{"course":{"productid":9244,"modality":6,"active":true,"language":"en","title":"Implementing Juniper Networks Secure Analytics","productcode":"IJSA","vendorcode":"JP","vendorname":"Juniper Networks","fullproductcode":"JP-IJSA","courseware":{"has_ekit":true,"has_printkit":false,"language":"en"},"url":"https:\/\/portal.flane.ch\/course\/juniper-ijsa","objective":"<p>After successfully completing this course, you should be able to: <\/p>\n<ul>\n<li>Describe the JSA system and its basic functionality.<\/li><li>Describe the hardware used with the JSA system.<\/li><li>Identify the technology behind the JSA system.<\/li><li>Identify the JSA system&rsquo;s primary design divisions&mdash;display versus detection, and events versus traffic.<\/li><li>Plan and prepare for a new installation.<\/li><li>Access the administration console.<\/li><li>Configure the network hierarchy.<\/li><li>Configure the automatic update process.<\/li><li>Access the Deployment Editor.<\/li><li>Describe the JSA system&rsquo;s internal processes.<\/li><li>Describe event and flow source configuration.<\/li><li>List key features of the JSA architecture.<\/li><li>Describe the JSA system&rsquo;s processing logic.<\/li><li>Interpret the correlation of flow data and event data.<\/li><li>List the architectural component that provides each key function.<\/li><li>Describe Events and explain where they come from.<\/li><li>Access the Log Activity interface.<\/li><li>Execute Event searches.<\/li><li>Describe flows and their origin.<\/li><li>Configure the Network Activity interface.<\/li><li>Execute Flow searches.<\/li><li>Specify the JSA system&rsquo;s Asset Management and Vulnerability Assessment functionality.<\/li><li>Access the Assets interface.<\/li><li>View Asset Profile data.<\/li><li>View Server Discovery.<\/li><li>Access the Vulnerability Assessment Scan Manager to produce vulnerability assessments (VAs).<\/li><li>Access vulnerability scanner configuration.<\/li><li>View vulnerability profiles.<\/li><li>Describe rules.<\/li><li>Configure rules.<\/li><li>Configure Building Blocks (BBs).<\/li><li>Explain how rules and flows work together.<\/li><li>Access the Offense Manager interface.<\/li><li>Understand Offense types.<\/li><li>Configure Offense actions.<\/li><li>Navigate the Offense interface.<\/li><li>Explain the Offense summary screen.<\/li><li>Search Offenses.<\/li><li>Use the JSA system&rsquo;s Reporting functionality to produce graphs and reports.<\/li><li>Navigate the Reporting interface.<\/li><li>Configure Report Groups.<\/li><li>Demonstrate Report Branding.<\/li><li>View Report formats.<\/li><li>Identify the basic information on maintaining and troubleshooting the JSA system.<\/li><li>Navigate the JSA dashboard.<\/li><li>List flow and event troubleshooting steps.<\/li><li>Access the Event Mapping Tool.<\/li><li>Configure Event Collection for Junos devices.<\/li><li>Configure Flow Collection for Junos devices.<\/li><li>Explain high availability (HA) functionality on a JSA device.<\/li><\/ul>","essentials":"<p>This course assumes that students have basic networking knowledge and experience in the following areas:<\/p>\n<ul>\n<li>Understanding of TCP\/IP operation;<\/li><li>Understanding of network security concepts; and<\/li><li>Experience in network security administration.<\/li><\/ul>","contents":"<p>This course replaces the CSTRM (Configuring Security Threat Response Manager)<\/p>\n<p>This three-day course discusses the configuration of Juniper Networks JSA Series Secure Analytics (formerly known as Security Threat Response Manager [STRM]) in a typical network environment. Key topics include deploying a JSA Series device in the network, configuring flows, running reports, and troubleshooting.<\/p>\n<p>Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting the JSA Series device. This course uses the Juniper Networks Secure Analytics (JSA) VM virtual appliance for the hands-on component. This course is based on JSA software 2014.2R4.