All Brands   >   Juniper   >   Juniper Junos   >   JUNOS for Security Platforms JSEC

CMDBID: 61719 | Course Code: JUNOS,JSEC | Duration: 5 Days
Overview >
Chapter 1: Course Introduction Chapter 1: Course Introduction Chapter 1: Course Introduction Chapter 2: Introduction to Junos Security Chapter 2: Introduction to Junos Security Chapter 2: Introduction to Junos Security Traditional Routing Traditional Security Traditional Routing Traditional Routing Traditional Routing Traditional Security Traditional Security Traditional Security The Junos OS Architecture The Junos OS Architecture The Junos OS Architecture Chapter 3: Zones Chapter 3: Zones Chapter 3: Zones The Definition of Zones Zone Configuration Monitoring Security Zones Screen Options Lab 1: Configuring and Monitoring Zones The Definition of Zones The Definition of Zones The Definition of Zones Zone Configuration Zone Configuration Zone Configuration Monitoring Security Zones Monitoring Security Zones Monitoring Security Zones Screen Options Screen Options Screen Options Lab 1: Configuring and Monitoring Zones Lab 1: Configuring and Monitoring Zones Lab 1: Configuring and Monitoring Zones Chapter 4: Security Policies Chapter 4: Security Policies Chapter 4: Security Policies Security Policy Overview Policy Components Verifying Policy Operation Policy Case Study Lab 2: Security Policies Security Policy Overview Security Policy Overview Security Policy Overview Policy Components Policy Components Policy Components Verifying Policy Operation Verifying Policy Operation Verifying Policy Operation Policy Case Study Policy Case Study Policy Case Study Lab 2: Security Policies Lab 2: Security Policies Lab 2: Security Policies Chapter 5: Advanced Policy Options Chapter 5: Advanced Policy Options Chapter 5: Advanced Policy Options Session Management Policy Scheduling Logging Session Management Session Management Session Management Policy Scheduling Policy Scheduling Policy Scheduling Logging Logging Logging Chapter 6: Troubleshooting Security Zones and Policies Chapter 6: Troubleshooting Security Zones and Policies Chapter 6: Troubleshooting Security Zones and Policies Troubleshoot Security Zones Troubleshoot Security Policies Case Studies Lab 3: Troubleshooting Security Zones and Policies Troubleshoot Security Zones Troubleshoot Security Zones Troubleshoot Security Zones Troubleshoot Security Policies Troubleshoot Security Policies Troubleshoot Security Policies Case Studies Case Studies Case Studies Lab 3: Troubleshooting Security Zones and Policies Lab 3: Troubleshooting Security Zones and Policies Lab 3: Troubleshooting Security Zones and Policies Chapter 7: Network Address Translation Chapter 7: Network Address Translation Chapter 7: Network Address Translation NAT Overview Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab 4: Network Address Translation NAT Overview NAT Overview NAT Overview Source NAT Operation and Configuration Source NAT Operation and Configuration Source NAT Operation and Configuration Destination NAT Operation and Configuration Destination NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Static NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Proxy ARP Proxy ARP Monitoring and Verifying NAT Operation Monitoring and Verifying NAT Operation Monitoring and Verifying NAT Operation Lab 4: Network Address Translation Lab 4: Network Address Translation Lab 4: Network Address Translation Chapter 8: Advanced NAT Concepts Chapter 8: Advanced NAT Concepts Chapter 8: Advanced NAT Concepts NAT Interaction with Policy and ALGs DNS Doctoring Cone NAT Multi-Tenant NAT IPv4-to-IPv6 NAT Advanced NAT Scenarios Lab 5: Advanced NAT Implementations NAT Interaction with Policy and ALGs NAT Interaction with Policy and ALGs NAT Interaction with Policy and ALGs DNS Doctoring DNS Doctoring DNS Doctoring Cone NAT Cone NAT Cone NAT Multi-Tenant NAT Multi-Tenant NAT Multi-Tenant NAT IPv4-to-IPv6 NAT IPv4-to-IPv6 NAT IPv4-to-IPv6 NAT Advanced NAT Scenarios Advanced NAT Scenarios Advanced NAT Scenarios Lab 5: Advanced NAT Implementations Lab 5: Advanced NAT Implementations Lab 5: Advanced NAT Implementations Chapter 9: IPsec VPN Concepts Chapter 9: IPsec VPN Concepts Chapter 9: IPsec VPN Concepts VPN Types Secure VPN Requirements IPsec Overview IPsec Details VPN Types VPN Types