瞻博互联网初级专家(JNCIS-SEC)
瞻博互联网初级专家(JNCIS-SEC)
  • 观看数
    708次
  • 课时
    0课时
  • 难度
    初级
瞻博互联网初级专家(JNCIS-SEC)
价格: 4000.00元
购买课程 咨询客服
讲师:博学高级讲师  | 开课时间:03月04日 09:00
课程评价: (0人)
收藏 扫一扫 扫码用手机学习
课程介绍

JUNIPER网络公司路由器操作和故障排除(OTJNR)是一门由教师指导的中级课程,主要介绍

JUNIPER网络公司M-系列和T-系列平台的操作和故障排除。该课程向学员讲授故障分析步骤和故障排除技巧以帮助他们迅速确定并排除故障。讲授的这些技能和JUNIPER网络公司技术援助中心(JTAC)工程师在日常工作中使用的技能非常相似。请注意,这一课程的重点不是配置或路由协议的运行/理论。

该课程分配大量时间来进行各种故障排除亲手实验操作。这些实验操作的重点是M-系列和T-系列硬件、JUNOS软件、接口和传输线路、路由协议及转发平面的故障隔离和纠正措施。该课程还介绍有助于完成故障隔离的JTAC流程和建议的最佳实践方法。

 

培训课程

面向安全平台的Junos (JSEC)   3天

Junos 统一威胁管理(JUTM)      1天

 

◎ Junos Security (JSEC) 面向安全平台的Junos

This three-day course covers the configuration, operation, and implementation of SRX Series Services Gateways in a typical network environment. Key topics within this course include security technologies such as security zones, security policies, intrusion detection and prevention (IDP), Network Address Translation (NAT), and high availability clusters, as well as details pertaining to basic implementation, configuration, and management. 

Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring device operations. This course uses Juniper Networks SRX Series Services Gateways for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. This course is based on Junos OS Release 12.1R1.9.

 

课程目标

After successfully completing this course, you should be able to:

°§ Describe traditional routing and security and the current trends in internetworking.

°§Provide an overview of SRX Series devices and software architecture.

°§Describe the logical packet flow and session creation performed by SRX Series devices.

°§Describe, configure, and monitor zones.

°§Describe, configure, and monitor security policies.

°§Describe, configure, and monitor firewall user authentication.

°§Describe various types of network attacks.

°§Configure and monitor Screen options to prevent network attacks.

°§ Explain, implement, and monitor NAT, as implemented on Junos security platforms.

°§Explain the purpose and mechanics of IP Security (IPsec) virtual private networks (VPNs).

°§Implement and monitor policy-based and route-based IPsec VPNs.

°§Utilize and update the IDP signature database.

°§Configure and monitor IDP policy with policy templates.

°§Describe, configure, and monitor high availability chassis clusters.

 

培训对象

This course benefits operators of SRX Series devices. These operators include network engineers, administrators, support personnel, and reseller support personnel.

 

学员基础

Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite. Students should also attend the Introduction to the Junos Operating System (IJOS) course and the Junos Routing Essentials (JRE) course, or have equivalent experience prior to attending this class.

 