<\/p>","outline":"<h5>Day 1<\/h5>\n<h5>Chapter 1: Course Introduction<\/h5>\n<h5>Chapter 2: Product Overview<\/h5><ul>\n<li>Overview of the JSA Series Device<\/li><li>Hardware<\/li><li>Collection<\/li><li>Operational Flow<\/li><\/ul><h5>Chapter 3: Initial Configuration<\/h5><ul>\n<li>A New Installation<\/li><li>Administration Console<\/li><li>Platform Configuration<\/li><li>Deployment Editor<\/li><li>Lab 1: Initial Configuration<\/li><\/ul><h5>Chapter 4: Architecture<\/h5><ul>\n<li>Processing Log Activity<\/li><li>Processing Network Activity<\/li><li>JSA Deployment Options<\/li><\/ul><h5>Chapter 5: Log Activity<\/h5><ul>\n<li>Log Activity Overview<\/li><li>Configuring Log Activity<\/li><li>Lab 2: Log Activity<\/li><\/ul><h5>Day 2<\/h5><h5>Chapter 6: Network Activity<\/h5><ul>\n<li>Network Activity Overview<\/li><li>Configuring Network Activity<\/li><li>Lab 3: Network Activity<\/li><\/ul>\n<h5>Chapter 7: Assets and Vulnerability Assessment<\/h5><ul>\n<li>Asset Interface<\/li><li>Vulnerability Assessment<\/li><li>Vulnerability Scanners<\/li><li>Lab 4: Assets and Vulnerability Assessment<\/li><\/ul><h5>Chapter 8: Rules<\/h5><ul>\n<li>Rules<\/li><li>Configure Rules and Building Blocks<\/li><li>Lab 5: Rules<\/li><\/ul><h5>Chapter 9: Offense Manager<\/h5><ul>\n<li><\/li><li>Offense Manager<\/li><li>Offense Manager Configuration<\/li><li>Offense Investigation<\/li><li>Lab 6: Configure the Offense Manager<\/li><\/ul><h5>Day 3<\/h5><h5>Chapter 10: JSA Reporting<\/h5><ul>\n<li>Reporting Functionality<\/li><li>Reporting Interface<\/li><li>Lab 7: Reporting<\/li><\/ul><h5>Chapter 11: Basic Tuning and Troubleshooting<\/h5><ul>\n<li>Basic Tuning<\/li><li>Troubleshooting<\/li><\/ul><h5>Chapter 12: Configuring Junos Devices for Use with JSA<\/h5><ul>\n<li>Collecting Junos Events<\/li><li>Collecting Junos Flows<\/li><li>Lab 8: Configuring Junos Devices for JSA<\/li><\/ul><h5>Appendix A: High Availability<\/h5><ul>\n<li>High Availability<\/li><li>Configuring High Availability<\/li><\/ul>","objective_plain":"After successfully completing this course, you should be able to: \n\n\n- Describe the JSA system and its basic functionality.\n- Describe the hardware used with the JSA system.\n- Identify the technology behind the JSA system.\n- Identify the JSA system\u2019s primary design divisions\u2014display versus detection, and events versus traffic.\n- Plan and prepare for a new installation.\n- Access the administration console.\n- Configure the network hierarchy.\n- Configure the automatic update process.\n- Access the Deployment Editor.\n- Describe the JSA system\u2019s internal processes.\n- Describe event and flow source configuration.\n- List key features of the JSA architecture.\n- Describe the JSA system\u2019s processing logic.\n- Interpret the correlation of flow data and event data.\n- List the architectural component that provides each key function.\n- Describe Events and explain where they come from.\n- Access the Log Activity interface.\n- Execute Event searches.\n- Describe flows and their origin.\n- Configure the Network Activity interface.\n- Execute Flow searches.\n- Specify the JSA system\u2019s Asset Management and Vulnerability Assessment functionality.\n- Access the Assets interface.\n- View Asset Profile data.\n- View Server Discovery.\n- Access the Vulnerability Assessment Scan Manager to produce vulnerability assessments (VAs).\n- Access vulnerability scanner configuration.\n- View vulnerability profiles.\n- Describe rules.\n- Configure rules.\n- Configure Building Blocks (BBs).\n- Explain how rules and flows work together.\n- Access the Offense Manager interface.\n- Understand Offense types.\n- Configure Offense actions.\n- Navigate the Offense interface.\n- Explain the Offense summary screen.\n- Search Offenses.\n- Use the JSA system\u2019s Reporting functionality to produce graphs and reports.\n- Navigate the Reporting interface.\n- Configure Report Groups.\n- Demonstrate Report Branding.\n- View Report formats.\n- Identify the basic information on maintaining and troubleshooting the JSA system.