VPN Types Secure VPN Requirements Secure VPN Requirements Secure VPN Requirements IPsec Overview IPsec Overview IPsec Overview IPsec Details IPsec Details IPsec Details Chapter 10: IPsec VPN Implementation Chapter 10: IPsec VPN Implementation Chapter 10: IPsec VPN Implementation Configuration of IPsec VPNs IPsec VPN Case Studies Monitoring IPsec VPN Traffic Selectors Lab 6: Implementing IPsec VPNs Configuration of IPsec VPNs Configuration of IPsec VPNs Configuration of IPsec VPNs IPsec VPN Case Studies IPsec VPN Case Studies IPsec VPN Case Studies Monitoring IPsec VPN Monitoring IPsec VPN Monitoring IPsec VPN Traffic Selectors Traffic Selectors Traffic Selectors Lab 6: Implementing IPsec VPNs Lab 6: Implementing IPsec VPNs Lab 6: Implementing IPsec VPNs Chapter 11: Group VPNs Chapter 11: Group VPNs Chapter 11: Group VPNs Group VPN Overview GDOI Protocol Group VPN Configuration and Monitoring Lab 7: Implementing Group VPNs Group VPN Overview Group VPN Overview Group VPN Overview GDOI Protocol GDOI Protocol GDOI Protocol Group VPN Configuration and Monitoring Group VPN Configuration and Monitoring Group VPN Configuration and Monitoring Lab 7: Implementing Group VPNs Lab 7: Implementing Group VPNs Lab 7: Implementing Group VPNs Chapter 12: ADVPNs Chapter 12: ADVPNs Chapter 12: ADVPNs ADVPN Overview ADVPN Member Roles Shortcut Termination Routing with ADVPNs IKEv2 ADVPN Implementation Lab 8: Implementing ADVPNs ADVPN Overview ADVPN Overview ADVPN Overview ADVPN Member Roles ADVPN Member Roles ADVPN Member Roles Shortcut Termination Shortcut Termination Shortcut Termination Routing with ADVPNs Routing with ADVPNs Routing with ADVPNs IKEv2 IKEv2 IKEv2 ADVPN Implementation ADVPN Implementation ADVPN Implementation Lab 8: Implementing ADVPNs Lab 8: Implementing ADVPNs Lab 8: Implementing ADVPNs Chapter 13: IPsec VPN Case Studies and Solutions Chapter 13: IPsec VPN Case Studies and Solutions Chapter 13: IPsec VPN Case Studies and Solutions Routing over VPNs NAT with IPsec Enterprise VPN Deployment Best Practices Lab 9: Implementing Routing over VPN Tunnels and IPsec Best Practices Routing over VPNs Routing over VPNs Routing over VPNs NAT with IPsec NAT with IPsec NAT with IPsec Enterprise VPN Deployment Best Practices Enterprise VPN Deployment Best Practices Enterprise VPN Deployment Best Practices Lab 9: Implementing Routing over VPN Tunnels and IPsec Best Practices Lab 9: Implementing Routing over VPN Tunnels and IPsec Best Practices Lab 9: Implementing Routing over VPN Tunnels and IPsec Best Practices Chapter 14: Troubleshooting IPsec Chapter 14: Troubleshooting IPsec Chapter 14: Troubleshooting IPsec IKE Phase 1 Troubleshooting IKE Phase 2 Troubleshooting Lab 10: Troubleshooting IPsec IKE Phase 1 Troubleshooting IKE Phase 1 Troubleshooting IKE Phase 1 Troubleshooting IKE Phase 2 Troubleshooting IKE Phase 2 Troubleshooting IKE Phase 2 Troubleshooting Lab 10: Troubleshooting IPsec Lab 10: Troubleshooting IPsec Lab 10: Troubleshooting IPsec Chapter 15: Virtualized SRX Chapter 15: Virtualized SRX Chapter 15: Virtualized SRX vSRX Overview Installation of vSRX Chassis Clustering Deployment Scenarios and Use Cases Automated Deployments Options AWS Deployment Scenarios vSRX Overview vSRX Overview vSRX Overview Installation of vSRX Installation of vSRX Installation of vSRX Chassis Clustering Chassis Clustering Chassis Clustering Deployment Scenarios and Use Cases Deployment Scenarios and Use Cases Deployment Scenarios and Use Cases Automated Deployments Options Automated Deployments Options Automated Deployments Options AWS Deployment Scenarios AWS Deployment
Skills Gained >
Outline >

Course Dates

Search by:

Show only GTR courses

Page 1, showing results 1-4 out of 4
Location
Duration
Start Date
Price
TBC, United Kingdom
5 Days
23rd Aug 2021
£3000
LVC, Netherlands
5 Days
6th Sep 2021
£3000
LVC, Online
5 Days
15th Nov 2021
£3000
ONSITE, United States
5 Days
Onsite
£3168.25

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. Its a cost effective option. One on one training can be delivered too, at reasonable rates.

Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.

All $ prices are in USD unless it’s a NZ or AU date

SPVC = Self Paced Virtual Class

LVC = Live Virtual Class

Please Note: All courses are availaible as Live Virtual Classes