<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="32660" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/juniper-sse" lastchanged="2025-10-16T22:11:24+02:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Deploying Juniper Security Service Edge</title><productcode>SSE</productcode><vendorcode>JP</vendorcode><vendorname>Juniper Networks</vendorname><fullproductcode>JP-SSE</fullproductcode><version>1.0</version><objective>&lt;ul&gt;
&lt;li&gt;Describe the elements of Juniper Secure Access Service Edge.&lt;/li&gt;&lt;li&gt;Explain Service Locations and sites.&lt;/li&gt;&lt;li&gt;Configure SSL Proxy in Secure Edge.&lt;/li&gt;&lt;li&gt;Describe and configure how to secure remote user traffic.&lt;/li&gt;&lt;li&gt;Explain user identity management in Secure Edge.&lt;/li&gt;&lt;li&gt;Implement user identity management for remote users.&lt;/li&gt;&lt;li&gt;Explain how to configure Web filtering and content filtering.&lt;/li&gt;&lt;li&gt;Describe Juniper ATP Cloud features in Secure Edge.&lt;/li&gt;&lt;li&gt;Explain how Juniper ATP Cloud features are implemented in Juniper Secure Edge.&lt;/li&gt;&lt;li&gt;Explain IPS in Secure Edge.&lt;/li&gt;&lt;li&gt;Use the monitoring tools in Secure Edge.&lt;/li&gt;&lt;li&gt;Implement Secure Edge for a new site.&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;ul&gt;
&lt;li&gt;Basic networking knowledge&lt;/li&gt;&lt;li&gt;Understanding of the OSI reference model and the TCP/IP protocol suite&lt;/li&gt;&lt;li&gt;Understanding of the session-based L4-L7 firewall concepts&lt;/li&gt;&lt;li&gt;Basic Junos operating system (OS) knowledge including device management, routing, and security policy&lt;/li&gt;&lt;li&gt;Completion of the &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/juniper-jsec&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Juniper Security &lt;span class=&quot;fl-prod-pcode&quot;&gt;(JSEC)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; course, or equivalent experience&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;Individuals responsible for managing enterprise on-premises and remote user security configurations on Juniper Secure Edge using the Security Director Cloud application.&lt;/p&gt;</audience><contents>&lt;ul&gt;
&lt;li&gt;Course Introduction&lt;/li&gt;&lt;li&gt;Introducing SASE&lt;/li&gt;&lt;li&gt;Provisioning Service Locations and Sites&lt;/li&gt;&lt;li&gt;SSL Proxy&lt;/li&gt;&lt;li&gt;Connecting Remote Users with PAC Files&lt;/li&gt;&lt;li&gt;User Identity and JIMS&lt;/li&gt;&lt;li&gt;Managing Identity for Remote Users&lt;/li&gt;&lt;li&gt;Web Filtering and Content Filtering&lt;/li&gt;&lt;li&gt;ATP Cloud&lt;/li&gt;&lt;li&gt;ATP Cloud Features in Secure Edge&lt;/li&gt;&lt;li&gt;IPS Policies&lt;/li&gt;&lt;li&gt;Monitoring Secure Edge&lt;/li&gt;&lt;li&gt;Capstone Case Study&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;h5&gt;Course Introduction&lt;/h5&gt;&lt;h5&gt;Introducing SASE&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe the security challenges of the modern enterprise&lt;/li&gt;&lt;li&gt;Describe the network challenges of the modern enterprise&lt;/li&gt;&lt;li&gt;Describe the cloud-delivered approach to securing the enterprise&lt;/li&gt;&lt;li&gt;Describe the SD-WAN approach to connecting the enterprise&lt;/li&gt;&lt;li&gt;Explain Juniper Networks Secure Access Service Edge&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Provisioning Service Locations and Sites&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe Secure Edge Service Locations and sites&lt;/li&gt;&lt;li&gt;Explain the structure and function of Secure Edge policy&lt;/li&gt;&lt;li&gt;Deploy a Service Location&lt;/li&gt;&lt;li&gt;Deploy a Secure Edge site&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 1: Deploying Service Locations and Sites&lt;/p&gt;
&lt;h5&gt;SSL Proxy&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe how SSL proxy works&lt;/li&gt;&lt;li&gt;Configure and apply SSL proxy profiles in Secure Edge&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 2: Configuring SSL Proxy&lt;/p&gt;
&lt;h5&gt;Connecting Remote Users with PAC Files&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe how PAC files work&lt;/li&gt;&lt;li&gt;Create and deploy a PAC file using the PAC file builder&lt;/li&gt;&lt;li&gt;Modify a PAC file manually using JavaScript&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 3: Enrolling Remote Users&lt;/p&gt;
