{"course":{"productid":2888,"modality":1,"active":true,"language":"fr","title":"Juniper Security","productcode":"JSEC","vendorcode":"JP","vendorname":"Juniper Networks","fullproductcode":"JP-JSEC","courseware":{"has_ekit":true,"has_printkit":false,"language":"en"},"url":"https:\/\/portal.flane.ch\/course\/juniper-jsec","objective":"<ul>\n<li>Explain the basics of intrusion detection.<\/li><li>Explain the function of SSL Proxy.<\/li><li>Explain IPsec VPN concepts.<\/li><li>Implement site-to-site IPsec VPNs.<\/li><li>Implement Juniper&reg; Secure Connect.<\/li><li>Implement identity-aware security policies.<\/li><li>Explain Security Director.<\/li><li>Introduce Policy Enforcer.<\/li><li>Describe the Juniper ATP Cloud Anti-Malware.<\/li><li>Describe the Juniper ATP Cloud features.<\/li><li>Explain the concepts of a chassis cluster.<\/li><li>Explain how to set up a chassis cluster.<\/li><li>Review troubleshooting steps for chassis clusters.<\/li><li>Explain how to set up a chassis cluster.<\/li><\/ul>","essentials":"<ul>\n<li>Basic networking knowledge and an understanding of the OSI reference model and the TCP\/ IP protocol suite<\/li><li>Completing the <span class=\"cms-link-marked\"><a class=\"fl-href-prod\" href=\"\/swisscom\/fr\/course\/juniper-ijos\"><svg role=\"img\" aria-hidden=\"true\" focusable=\"false\" data-nosnippet class=\"cms-linkmark\"><use xlink:href=\"\/css\/img\/icnset-linkmarks.svg#linkmark\"><\/use><\/svg>Introduction to the Junos Operating System <span class=\"fl-prod-pcode\">(IJOS)<\/span><\/a><\/span> course<\/li><\/ul>","audience":"<p>Individuals responsible for security operations using Juniper Networks security solutions, including network engineers, security engineers, administrators, support personnel, and resellers.<\/p>","contents":"<ul>\n<li>Implementing Intrusion Detection and Prevention<\/li><li>Implementing SSL Proxy<\/li><li>IPsec VPN Concepts<\/li><li>Implementing Site-to-Site IPsec VPNs<\/li><li>Implementing Juniper Secure Connect<\/li><li>Implementing Identity Aware Security Policies<\/li><li>Introducing Security Director<\/li><li>Introducing Policy Enforcer<\/li><li>Implementing Juniper ATP Cloud Anti-Malware<\/li><li>Implementing Juniper ATP Cloud Features<\/li><li>Understanding Chassis Cluster Concepts<\/li><li>Implementing a Chassis Cluster<\/li><li>Troubleshooting a Chassis Cluster<\/li><\/ul><h5>Self-Study Module<\/h5><ul>\n<li>Explain Junos OS Routing Fundamentals<\/li><\/ul>","outline":"<h4>DAY 1<\/h4><h5>Module 1: Implementing Intrusion Detection and Prevention<\/h5><ul>\n<li>Describe the purpose of IDP<\/li><li>Utilize and update the IDP signature database<\/li><li>Configure an IDP policy<\/li><li>Utilize and configure an IDP policy using a template<\/li><li>Monitor IDP operations<\/li><\/ul><p>Lab 1: Implementing IDP<\/p>\n<h5>Module 2: Implementing SSL Proxy<\/h5><ul>\n<li>Explain why SSL proxy is necessary<\/li><li>Describe and configure client-protection SSL proxy<\/li><li>Describe and configure server-protection SSL proxy<\/li><li>Discuss how to monitor SSL proxy<\/li><li>Explain the SSL mirror decrypt feature<\/li><\/ul><p>Lab 2: Implementing SSL Proxy<\/p>\n<h5>Module 3: IPsec VPN Concepts<\/h5><ul>\n<li>Identify various types of VPNs<\/li><li>Describe IPsec VPNs and their functionalities<\/li><li>Describe how IPsec VPNs are established<\/li><li>Describe IPsec traffic processing<\/li><\/ul><h5>Module 4: Implementing Site-to-Site IPsec VPNs<\/h5><ul>\n<li>Describe the high-level configuration options for an IPsec VPN<\/li><li>Describe the functionality of proxy IDs and traffic selectors<\/li><li>Configure an IPsec site-to-site VPN<\/li><li>Monitor a site-to-site IPsec VPN<\/li><\/ul><p>Lab 3: Implementing Site-to-Site IPsec VPNs<\/p>\n<h4>DAY 2<\/h4><h5>Module 5: Implementing Juniper Secure Connect<\/h5><ul>\n<li>Describe Juniper Secure Connect features<\/li><li>Explain Juniper Secure Connect UI options<\/li><li>Configure