<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="9244" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/juniper-ijsa" lastchanged="2026-01-12T10:19:56+01:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Implementing Juniper Networks Secure Analytics</title><productcode>IJSA</productcode><vendorcode>JP</vendorcode><vendorname>Juniper Networks</vendorname><fullproductcode>JP-IJSA</fullproductcode><version>2014.a</version><objective>&lt;p&gt;After successfully completing this course, you should be able to: &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Describe the JSA system and its basic functionality.&lt;/li&gt;&lt;li&gt;Describe the hardware used with the JSA system.&lt;/li&gt;&lt;li&gt;Identify the technology behind the JSA system.&lt;/li&gt;&lt;li&gt;Identify the JSA system&amp;rsquo;s primary design divisions&amp;mdash;display versus detection, and events versus traffic.&lt;/li&gt;&lt;li&gt;Plan and prepare for a new installation.&lt;/li&gt;&lt;li&gt;Access the administration console.&lt;/li&gt;&lt;li&gt;Configure the network hierarchy.&lt;/li&gt;&lt;li&gt;Configure the automatic update process.&lt;/li&gt;&lt;li&gt;Access the Deployment Editor.&lt;/li&gt;&lt;li&gt;Describe the JSA system&amp;rsquo;s internal processes.&lt;/li&gt;&lt;li&gt;Describe event and flow source configuration.&lt;/li&gt;&lt;li&gt;List key features of the JSA architecture.&lt;/li&gt;&lt;li&gt;Describe the JSA system&amp;rsquo;s processing logic.&lt;/li&gt;&lt;li&gt;Interpret the correlation of flow data and event data.&lt;/li&gt;&lt;li&gt;List the architectural component that provides each key function.&lt;/li&gt;&lt;li&gt;Describe Events and explain where they come from.&lt;/li&gt;&lt;li&gt;Access the Log Activity interface.&lt;/li&gt;&lt;li&gt;Execute Event searches.&lt;/li&gt;&lt;li&gt;Describe flows and their origin.&lt;/li&gt;&lt;li&gt;Configure the Network Activity interface.&lt;/li&gt;&lt;li&gt;Execute Flow searches.&lt;/li&gt;&lt;li&gt;Specify the JSA system&amp;rsquo;s Asset Management and Vulnerability Assessment functionality.&lt;/li&gt;&lt;li&gt;Access the Assets interface.&lt;/li&gt;&lt;li&gt;View Asset Profile data.&lt;/li&gt;&lt;li&gt;View Server Discovery.&lt;/li&gt;&lt;li&gt;Access the Vulnerability Assessment Scan Manager to produce vulnerability assessments (VAs).&lt;/li&gt;&lt;li&gt;Access vulnerability scanner configuration.&lt;/li&gt;&lt;li&gt;View vulnerability profiles.&lt;/li&gt;&lt;li&gt;Describe rules.&lt;/li&gt;&lt;li&gt;Configure rules.&lt;/li&gt;&lt;li&gt;Configure Building Blocks (BBs).&lt;/li&gt;&lt;li&gt;Explain how rules and flows work together.&lt;/li&gt;&lt;li&gt;Access the Offense Manager interface.&lt;/li&gt;&lt;li&gt;Understand Offense types.&lt;/li&gt;&lt;li&gt;Configure Offense actions.&lt;/li&gt;&lt;li&gt;Navigate the Offense interface.&lt;/li&gt;&lt;li&gt;Explain the Offense summary screen.&lt;/li&gt;&lt;li&gt;Search Offenses.&lt;/li&gt;&lt;li&gt;Use the JSA system&amp;rsquo;s Reporting functionality to produce graphs and reports.&lt;/li&gt;&lt;li&gt;Navigate the Reporting interface.&lt;/li&gt;&lt;li&gt;Configure Report Groups.&lt;/li&gt;&lt;li&gt;Demonstrate Report Branding.&lt;/li&gt;&lt;li&gt;View Report formats.&lt;/li&gt;&lt;li&gt;Identify the basic information on maintaining and troubleshooting the JSA system.&lt;/li&gt;&lt;li&gt;Navigate the JSA dashboard.&lt;/li&gt;&lt;li&gt;List flow and event troubleshooting steps.&lt;/li&gt;&lt;li&gt;Access the Event Mapping Tool.&lt;/li&gt;&lt;li&gt;Configure Event Collection for Junos devices.&lt;/li&gt;&lt;li&gt;Configure Flow Collection for Junos devices.&lt;/li&gt;&lt;li&gt;Explain high availability (HA) functionality on a JSA device.&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;This course assumes that students have basic networking knowledge and experience in the following areas:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Understanding of TCP/IP operation;&lt;/li&gt;&lt;li&gt;Understanding of network security concepts; and&lt;/li&gt;&lt;li&gt;Experience in network security administration.&lt;/li&gt;&lt;/ul&gt;</essentials><contents>&lt;p&gt;This course replaces the CSTRM (Configuring Security Threat Response Manager)&lt;/p&gt;
&lt;p&gt;This three-day course discusses the configuration of Juniper Networks JSA Series Secure Analytics (formerly known as Security Threat Response Manager [STRM]) in a typical network environment. Key topics include deploying a JSA Series device in the network, configuring flows, running reports, and troubleshooting.&lt;/p&gt;
&lt;p&gt;Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting the JSA Series device. This course uses the Juniper Networks Secure Analytics (JSA) VM virtual appliance for the hands-on component. This course is based on JSA software 2014.2R4.&lt;/p&gt;</contents><outline>&lt;h5&gt;Day 1&lt;/h5&gt;
&lt;h5&gt;Chapter 1: Course Introduction&lt;/h5&gt;
&lt;h5&gt;Chapter 2: Product Overview&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Overview of the JSA Series Device&lt;/li&gt;&lt;li&gt;Hardware&lt;/li&gt;&lt;li&gt;Collection&lt;/li&gt;&lt;li&gt;Operational Flow&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 3: Initial Configuration&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;A New Installation&lt;/li&gt;&lt;li&gt;Administration Console&lt;/li&gt;&lt;li&gt;Platform Configuration&lt;/li&gt;&lt;li&gt;Deployment Editor&lt;/li&gt;&lt;li&gt;Lab 1: Initial Configuration&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 4: Architecture&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Processing Log Activity&lt;/li&gt;&lt;li&gt;Processing Network Activity&lt;/li&gt;&lt;li&gt;JSA Deployment Options&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 5: Log Activity&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Log Activity Overview&lt;/li&gt;&lt;li&gt;Configuring Log Activity&lt;/li&gt;&lt;li&gt;Lab 2: Log Activity&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Day 2&lt;/h5&gt;&lt;h5&gt;Chapter 6: Network Activity&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Network Activity Overview&lt;/li&gt;&lt;li&gt;Configuring Network Activity&lt;/li&gt;&lt;li&gt;Lab 3: Network Activity&lt;/li&gt;&lt;/ul&gt;
&lt;h5&gt;Chapter 7: Assets and Vulnerability Assessment&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Asset Interface&lt;/li&gt;&lt;li&gt;Vulnerability Assessment&lt;/li&gt;&lt;li&gt;Vulnerability Scanners&lt;/li&gt;&lt;li&gt;Lab 4: Assets and Vulnerability Assessment&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 8: Rules&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Rules&lt;/li&gt;&lt;li&gt;Configure Rules and Building Blocks&lt;/li&gt;&lt;li&gt;Lab 5: Rules&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 9: Offense Manager&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;&lt;/li&gt;&lt;li&gt;Offense Manager&lt;/li&gt;&lt;li&gt;Offense Manager Configuration&lt;/li&gt;&lt;li&gt;Offense Investigation&lt;/li&gt;&lt;li&gt;Lab 6: Configure the Offense Manager&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Day 3&lt;/h5&gt;&lt;h5&gt;Chapter 10: JSA Reporting&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Reporting Functionality&lt;/li&gt;&lt;li&gt;Reporting Interface&lt;/li&gt;&lt;li&gt;Lab 7: Reporting&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 11: Basic Tuning and Troubleshooting&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Basic Tuning&lt;/li&gt;&lt;li&gt;Troubleshooting&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 12: Configuring Junos Devices for Use with JSA&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Collecting Junos Events&lt;/li&gt;&lt;li&gt;Collecting Junos Flows&lt;/li&gt;&lt;li&gt;Lab 8: Configuring Junos Devices for JSA&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Appendix A: High Availability&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;High Availability&lt;/li&gt;&lt;li&gt;Configuring High Availability&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>After successfully completing this course, you should be able to: 