&lt;h5&gt;User Identity and JIMS&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain the importance of user identity in securing the enterprise edge&lt;/li&gt;&lt;li&gt;Describe the available options for authentication in Secure Edge&lt;/li&gt;&lt;li&gt;Deploy JIMS on-premises user authentication&lt;/li&gt;&lt;li&gt;Configure Secure Edge policies based on user identity&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 4: Implement User Identity Management for On-Premises Users&lt;/p&gt;
&lt;h5&gt;Managing Identity for Remote Users&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Review available options for user identity management&lt;/li&gt;&lt;li&gt;Configure hosted database to authenticate remote users&lt;/li&gt;&lt;li&gt;Deploy a third-party SAML identity provider for remote users&lt;/li&gt;&lt;li&gt;Configure Secure Edge policies based on user identity for remote users&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 5: Identity Management for Remote Users&lt;/p&gt;
&lt;h5&gt;Web Filtering and Content Filtering&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe Web filtering and content filtering features&lt;/li&gt;&lt;li&gt;Configure and deploy Secure Edge policy rules with Web filtering and content filtering profiles&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 6: Configure Content Filtering and Web Filtering Policies&lt;/p&gt;
&lt;h5&gt;ATP Cloud&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain Security Intelligence&lt;/li&gt;&lt;li&gt;Describe Encrypted Traffic Insights&lt;/li&gt;&lt;li&gt;Describe DNS filtering&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;ATP Cloud Features in Secure Edge&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe how ATP Cloud provides functionality to Secure Edge&lt;/li&gt;&lt;li&gt;Configure ETI and DNS security&lt;/li&gt;&lt;li&gt;Configure allowlists and blocklists&lt;/li&gt;&lt;li&gt;Configure and apply SecIntel profiles&lt;/li&gt;&lt;li&gt;Configure and apply anti-malware profiles&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 7: Implement ATP Cloud Security Features&lt;/p&gt;
&lt;h5&gt;IPS Policies&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe IPS&lt;/li&gt;&lt;li&gt;Configure and apply IPS policies&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Monitoring Secure Edge&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Navigate the logging workspace&lt;/li&gt;&lt;li&gt;Configure alerts&lt;/li&gt;&lt;li&gt;Monitor ATP functions&lt;/li&gt;&lt;li&gt;Define and generate reports&lt;/li&gt;&lt;li&gt;Monitor Service Location status&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 8: Monitoring Secure Edge&lt;/p&gt;
&lt;h5&gt;Capstone Case Study&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain the case study requirements&lt;/li&gt;&lt;li&gt;Implement the case study requirements&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>- Describe the elements of Juniper Secure Access Service Edge.
- Explain Service Locations and sites.
- Configure SSL Proxy in Secure Edge.
- Describe and configure how to secure remote user traffic.
- Explain user identity management in Secure Edge.
- Implement user identity management for remote users.
- Explain how to configure Web filtering and content filtering.
- Describe Juniper ATP Cloud features in Secure Edge.
- Explain how Juniper ATP Cloud features are implemented in Juniper Secure Edge.
- Explain IPS in Secure Edge.
- Use the monitoring tools in Secure Edge.
- Implement Secure Edge for a new site.</objective_plain><essentials_plain>- Basic networking knowledge
- Understanding of the OSI reference model and the TCP/IP protocol suite
- Understanding of the session-based L4-L7 firewall concepts
- Basic Junos operating system (OS) knowledge including device management, routing, and security policy
- Completion of the Juniper Security (JSEC) course, or equivalent experience</essentials_plain><audience_plain>Individuals responsible for managing enterprise on-premises and remote user security configurations on Juniper Secure Edge using the Security Director Cloud application.</audience_plain><contents_plain>- Course Introduction
- Introducing SASE
- Provisioning Service Locations and Sites
- SSL Proxy
- Connecting Remote Users with PAC Files
- User Identity and JIMS
- Managing Identity for Remote Users
- Web Filtering and Content Filtering
- ATP Cloud
- ATP Cloud Features in Secure Edge
- IPS Policies
- Monitoring Secure Edge
- Capstone Case Study</contents_plain><outline_plain>Course Introduction