Juniper Secure Connect on SRX Series devices<\/li><li>Connect Juniper Secure Connect Client<\/li><\/ul><p>Lab 4: Implementing Juniper Secure Connect<\/p>\n<h5>Module 6: Implementing Identity Aware Security Policies<\/h5><ul>\n<li>Describe identity-aware firewall and list supported identity sources<\/li><li>Describe Active Directory as identity source<\/li><li>Configure Active Directory as identity source<\/li><li>Describe Juniper Identity Management Service<\/li><li>Explain how to install Juniper Identity Management Service<\/li><li>Configure Juniper Identity Management Service<\/li><li>Describe how to troubleshoot Juniper Identity Management Service<\/li><\/ul><p>Lab 5: Implementing Identity Aware Security Policies<\/p>\n<h5>Module 7: Introducing Security Director<\/h5><ul>\n<li>Explain the benefits of Security Director<\/li><li>Explain Security Director deployment options<\/li><li>Demonstrate how to access and use the Security Director UI<\/li><li>Demonstrate how to onboard a device<\/li><li>Demonstrate how to manage security policies<\/li><li>Demonstrate how to deploy and validate configuration changes<\/li><\/ul><p>Lab 6: Using Security Director<\/p>\n<h4>DAY 3<\/h4><h5>Module 8: Introducing Policy Enforcer<\/h5><ul>\n<li>Explain the benefits of Policy Enforcer<\/li><li>Explain how to configure a secure fabric<\/li><li>Describe how infected host remediation occurs<\/li><\/ul><h5>Module 9: Implementing Juniper ATP Cloud Anti-Malware<\/h5><ul>\n<li>Describe Juniper ATP Cloud anti-malware capabilities<\/li><li>Describe the Juniper ATP Cloud Web UI options<\/li><li>Configure the SRX Series Firewall to use Juniper ATP Cloud anti-malware<\/li><li>Discuss a Juniper ATP Cloud anti-malware case study<\/li><\/ul><p>Lab 7: Enrolling Devices in Juniper ATP Cloud<\/p>\n<h5>Module 10: Implementing Juniper ATP Cloud Features<\/h5><ul>\n<li>Explain Security Intelligence<\/li><li>Describe Encrypted Traffic Insights<\/li><li>Describe Adaptive Threat Profiling<\/li><li>Explain IoT Security<\/li><\/ul><p>Lab 8: Implementing ATP Cloud Features<\/p>\n<h4>DAY 4<\/h4><h5>Module 11: Understanding Chassis Cluster Concepts<\/h5><ul>\n<li>Describe why customers implement a chassis cluster<\/li><li>Identify chassis cluster components<\/li><li>Describe the causes of failover<\/li><\/ul><h5>Module 12: Implementing a Chassis Cluster<\/h5><ul>\n<li>Configure a chassis cluster<\/li><li>Explain additional chassis cluster configuration options<\/li><\/ul><p>Lab 9: Implementing a Chassis Cluster<\/p>\n<h5>Module 13: Troubleshooting a Chassis Cluster<\/h5><ul>\n<li>Troubleshoot a chassis cluster<\/li><li>Explain the chassis cluster case studies<\/li><\/ul><h4>SELF-STUDY MODULE<\/h4><h5>Module 14: Explain Junos OS Routing Fundamentals<\/h5><ul>\n<li>Explain the difference between directly connected, static, and dynamic routes<\/li><li>Explain how route preference determines the active route to a destination<\/li><li>Demonstrate how to display and examine the inet.0 and inet6.0 routing tables<\/li><li>Configure and validate static routing<\/li><li>Explain the flow process<\/li><\/ul>","summary":"<p>This four-day, intermediate-level course provides students with the knowledge required to work with Juniper Connected Security devices. This course uses Junos CLI, Junos Space&reg; Security Director. The course provides further instruction on how Juniper Networks approaches a complete security solution for current and future security problems, called Juniper Connected Security. Key topics include tasks for intrusion detection and prevention (IDP) rules and custom attack objects, IPSec VPNs, Security Director management, Juniper&reg; Advanced Threat Prevention management (ATP) Cloud management, Policy Enforcer management, Identity aware security policies, Secure Sockets Layer (SSL) Proxy configuration, and Juniper Networks&reg; SRX Series Firewalls high availability configuration and troubleshooting. Through demonstrations and hands-on labs, students will gain experience with the features of each of these devices.