<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="21284" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/juniper-ijsec" lastchanged="2026-01-12T10:35:03+01:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Introduction to Juniper Security</title><productcode>IJSEC</productcode><vendorcode>JP</vendorcode><vendorname>Juniper Networks</vendorname><fullproductcode>JP-IJSEC</fullproductcode><version>21.A</version><objective>&lt;p&gt;After successfully completing this course, you should be able to:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Identify high-level security challenges in today&amp;rsquo;s networks.&lt;/li&gt;&lt;li&gt;Identify products that are incorporated into the Juniper Connected Security solution.&lt;/li&gt;&lt;li&gt;Explain the value of implementing security solutions.&lt;/li&gt;&lt;li&gt;Explain how Juniper Connected Security solves the cyber security challenges of the future.&lt;/li&gt;&lt;li&gt;Explain the SRX Series devices and the added capabilities that next-generation firewalls provide.&lt;/li&gt;&lt;li&gt;Explain traffic flows through the SRX Series devices.&lt;/li&gt;&lt;li&gt;List the different security objects and how to create them.&lt;/li&gt;&lt;li&gt;Describe interface types and perform basic interface configuration tasks.&lt;/li&gt;&lt;li&gt;Describe the initial configuration for an SRX Series device.&lt;/li&gt;&lt;li&gt;Explain security zones.&lt;/li&gt;&lt;li&gt;Describe screens and their use.&lt;/li&gt;&lt;li&gt;Explain address objects.&lt;/li&gt;&lt;li&gt;Describe services and their use.&lt;/li&gt;&lt;li&gt;Describe the purpose for security policies on an SRX Series device.&lt;/li&gt;&lt;li&gt;Describe zone-based policies.&lt;/li&gt;&lt;li&gt;Describe global policies and their use.&lt;/li&gt;&lt;li&gt;Explain unified security policies.&lt;/li&gt;&lt;li&gt;Configure unified security policies with the J-Web user interface.&lt;/li&gt;&lt;li&gt;Describe IDP signatures.&lt;/li&gt;&lt;li&gt;Configure an IDP policy using predefined templates with the J-Web user interface.&lt;/li&gt;&lt;li&gt;Describe the use and configuration of the integrated user firewall feature.&lt;/li&gt;&lt;li&gt;Describe the UTM security services&lt;/li&gt;&lt;li&gt;List the available UTM services on the SRX Series device.&lt;/li&gt;&lt;li&gt;Configure UTM filtering on a security policy with the J-Web user interface.&lt;/li&gt;&lt;li&gt;Explain Sky ATP&amp;rsquo;s use in security.&lt;/li&gt;&lt;li&gt;Describe how Sky ATP and SRX Series devices operate together in blocking threats.&lt;/li&gt;&lt;li&gt;Describe NAT and why it is used.&lt;/li&gt;&lt;li&gt;Explain source NAT and when to use it.&lt;/li&gt;&lt;li&gt;Explain destination NAT and when to use it.&lt;/li&gt;&lt;li&gt;Explain static NAT and its uses.&lt;/li&gt;&lt;li&gt;Describe the operation and configuration the different types of NAT.&lt;/li&gt;&lt;li&gt;Identify various types of VPNs.&lt;/li&gt;&lt;li&gt;Describe IPsec VPNs and their functionality.&lt;/li&gt;&lt;li&gt;Describe how IPsec VPNs are established.&lt;/li&gt;&lt;li&gt;Describe IPsec traffic processing.&lt;/li&gt;&lt;li&gt;Configure IPsec VPNs with the J-Web user interface.&lt;/li&gt;&lt;li&gt;Describe and configure proxy IDs and traffic selectors with the J-Web user interface.&lt;/li&gt;&lt;li&gt;Monitor IPsec VPNs with the J-Web user interface.&lt;/li&gt;&lt;li&gt;Describe the J-Web monitoring features.&lt;/li&gt;&lt;li&gt;Explain the J-Web reporting features.&lt;/li&gt;&lt;li&gt;Describe the Sky Enterprise service and how it can save resources.&lt;/li&gt;&lt;li&gt;Explain the functionality of Junos Space Security Director.&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;ul&gt;
