:
: After successfully completing this course, you should be able to: After successfully completing this course, you should be able to: After successfully completing this course, you should be able to: After successfully completing this course, you should be able to:
- Describe traditional routing and security and the current trends in internetworking
- Provide an overview of SRX Series devices and software architecture
- Describe the logical packet flow and session creation performed by SRX Series devices
- Describe, configure, and monitor zones
- Describe, configure, and monitor security policies
- Describe, configure, and monitor firewall user authentication
- Describe various types of network attacks
- Configure and monitor Screen options to prevent network attacks
- Explain the purpose and mechanics of IPsec Security (IPsec) virtual private networks (VPNs).
- Implement and monitor policy-based and route-based IPsec VPNs
- Describe, configure, and monitor high availability chassis clusters
- Describe how to deploy and manage vSRX.
- Describe and configure Group VPNs.
- Describe and configure ADVPNs.
- Troubleshoot chassis clusters, IPsec VPNs, zones, and Security Policies
Describe traditional routing and security and the current trends in internetworking Describe traditional routing and security and the current trends in internetworking Describe traditional routing and security and the current trends in internetworking
Provide an overview of SRX Series devices and software architecture Provide an overview of SRX Series devices and software architecture Provide an overview of SRX Series devices and software architecture
Describe the logical packet flow and session creation performed by SRX Series devices Describe the logical packet flow and session creation performed by SRX Series devices Describe the logical packet flow and session creation performed by SRX Series devices
Describe, configure, and monitor zones Describe, configure, and monitor zones Describe, configure, and monitor zones
Describe, configure, and monitor security policies Describe, configure, and monitor security policies Describe, configure, and monitor security policies
Describe, configure, and monitor firewall user authentication Describe, configure, and monitor firewall user authentication Describe, configure, and monitor firewall user authentication
Describe various types of network attacks Describe various types of network attacks Describe various types of network attacks
Configure and monitor Screen options to prevent network attacks Configure and monitor Screen options to prevent network attacks Configure and monitor Screen options to prevent network attacks
Explain the purpose and mechanics of IPsec Security (IPsec) virtual private networks (VPNs). Explain the purpose and mechanics of IPsec Security (IPsec) virtual private networks (VPNs). Explain the purpose and mechanics of IPsec Security (IPsec) virtual private networks (VPNs).
Implement and monitor policy-based and route-based IPsec VPNs Implement and monitor policy-based and route-based IPsec VPNs Implement and monitor policy-based and route-based IPsec VPNs
Describe, configure, and monitor high availability chassis clusters Describe, configure, and monitor high availability chassis clusters Describe, configure, and monitor high availability chassis clusters
Describe how to deploy and manage vSRX. Describe how to deploy and manage vSRX. Describe how to deploy and manage vSRX.
Describe and configure Group VPNs. Describe and configure Group VPNs. Describe and configure Group VPNs.
Describe and configure ADVPNs. Describe and configure ADVPNs. Describe and configure ADVPNs.
Troubleshoot chassis clusters, IPsec VPNs, zones, and Security Policies Troubleshoot chassis clusters, IPsec VPNs, zones, and Security Policies Troubleshoot chassis clusters, IPsec VPNs, zones, and Security Policies