<\/p>\n<p>Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 24.2R1, Junos Space 23.1R1, Security Director 23.1R1, and JIMS 1.7.0R2.<\/p>","objective_plain":"- Explain the basics of intrusion detection.\n- Explain the function of SSL Proxy.\n- Explain IPsec VPN concepts.\n- Implement site-to-site IPsec VPNs.\n- Implement Juniper\u00ae Secure Connect.\n- Implement identity-aware security policies.\n- Explain Security Director.\n- Introduce Policy Enforcer.\n- Describe the Juniper ATP Cloud Anti-Malware.\n- Describe the Juniper ATP Cloud features.\n- Explain the concepts of a chassis cluster.\n- Explain how to set up a chassis cluster.\n- Review troubleshooting steps for chassis clusters.\n- Explain how to set up a chassis cluster.","essentials_plain":"- Basic networking knowledge and an understanding of the OSI reference model and the TCP\/ IP protocol suite\n- Completing the Introduction to the Junos Operating System (IJOS) course","audience_plain":"Individuals responsible for security operations using Juniper Networks security solutions, including network engineers, security engineers, administrators, support personnel, and resellers.","contents_plain":"- Implementing Intrusion Detection and Prevention\n- Implementing SSL Proxy\n- IPsec VPN Concepts\n- Implementing Site-to-Site IPsec VPNs\n- Implementing Juniper Secure Connect\n- Implementing Identity Aware Security Policies\n- Introducing Security Director\n- Introducing Policy Enforcer\n- Implementing Juniper ATP Cloud Anti-Malware\n- Implementing Juniper ATP Cloud Features\n- Understanding Chassis Cluster Concepts\n- Implementing a Chassis Cluster\n- Troubleshooting a Chassis Cluster\nSelf-Study Module\n\n\n- Explain Junos OS Routing Fundamentals","outline_plain":"DAY 1\n\nModule 1: Implementing Intrusion Detection and Prevention\n\n\n- Describe the purpose of IDP\n- Utilize and update the IDP signature database\n- Configure an IDP policy\n- Utilize and configure an IDP policy using a template\n- Monitor IDP operations\nLab 1: Implementing IDP\n\nModule 2: Implementing SSL Proxy\n\n\n- Explain why SSL proxy is necessary\n- Describe and configure client-protection SSL proxy\n- Describe and configure server-protection SSL proxy\n- Discuss how to monitor SSL proxy\n- Explain the SSL mirror decrypt feature\nLab 2: Implementing SSL Proxy\n\nModule 3: IPsec VPN Concepts\n\n\n- Identify various types of VPNs\n- Describe IPsec VPNs and their functionalities\n- Describe how IPsec VPNs are established\n- Describe IPsec traffic processing\nModule 4: Implementing Site-to-Site IPsec VPNs\n\n\n- Describe the high-level configuration options for an IPsec VPN\n- Describe the functionality of proxy IDs and traffic selectors\n- Configure an IPsec site-to-site VPN\n- Monitor a site-to-site IPsec VPN\nLab 3: Implementing Site-to-Site IPsec VPNs\n\nDAY 2\n\nModule 5: Implementing Juniper Secure Connect\n\n\n- Describe Juniper Secure Connect features\n- Explain Juniper Secure Connect UI options\n- Configure Juniper Secure Connect on SRX Series devices\n- Connect Juniper Secure Connect Client\nLab 4: Implementing Juniper Secure Connect\n\nModule 6: Implementing Identity Aware Security Policies\n\n\n- Describe identity-aware firewall and list supported identity sources\n- Describe Active Directory as identity source\n- Configure Active Directory as identity source\n- Describe Juniper Identity Management Service\n- Explain how to install Juniper Identity Management Service\n- Configure Juniper Identity Management Service\n- Describe how to troubleshoot Juniper Identity Management Service\nLab 5: Implementing Identity Aware Security Policies\n\nModule 7: Introducing Security Director\n\n\n- Explain the benefits of Security Director\n- Explain Security Director deployment options\n- Demonstrate how to access and use the Security Director UI\n- Demonstrate