&lt;li&gt;Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite.&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;The primary audiences for this course are the following:
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers.&lt;/li&gt;&lt;/ul&gt;</audience><contents>&lt;h4&gt;Day 1&lt;/h4&gt;&lt;p&gt;
&lt;strong&gt;Module 1: COURSE INTRODUCTION &lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Module 2: Juniper Security Concept&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Security Challenges&lt;/li&gt;&lt;li&gt;Security Design Overview&lt;/li&gt;&lt;li&gt;Juniper Connected Security&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 3: Juniper Connected Security &amp;ndash; SRX Series Devices&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Connected Security&lt;/li&gt;&lt;li&gt;Interfaces&lt;/li&gt;&lt;li&gt;Initial Configuration&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
LAB 1: Initial Configuration &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Module 4: Security Objects&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Security Zone Objects&lt;/li&gt;&lt;li&gt;Security Screen Objects&lt;/li&gt;&lt;li&gt;Security Address Objects&lt;/li&gt;&lt;li&gt;Security Services Objects&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
LAB 2: Creating Security Objects with J-Web &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Module 5: Security Policies&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Security Policy Overview&lt;/li&gt;&lt;li&gt;Zone-Based Policies&lt;/li&gt;&lt;li&gt;Global Security Policies&lt;/li&gt;&lt;li&gt;Application Firewall with Unified Security Policies&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
LAB 3: Creating Security Policies with J-Web &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Module 6: Security Services &amp;ndash; IDP and User Firewall&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;IDP Security Services&lt;/li&gt;&lt;li&gt;Integrated User Firewall&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
LAB 4: Adding IDP and User Firewall Security Services to Security Policies &lt;/p&gt;
&lt;h4&gt;Day 2&lt;/h4&gt;&lt;p&gt;
&lt;strong&gt;Module 7: Security Services &amp;ndash; UTM&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Content Filtering&lt;/li&gt;&lt;li&gt;Web Filtering&lt;/li&gt;&lt;li&gt;Antivirus&lt;/li&gt;&lt;li&gt;Antispam&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
LAB 5: Adding UTM Security Services to Security Policies &lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Module 8: Juniper Connected Security &amp;ndash; Sky AT&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Sky ATP Overview&lt;/li&gt;&lt;li&gt;Blocking Threats&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
Lab 6: Demonstrating Sky ATP&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Module 9: Network Address Translation&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;NAT Overview&lt;/li&gt;&lt;li&gt;Source NAT&lt;/li&gt;&lt;li&gt;Destination NAT&lt;/li&gt;&lt;li&gt;Static NAT&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
Lab 7: Implementing Network Address Translation &lt;/p&gt;
&lt;h4&gt;Day 3 &lt;/h4&gt;&lt;p&gt;
&lt;strong&gt;Module 10: IPsec VPN Concepts&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;VPN Types&lt;/li&gt;&lt;li&gt;Secure VPN Requirements&lt;/li&gt;&lt;li&gt;IPsec Tunnel Establishment&lt;/li&gt;&lt;li&gt;IPsec Traffic Processing&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Module 11: Site-to-Site VPNs&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;IPsec Configuration&lt;/li&gt;&lt;li&gt;IPsec Site-to-Site Tunne&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
Lab 8: Implementing Site-to-Site IPsec VPNs
 