\n- Navigate the JSA dashboard.\n- List flow and event troubleshooting steps.\n- Access the Event Mapping Tool.\n- Configure Event Collection for Junos devices.\n- Configure Flow Collection for Junos devices.\n- Explain high availability (HA) functionality on a JSA device.","essentials_plain":"This course assumes that students have basic networking knowledge and experience in the following areas:\n\n\n- Understanding of TCP\/IP operation;\n- Understanding of network security concepts; and\n- Experience in network security administration.","contents_plain":"This course replaces the CSTRM (Configuring Security Threat Response Manager)\n\nThis three-day course discusses the configuration of Juniper Networks JSA Series Secure Analytics (formerly known as Security Threat Response Manager [STRM]) in a typical network environment. Key topics include deploying a JSA Series device in the network, configuring flows, running reports, and troubleshooting.\n\nThrough demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting the JSA Series device. This course uses the Juniper Networks Secure Analytics (JSA) VM virtual appliance for the hands-on component. This course is based on JSA software 2014.2R4.","outline_plain":"Day 1\n\n\nChapter 1: Course Introduction\n\n\nChapter 2: Product Overview\n\n\n- Overview of the JSA Series Device\n- Hardware\n- Collection\n- Operational Flow\nChapter 3: Initial Configuration\n\n\n- A New Installation\n- Administration Console\n- Platform Configuration\n- Deployment Editor\n- Lab 1: Initial Configuration\nChapter 4: Architecture\n\n\n- Processing Log Activity\n- Processing Network Activity\n- JSA Deployment Options\nChapter 5: Log Activity\n\n\n- Log Activity Overview\n- Configuring Log Activity\n- Lab 2: Log Activity\nDay 2\n\nChapter 6: Network Activity\n\n\n- Network Activity Overview\n- Configuring Network Activity\n- Lab 3: Network Activity\n\nChapter 7: Assets and Vulnerability Assessment\n\n\n- Asset Interface\n- Vulnerability Assessment\n- Vulnerability Scanners\n- Lab 4: Assets and Vulnerability Assessment\nChapter 8: Rules\n\n\n- Rules\n- Configure Rules and Building Blocks\n- Lab 5: Rules\nChapter 9: Offense Manager\n\n\n- \n- Offense Manager\n- Offense Manager Configuration\n- Offense Investigation\n- Lab 6: Configure the Offense Manager\nDay 3\n\nChapter 10: JSA Reporting\n\n\n- Reporting Functionality\n- Reporting Interface\n- Lab 7: Reporting\nChapter 11: Basic Tuning and Troubleshooting\n\n\n- Basic Tuning\n- Troubleshooting\nChapter 12: Configuring Junos Devices for Use with JSA\n\n\n- Collecting Junos Events\n- Collecting Junos Flows\n- Lab 8: Configuring Junos Devices for JSA\nAppendix A: High Availability\n\n\n- High Availability\n- Configuring High Availability","skill_level":"Intermediate","version":"2014.a","duration":{"unit":"d","value":3,"formatted":"3 days"},"pricelist":{"List Price":{"PL":{"country":"PL","currency":"EUR","taxrate":23,"price":1400},"DE":{"country":"DE","currency":"EUR","taxrate":19,"price":2250},"CH":{"country":"CH","currency":"USD","taxrate":8.1,"price":2400},"IL":{"country":"IL","currency":"ILS","taxrate":17,"price":7810},"GR":{"country":"GR","currency":"EUR","taxrate":null,"price":2500},"MK":{"country":"MK","currency":"EUR","taxrate":null,"price":2500},"HU":{"country":"HU","currency":"EUR","taxrate":20,"price":2500},"IT":{"country":"IT","currency":"EUR","taxrate":20,"price":2700},"SI":{"country":"SI","currency":"EUR","taxrate":20,"price":2250},"SK":{"country":"SK","currency":"EUR","taxrate":null,"price":2250},"FR":{"country":"FR","currency":"EUR","taxrate":19.6,"price":3000},"GB":{"country":"GB","currency":"GBP","taxrate":20,"price":2395}}},"lastchanged":"2026-01-12T10:19:56+01:00","parenturl":"https:\/\/portal.flane.ch\/swisscom\/en\/json-courses","nexturl_course_schedule":"https:\/\/portal.flane.ch\/swisscom\/en\/json-course-schedule\/9244","source_lang":"en","source":"https:\/\/portal.flane.ch\/swisscom\/en\/json-course\/juniper-ijsa"}}