how to onboard a device\n- Demonstrate how to manage security policies\n- Demonstrate how to deploy and validate configuration changes\nLab 6: Using Security Director\n\nDAY 3\n\nModule 8: Introducing Policy Enforcer\n\n\n- Explain the benefits of Policy Enforcer\n- Explain how to configure a secure fabric\n- Describe how infected host remediation occurs\nModule 9: Implementing Juniper ATP Cloud Anti-Malware\n\n\n- Describe Juniper ATP Cloud anti-malware capabilities\n- Describe the Juniper ATP Cloud Web UI options\n- Configure the SRX Series Firewall to use Juniper ATP Cloud anti-malware\n- Discuss a Juniper ATP Cloud anti-malware case study\nLab 7: Enrolling Devices in Juniper ATP Cloud\n\nModule 10: Implementing Juniper ATP Cloud Features\n\n\n- Explain Security Intelligence\n- Describe Encrypted Traffic Insights\n- Describe Adaptive Threat Profiling\n- Explain IoT Security\nLab 8: Implementing ATP Cloud Features\n\nDAY 4\n\nModule 11: Understanding Chassis Cluster Concepts\n\n\n- Describe why customers implement a chassis cluster\n- Identify chassis cluster components\n- Describe the causes of failover\nModule 12: Implementing a Chassis Cluster\n\n\n- Configure a chassis cluster\n- Explain additional chassis cluster configuration options\nLab 9: Implementing a Chassis Cluster\n\nModule 13: Troubleshooting a Chassis Cluster\n\n\n- Troubleshoot a chassis cluster\n- Explain the chassis cluster case studies\nSELF-STUDY MODULE\n\nModule 14: Explain Junos OS Routing Fundamentals\n\n\n- Explain the difference between directly connected, static, and dynamic routes\n- Explain how route preference determines the active route to a destination\n- Demonstrate how to display and examine the inet.0 and inet6.0 routing tables\n- Configure and validate static routing\n- Explain the flow process","summary_plain":"This four-day, intermediate-level course provides students with the knowledge required to work with Juniper Connected Security devices. This course uses Junos CLI, Junos Space\u00ae Security Director. The course provides further instruction on how Juniper Networks approaches a complete security solution for current and future security problems, called Juniper Connected Security. Key topics include tasks for intrusion detection and prevention (IDP) rules and custom attack objects, IPSec VPNs, Security Director management, Juniper\u00ae Advanced Threat Prevention management (ATP) Cloud management, Policy Enforcer management, Identity aware security policies, Secure Sockets Layer (SSL) Proxy configuration, and Juniper Networks\u00ae SRX Series Firewalls high availability configuration and troubleshooting. Through demonstrations and hands-on labs, students will gain experience with the features of each of these devices.\n\nThrough demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 24.2R1, Junos Space 23.1R1, Security Director 23.1R1, and JIMS 1.7.0R2.","skill_level":"Intermediate","version":"25.a","duration":{"unit":"d","value":4,"formatted":"4 jours"},"pricelist":{"List Price":{"DE":{"country":"DE","currency":"EUR","taxrate":19,"price":3750},"AT":{"country":"AT","currency":"EUR","taxrate":20,"price":3750},"CH":{"country":"CH","currency":"CHF","taxrate":8.1,"price":4800},"IL":{"country":"IL","currency":"ILS","taxrate":17,"price":13010},"MK":{"country":"MK","currency":"EUR","taxrate":null,"price":2950},"GR":{"country":"GR","currency":"EUR","taxrate":null,"price":2950},"HU":{"country":"HU","currency":"EUR","taxrate":20,"price":2950},"UA":{"country":"UA","currency":"EUR","taxrate":20,"price":3750},"SK":{"country":"SK","currency":"EUR","taxrate":null,"price":3750}}},"lastchanged":"2025-09-05T10:44:53+02:00","parenturl":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-courses","nexturl_course_schedule":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-course-schedule\/2888","source_lang":"fr","source":"https:\/\/portal.flane.ch\/swisscom\/fr\/json-course\/juniper-jsec"}}