JNCIE-SEC Bootcamp

This five-day course is designed to serve as the ultimate preparation for the Juniper Networks Certified Internet Expert—Security (JNCIE-SEC) exam. The course focuses on caveats and tips useful for potential test candidates and emphasizes hands-on practice through a series of timed lab simulations. On the final day of the course, students are given a six hour lab simulation emulating the testing topics and environment from the real exam. This course is based on Junos OS Release 15.1X49-D50.3 for SRX Series devices.

Objetivos

After successfully completing this course, you should:

Be better prepared for success in taking the actual JNCIE-SEC exam.
Be well-versed in exam topics, environment, and conditions.

Ciberseguridad

Disponible en formato e-learning

Disponible en formato presencial

Disponible en formato a distancia

Subvención disponible
A través de Fundae, cumpliendo requisitos.

Duración
25 horas

  • Dificultad 50% 50%
  • Nivel alcanzado 80% 80%

Dirigido a

This course benefits individuals who have already honed their skills on enterprise security technologies and could use some practice and tips in preparation for the JNCIE-SEC exam.

JNCIE Security Bootcampis an advanced-level course.

Conocimientos requeridos

Students should have passed the Juniper Networks Certified Internet Professional—Security (JNCIP-SEC) written exam or achieved an equal level of expertise through Education Services courseware and hands-on experience. Pre-requisitos:
AJSEC – Advanced Junos Security
JSEC – Junos Security
JUTM – Junos Unified Threat Management

Temario

Chapter 1. Course Introduction

Chapter 2. Exam Strategies

Prior to the Exam
Exam Day
After the Exam
Chapter 3. Infrastructure Concepts

Section Topics
System Tasks
Zones
Issues and Tips
LAB: Infrastructure and Zones
Chapter 4. Building Clusters

Setting Up Clustering
Redundancy Groups and Reth Groups
Failovers
Issues and Tips
LAB: Creating Clusters
Chapter 5. Security Policies

Security Policies
ALGs
Schedulers
Bypass Flow Forwarding
Logging
Issues and Tips
LAB: Building Security Policies
Chapter 6. IPsec VPNs

Overview of VPN Configuration
IKE Proposals, Policies, and Gateways
IPsec Proposals, Policies, and Gateways
Route-Based, Dynamic, and CertificateBased VPNs
Identifying IPsec Issues
Issues and Tips
LAB: Building IPsec VPNs
Chapter 7. Network Address Translation

Implementation of NAT
Source NAT
Destination NAT
Static NAT
Overlapping IP Addresses
Additional NAT Capabilities
Verification Commands and Common Issues
LAB: Network Address Translation
Chapter 8. Attack Prevention

Overview of Attack Prevention
IDP
AppSecure
Integrated User Firewall Authentication
Additional Prevention Capabilities
SSL Proxy
Additional Prevention Capabilities
Issues and Tips
LAB: Attack Prevention
Chapter 9. Unified Threat Management and Screen

Options
Overview of UTM
Web Filtering
Anti-Virus
Screen Options
LAB: UTM and Screen Options
Chapter 10. Extended Implementation Concepts

Transparent Mode
Filter-Based Forwarding
LAB: Extended Implementations
JNCIE-SEC Full Lab Simulation

Solicita información del curso