&lt;strong&gt;Module 12: Monitoring and Reporting&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;J-Web monitoring options&lt;/li&gt;&lt;li&gt;J-Web Reporting options&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
Lab 9: Using Monitoring and Reporting 
Appendix A: SRX Series Hardware 
Appendix D: Sky Enterprise Services 
Appendix B: Virtual SRX Appendix EJunos Space Security Director 
Appendix CCLI Prime&lt;/p&gt;</contents><objective_plain>After successfully completing this course, you should be able to:



- Identify high-level security challenges in today’s networks.
- Identify products that are incorporated into the Juniper Connected Security solution.
- Explain the value of implementing security solutions.
- Explain how Juniper Connected Security solves the cyber security challenges of the future.
- Explain the SRX Series devices and the added capabilities that next-generation firewalls provide.
- Explain traffic flows through the SRX Series devices.
- List the different security objects and how to create them.
- Describe interface types and perform basic interface configuration tasks.
- Describe the initial configuration for an SRX Series device.
- Explain security zones.
- Describe screens and their use.
- Explain address objects.
- Describe services and their use.
- Describe the purpose for security policies on an SRX Series device.
- Describe zone-based policies.
- Describe global policies and their use.
- Explain unified security policies.
- Configure unified security policies with the J-Web user interface.
- Describe IDP signatures.
- Configure an IDP policy using predefined templates with the J-Web user interface.
- Describe the use and configuration of the integrated user firewall feature.
- Describe the UTM security services
- List the available UTM services on the SRX Series device.
- Configure UTM filtering on a security policy with the J-Web user interface.
- Explain Sky ATP’s use in security.
- Describe how Sky ATP and SRX Series devices operate together in blocking threats.
- Describe NAT and why it is used.
- Explain source NAT and when to use it.
- Explain destination NAT and when to use it.
- Explain static NAT and its uses.
- Describe the operation and configuration the different types of NAT.
- Identify various types of VPNs.
- Describe IPsec VPNs and their functionality.
- Describe how IPsec VPNs are established.
- Describe IPsec traffic processing.
- Configure IPsec VPNs with the J-Web user interface.
- Describe and configure proxy IDs and traffic selectors with the J-Web user interface.
- Monitor IPsec VPNs with the J-Web user interface.
- Describe the J-Web monitoring features.
- Explain the J-Web reporting features.
- Describe the Sky Enterprise service and how it can save resources.
- Explain the functionality of Junos Space Security Director.</objective_plain><essentials_plain>- Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite.</essentials_plain><audience_plain>The primary audiences for this course are the following:



- Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers.</audience_plain><contents_plain>Day 1


Module 1: COURSE INTRODUCTION 

Module 2: Juniper Security Concept



- Security Challenges
- Security Design Overview
- Juniper Connected Security
Module 3: Juniper Connected Security – SRX Series Devices



- Connected Security
- Interfaces
- Initial Configuration

LAB 1: Initial Configuration 

Module 4: Security Objects



- Security Zone Objects
- Security Screen Objects
- Security Address Objects
- Security Services Objects

LAB 2: Creating Security Objects with J-Web 

Module 5: Security Policies



- Security Policy Overview
- Zone-Based Policies
- Global Security Policies
- Application Firewall with Unified Security Policies

LAB 3: Creating Security Policies with J-Web 

Module 6: Security Services – IDP and User Firewall



- IDP Security Services
- Integrated User Firewall

LAB 4: Adding IDP and User Firewall Security Services to Security Policies 

Day 2


Module 7: Security Services – UTM



- Content Filtering
- Web Filtering
- Antivirus
- Antispam

LAB 5: Adding UTM Security Services to Security Policies 

Module 8: Juniper Connected Security – Sky AT



- Sky ATP Overview
- Blocking Threats

Lab 6: Demonstrating Sky ATP

Module 9: Network Address Translation



- NAT Overview
- Source NAT
- Destination NAT
- Static NAT

Lab 7: Implementing Network Address Translation 

Day 3 


Module 10: IPsec VPN Concepts



- VPN Types
- Secure VPN Requirements
- IPsec Tunnel Establishment
- IPsec Traffic Processing
Module 11: Site-to-Site VPNs



- IPsec Configuration
- IPsec Site-to-Site Tunne

Lab 8: Implementing Site-to-Site IPsec VPNs
 
Module 12: Monitoring and Reporting



- J-Web monitoring options
- J-Web Reporting options

Lab 9: Using Monitoring and Reporting 
Appendix A: SRX Series Hardware 
Appendix D: Sky Enterprise Services 
Appendix B: Virtual SRX Appendix EJunos Space Security Director 
Appendix CCLI Prime</contents_plain><duration unit="d" days="3">3 days</duration><pricelist><price country="DE" currency="EUR">2250.00</price><price country="GR" currency="EUR">1900.00</price><price country="MK" currency="EUR">1900.00</price><price country="HU" currency="EUR">1900.00</price><price country="UA" currency="USD">2250.00</price><price country="CH" currency="CHF">2700.00</price><price country="SI" currency="EUR">2250.00</price><price country="SK" currency="EUR">2250.00</price></pricelist><miles/></course>