JNCIE-SEC Bootcamp
This five-day course is designed to serve as the ultimate preparation for the Juniper Networks Certified Internet Expert—Security (JNCIE-SEC) exam. The course focuses on caveats and tips useful for potential test candidates and emphasizes hands-on practice through a series of timed lab simulations. On the final day of the course, students are given a six hour lab simulation emulating the testing topics and environment from the real exam. This course is based on Junos OS Release 15.1X49-D50.3 for SRX Series devices.
Objetivos
Be better prepared for success in taking the actual JNCIE-SEC exam.
Be well-versed in exam topics, environment, and conditions.
Ciberseguridad
Disponible en formato e-learning
Disponible en formato presencial
Disponible en formato a distancia
Subvención disponible
A través de Fundae, cumpliendo requisitos.
Duración
25 horas
- Dificultad 50%
- Nivel alcanzado 80%
Dirigido a
This course benefits individuals who have already honed their skills on enterprise security technologies and could use some practice and tips in preparation for the JNCIE-SEC exam.
JNCIE Security Bootcampis an advanced-level course.
Conocimientos requeridos
Students should have passed the Juniper Networks Certified Internet Professional—Security (JNCIP-SEC) written exam or achieved an equal level of expertise through Education Services courseware and hands-on experience. Pre-requisitos:
AJSEC – Advanced Junos Security
JSEC – Junos Security
JUTM – Junos Unified Threat Management
Temario
Chapter 1. Course Introduction
Chapter 2. Exam Strategies
Prior to the Exam
Exam Day
After the Exam
Chapter 3. Infrastructure Concepts
Section Topics
System Tasks
Zones
Issues and Tips
LAB: Infrastructure and Zones
Chapter 4. Building Clusters
Setting Up Clustering
Redundancy Groups and Reth Groups
Failovers
Issues and Tips
LAB: Creating Clusters
Chapter 5. Security Policies
Security Policies
ALGs
Schedulers
Bypass Flow Forwarding
Logging
Issues and Tips
LAB: Building Security Policies
Chapter 6. IPsec VPNs
Overview of VPN Configuration
IKE Proposals, Policies, and Gateways
IPsec Proposals, Policies, and Gateways
Route-Based, Dynamic, and CertificateBased VPNs
Identifying IPsec Issues
Issues and Tips
LAB: Building IPsec VPNs
Chapter 7. Network Address Translation
Implementation of NAT
Source NAT
Destination NAT
Static NAT
Overlapping IP Addresses
Additional NAT Capabilities
Verification Commands and Common Issues
LAB: Network Address Translation
Chapter 8. Attack Prevention
Overview of Attack Prevention
IDP
AppSecure
Integrated User Firewall Authentication
Additional Prevention Capabilities
SSL Proxy
Additional Prevention Capabilities
Issues and Tips
LAB: Attack Prevention
Chapter 9. Unified Threat Management and Screen
Options
Overview of UTM
Web Filtering
Anti-Virus
Screen Options
LAB: UTM and Screen Options
Chapter 10. Extended Implementation Concepts
Transparent Mode
Filter-Based Forwarding
LAB: Extended Implementations
JNCIE-SEC Full Lab Simulation
Comentarios recientes