Introducing SASE


- Describe the security challenges of the modern enterprise
- Describe the network challenges of the modern enterprise
- Describe the cloud-delivered approach to securing the enterprise
- Describe the SD-WAN approach to connecting the enterprise
- Explain Juniper Networks Secure Access Service Edge
Provisioning Service Locations and Sites


- Describe Secure Edge Service Locations and sites
- Explain the structure and function of Secure Edge policy
- Deploy a Service Location
- Deploy a Secure Edge site
Lab 1: Deploying Service Locations and Sites

SSL Proxy


- Describe how SSL proxy works
- Configure and apply SSL proxy profiles in Secure Edge
Lab 2: Configuring SSL Proxy

Connecting Remote Users with PAC Files


- Describe how PAC files work
- Create and deploy a PAC file using the PAC file builder
- Modify a PAC file manually using JavaScript
Lab 3: Enrolling Remote Users

User Identity and JIMS


- Explain the importance of user identity in securing the enterprise edge
- Describe the available options for authentication in Secure Edge
- Deploy JIMS on-premises user authentication
- Configure Secure Edge policies based on user identity
Lab 4: Implement User Identity Management for On-Premises Users

Managing Identity for Remote Users


- Review available options for user identity management
- Configure hosted database to authenticate remote users
- Deploy a third-party SAML identity provider for remote users
- Configure Secure Edge policies based on user identity for remote users
Lab 5: Identity Management for Remote Users

Web Filtering and Content Filtering


- Describe Web filtering and content filtering features
- Configure and deploy Secure Edge policy rules with Web filtering and content filtering profiles
Lab 6: Configure Content Filtering and Web Filtering Policies

ATP Cloud


- Explain Security Intelligence
- Describe Encrypted Traffic Insights
- Describe DNS filtering
ATP Cloud Features in Secure Edge


- Describe how ATP Cloud provides functionality to Secure Edge
- Configure ETI and DNS security
- Configure allowlists and blocklists
- Configure and apply SecIntel profiles
- Configure and apply anti-malware profiles
Lab 7: Implement ATP Cloud Security Features

IPS Policies


- Describe IPS
- Configure and apply IPS policies
Monitoring Secure Edge


- Navigate the logging workspace
- Configure alerts
- Monitor ATP functions
- Define and generate reports
- Monitor Service Location status
Lab 8: Monitoring Secure Edge

Capstone Case Study


- Explain the case study requirements
- Implement the case study requirements</outline_plain><duration unit="d" days="3">3 days</duration><pricelist><price country="DE" currency="USD">3000.00</price><price country="CH" currency="USD">3000.00</price><price country="AT" currency="USD">3000.00</price><price country="SE" currency="USD">3000.00</price><price country="IL" currency="USD">3000.00</price><price country="AE" currency="USD">3000.00</price><price country="FR" currency="USD">3000.00</price><price country="SI" currency="USD">3000.00</price><price country="SK" currency="USD">3000.00</price></pricelist><miles/></course>