- Describe the JSA system and its basic functionality.
- Describe the hardware used with the JSA system.
- Identify the technology behind the JSA system.
- Identify the JSA system’s primary design divisions—display versus detection, and events versus traffic.
- Plan and prepare for a new installation.
- Access the administration console.
- Configure the network hierarchy.
- Configure the automatic update process.
- Access the Deployment Editor.
- Describe the JSA system’s internal processes.
- Describe event and flow source configuration.
- List key features of the JSA architecture.
- Describe the JSA system’s processing logic.
- Interpret the correlation of flow data and event data.
- List the architectural component that provides each key function.
- Describe Events and explain where they come from.
- Access the Log Activity interface.
- Execute Event searches.
- Describe flows and their origin.
- Configure the Network Activity interface.
- Execute Flow searches.
- Specify the JSA system’s Asset Management and Vulnerability Assessment functionality.
- Access the Assets interface.
- View Asset Profile data.
- View Server Discovery.
- Access the Vulnerability Assessment Scan Manager to produce vulnerability assessments (VAs).
- Access vulnerability scanner configuration.
- View vulnerability profiles.
- Describe rules.
- Configure rules.
- Configure Building Blocks (BBs).
- Explain how rules and flows work together.
- Access the Offense Manager interface.
- Understand Offense types.
- Configure Offense actions.
- Navigate the Offense interface.
- Explain the Offense summary screen.
- Search Offenses.
- Use the JSA system’s Reporting functionality to produce graphs and reports.
- Navigate the Reporting interface.
- Configure Report Groups.
- Demonstrate Report Branding.
- View Report formats.
- Identify the basic information on maintaining and troubleshooting the JSA system.
- Navigate the JSA dashboard.
- List flow and event troubleshooting steps.
- Access the Event Mapping Tool.
- Configure Event Collection for Junos devices.
- Configure Flow Collection for Junos devices.
- Explain high availability (HA) functionality on a JSA device.</objective_plain><essentials_plain>This course assumes that students have basic networking knowledge and experience in the following areas:


- Understanding of TCP/IP operation;
- Understanding of network security concepts; and
- Experience in network security administration.</essentials_plain><contents_plain>This course replaces the CSTRM (Configuring Security Threat Response Manager)

This three-day course discusses the configuration of Juniper Networks JSA Series Secure Analytics (formerly known as Security Threat Response Manager [STRM]) in a typical network environment. Key topics include deploying a JSA Series device in the network, configuring flows, running reports, and troubleshooting.

Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting the JSA Series device. This course uses the Juniper Networks Secure Analytics (JSA) VM virtual appliance for the hands-on component. This course is based on JSA software 2014.2R4.</contents_plain><outline_plain>Day 1


Chapter 1: Course Introduction


Chapter 2: Product Overview


- Overview of the JSA Series Device
- Hardware
- Collection
- Operational Flow
Chapter 3: Initial Configuration


- A New Installation
- Administration Console
- Platform Configuration
- Deployment Editor
- Lab 1: Initial Configuration
Chapter 4: Architecture


- Processing Log Activity
- Processing Network Activity
- JSA Deployment Options
Chapter 5: Log Activity


- Log Activity Overview
- Configuring Log Activity
- Lab 2: Log Activity
Day 2

Chapter 6: Network Activity


- Network Activity Overview
- Configuring Network Activity
- Lab 3: Network Activity

Chapter 7: Assets and Vulnerability Assessment


- Asset Interface
- Vulnerability Assessment
- Vulnerability Scanners
- Lab 4: Assets and Vulnerability Assessment
Chapter 8: Rules


- Rules
- Configure Rules and Building Blocks
- Lab 5: Rules
Chapter 9: Offense Manager


- 
- Offense Manager
- Offense Manager Configuration
- Offense Investigation
- Lab 6: Configure the Offense Manager
Day 3

Chapter 10: JSA Reporting


- Reporting Functionality
- Reporting Interface
- Lab 7: Reporting
Chapter 11: Basic Tuning and Troubleshooting


- Basic Tuning
- Troubleshooting
Chapter 12: Configuring Junos Devices for Use with JSA


- Collecting Junos Events
- Collecting Junos Flows
- Lab 8: Configuring Junos Devices for JSA
Appendix A: High Availability


- High Availability
- Configuring High Availability</outline_plain><duration unit="d" days="3">3 days</duration><pricelist><price country="PL" currency="EUR">1400.00</price><price country="DE" currency="EUR">2250.00</price><price country="CH" currency="USD">2400.00</price><price country="IL" currency="ILS">7810.00</price><price country="GR" currency="EUR">2500.00</price><price country="MK" currency="EUR">2500.00</price><price country="HU" currency="EUR">2500.00</price><price country="IT" currency="EUR">2700.00</price><price country="SI" currency="EUR">2250.00</price><price country="SK" currency="EUR">2250.00</price><price country="FR" currency="EUR">3000.00</price><price country="GB" currency="GBP">2395.00</price></pricelist><miles><milesvalue country="DE" vendorcurrency="JTC" vendorcurrencyname="Juniper Training Credits">2250.00</milesvalue></miles></course>