After successfully completing this course, you should be able to:
Identify high level security challenges with different design architectures.
Explain the value of implementing security solutions in any network design.
Perform the steps necessary to identify customer security requirements.
Explain what is required to define the scope of the security design.
Identify the data required to perform a data analysis of the customer's existing network and use that information in the design.
Describe traditional security practices used to secure a network.
Explain the added capabilities that next generation firewalls provide.
Explain the evolution of modern security models.
Describe intelligent networks.
Explain how Software-Defined Secure Networking improves security in network design.
Explain the need for centralized Security Management.
Describe the benefits of automating security.
Describe how security works in a virtualized environment.
Explain the benefits of service chaining.
Describe network virtualization with VMware NSX.
Describe the benefits of HA with security devices.
Discuss how to handle asymmetric traffic with security devices.
Describe different options for SRX chassis cluster deployments.
Describe the main security concerns for the campus and the branch networks.
Explain end-to-end security concepts.
Describe security functions at different network layers.
Explain network authentication and access control concepts.
Describe common campus and branch network security design examples.
Describe security considerations for the enterprise WAN.
Explain when to use IPsec and NAT in the enterprise WAN.
Explain virtual router applications for the enterprise WAN.
Discuss security best practices in the enterprise WAN.
Describe security in the service provider WAN.
Discuss security best practices for the service provider WAN.
Discuss the security requirements and design principles of the data center.
Describe the security elements of the data center.
Describe network security implementation options in the data center.
Discuss network security functionality in the data center.