book this Class as a Group Event

Booking this class for a group? Find great private group events

Or see all Professional Group Events

Explore group events and team building activities ranging from cooking, art, escape rooms, trivia, and more.

CourseHorse Gift Cards

  • Creative & unique gift for any occasion
  • Choose from thousands of classes & experiences
  • No expiration date
  • Instant e-delivery (or choose a date)
  • Add a personalized message
Buy a Gift Card
gift card with the CourseHorse logo gift card with the CourseHorse logo
Loading...