Advanced Juniper Security (AJSEC) – Outline

Detailed Course Outline

Day 1

Chapter 1: Course Introduction
Chapter 2: Junos Layer 2 Packet Handling and Security Features
  • Transparent Mode Security
  • Secure Wire
  • Layer 2 Next Generation Ethernet Switching
  • MACsec
  • Lab 1: Implementing Layer 2 Security
Chapter 3: Firewall Filters
  • Using Firewall Filters to Troubleshoot
  • Routing Instances
  • Filter-Based Forwarding
  • Lab 2: Implementing Firewall Filters
Chapter 4: Troubleshooting Zones and Policies
  • General Troubleshooting for Junos Devices
  • Troubleshooting Tools
  • Troubleshooting Zones and Policies
  • Zone and Policy Case Studies
  • Lab 3: Troubleshooting Zones and Policies

Day 2

Chapter 5: Hub-and-Spoke VPN
  • Overview
  • Configuration and Monitoring
  • Lab 4: Implementing Hub-and-Spoke VPNs
Chapter 6: Advanced NAT
  • Configuring Persistent NAT
  • Demonstrate DNS doctoring
  • Configure IPv6 NAT operations
  • Troubleshooting NAT
  • Lab 5: Implementing Advanced NAT Features
Chapter 7: Logical and Tenant Systems
  • Overview
  • Administrative Roles
  • Differences Between LSYS and TSYS
  • Configuring LSYS
  • Configuring TSYS
  • Lab 6: Implementing TSYS

Day 3

Chapter 8: PKI and ADVPNs
  • PKI Overview
  • PKI Configuration
  • ADVPN Overview
  • ADVPN Configuration and Monitoring
  • Lab 7: Implementing ADVPNs
Chapter 9: Advanced IPsec
  • NAT with IPsec
  • Class of Service with IPsec
  • Best Practices
  • Routing OSPF over VPNs
  • Lab 8: Implementing Advanced IPsec Solutions
Chapter 10: Troubleshooting IPsec
  • IPsec Troubleshooting Overview
  • Troubleshooting IKE Phase 1 and 2
  • IPsec Logging
  • IPsec Case Studies
  • Lab 9: Troubleshooting IPsec

Day 4

Chapter 11: Juniper Connected Security
  • Security Models
  • Enforcement on Every Network Device
Chapter 12: Sectel
  • Security Feed
  • Encrypted Traffic Analysis
  • Use Cases for Sectel
  • Lab 10: Implementing Sectel
Chapter 13:Advanced Juniper ATP On-Prem
  • Collectors
  • Private Mode
  • Incident Response
  • Deployment Models
  • Lab 11: Implementing Advanced ATP On-Prem
Chapter 14: Automated Threat Mitigation
  • Identify and Mitigate Malware Threats
  • Automate Security Mitigation
  • Lab 12: Identifying and Mitigation of Threats
Appendix A: Group VPNs
  • Overview
  • Implementing Group VPNs