课程内容

Day 1

Chapter 1: Course Introduction

Chapter 2: Introduction to Junos Security

°§Traditional Routing

°§Traditional Security

°§The Junos OS Architecture

Chapter 3: Zones

°§The Definition of Zones

°§Zone Configuration

°§Monitoring Security Zones

°§Lab 1: Configuring and Monitoring Zones

Chapter 4: Security Policies

°§Security Policy Overview

°§Junos ALGs

°§Policy Components

°§Verifying Policy Operation

°§Policy Scheduling and Rematching

°§Policy Case Study

°§Lab 2: Security Policies

Day 2

Chapter 5: Firewall User Authentication

°§Firewall User Authentication Overview

°§Pass-Through Authentication

°§Web Authentication

°§Client Groups

°§Using External Authentication Servers

°§Verifying Firewall User Authentication

°§Lab 3: Configuring Firewall Authentication

Chapter 6: Screen Options

°§Multilayer Network Protection

°§Stages and Types of Attacks

°§Using Junos Screen OptionsReconnaissance Attack Handling

°§Using Junos Screen OptionsDenial of Service Attack Handling

°§Using Junos Screen OptionsSuspicious Packets Attack Handling

°§Applying and Monitoring Screen Options

°§Lab 4: Implementing Screen Options

Chapter 7: Network Address Translation

°§NAT Overview

°§Source NAT Operation and Configuration

°§Destination NAT Operation and Configuration

°§Static NAT Operation and Configuration

°§Proxy ARP

°§Monitoring and Verifying NAT Operation

°§Lab 5: Network Address Translation

Day 3

Chapter 8: IPsec VPNs

°§VPN Types

°§Secure VPN Requirements

°§IPsec Details

°§Configuration of IPsec VPNs

°§IPsec VPN Monitoring

°§Lab 6: Implementing IPsec VPNs

Chapter 9: Introduction to Intrusion Detection and Prevention

°§Introduction to Junos IDP

°§IDP Policy Components and Configuration

°§Signature Database

°§Case Study: Applying the Recommended IDP Policy

°§Monitoring IDP Operation

°§Lab 7: Implementing IDP

Chapter 10: High Availability Clustering Theory

°§High Availability Overview

°§Chassis Cluster Components

°§Advanced Chassis Cluster Topics

Chapter 11: High Availability Clustering Implementation

°§Chassis Cluster Operation

°§Chassis Cluster Configuration

°§Chassis Cluster Monitoring

°§Lab 8: Implementing High Availability Techniques

Appendix A: SRX Series Hardware and Interfaces

°§Branch SRX PlatformOverview

°§High End SRX PlatformOverview

°§SRX Traffic Flow and Distribution

°§SRX Interfaces

 

◎ Junos Unified Threat Management (JUTM) Junos统一威胁管理

This one-day course includes detailed coverage of Web filtering, antivirus (AV), antispam, and content filtering. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Unified Threat Management (UTM) features of the Junos operating system. This course is based on the Junos OS Release 11.4R1.6.

 

课程目标

After successfully completing this course, you should be able to:

°§ Describe the challenges that branch offices present to network managers.

°§List the major features that UTMoffers.

°§Explain how each major feature addresses the challenges of the branch office.

°§List the SRX Series Services Gateways hardware devices on which UTM is available.

°§Describe the UTM features that require specific licenses.

°§Define terms used in the creation of effective antispam UTMpolicies.

°§Describe the process by which UTM examines traffic for spam.

°§Describe the overall process of configuring an antispamUTMpolicy.

°§Describe the kinds of information available from the device when it has

 detected spam.

°§Describe how the AV process examines traffic.

°§Describe the differences between full file-based AV versus express AV.

°§Describe the settings that are required for configuring AV protection.

°§ Explain how these settings affect scanning performance and effectiveness.

°§Describe options available for scanning supported protocols.

°§List the general steps required to configure AV.

°§Describe the statistical information available to verify AV functionality.

°§Describe content and Web filtering and their purpose.

°§List and describe each of the parameters used when configuring Web and content filtering.

°§Describe in general terms the steps necessary to configure web and content filtering.

°§Monitor Web and content filtering.

 

培训对象

This course benefits individuals responsible for implementing and monitoring the UTM features available on branch SRX Services Gateways and J Series Services Routers.

 

学员基础

Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) model and the TCP/IP protocol suite. Students should also have working knowledge of security policies. Students should also attend the Introduction to the Junos Operating System(IJOS), Junos Routing Essentials (JRE), and Junos Security (JSEC) courses prior to attending this class.

 

课程内容

Chapter 1: Course Introduction

Chapter 2: UTMOverview

°§Branch Office Challenges

°§UTMFeature Overview

°§Design Basics

°§Hardware Support

°§Licensing of Features

°§Lab 1: Connecting to the Lab Equipment and Testing Connectivity

Chapter 3: Antispam

°§Antispam Terminology

°§Overview of Antispam Process

°§UTMPolicy Overview

°§Configuration Steps

°§Monitoring Antispam

°§Lab 2: Configuring an Antispam Policy

Chapter 4: Full File-Based and Express Antivirus

°§Antivirus Terminology

°§Overview of Antivirus Process

°§AV Operation

°§Full File-based AV Configuration

°§Express AV Configuration

°§Monitoring AV

°§Lab 3: Antivirus Configuration and Testing

Chapter 5: Content and Web Filtering

°§Overview and Terminology

°§Configuration

°§Verification and Monitoring

°§Lab 4: Configuring Content and Web Filtering

 

 

授课教师

微软Technet讲师,微软MVP,有丰富的虚拟化项目实战经验。

博学教育致力于国内IT领域o2o教育,有丰富的教学和实战经验

最新学员

暂无学员

学员动态

还没有动态
在线
咨询

服务时间: 8:00 - 22:00

客服热线: 40000-93353