<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="2888" language="de" source="https://portal.flane.ch/swisscom/xml-course/juniper-jsec" lastchanged="2025-09-05T10:44:53+02:00" parent="https://portal.flane.ch/swisscom/xml-courses"><title>Juniper Security</title><productcode>JSEC</productcode><vendorcode>JP</vendorcode><vendorname>Juniper Networks</vendorname><fullproductcode>JP-JSEC</fullproductcode><version>25.a</version><objective>&lt;ul&gt;
&lt;li&gt;Explain the basics of intrusion detection.&lt;/li&gt;&lt;li&gt;Explain the function of SSL Proxy.&lt;/li&gt;&lt;li&gt;Explain IPsec VPN concepts.&lt;/li&gt;&lt;li&gt;Implement site-to-site IPsec VPNs.&lt;/li&gt;&lt;li&gt;Implement Juniper&amp;reg; Secure Connect.&lt;/li&gt;&lt;li&gt;Implement identity-aware security policies.&lt;/li&gt;&lt;li&gt;Explain Security Director.&lt;/li&gt;&lt;li&gt;Introduce Policy Enforcer.&lt;/li&gt;&lt;li&gt;Describe the Juniper ATP Cloud Anti-Malware.&lt;/li&gt;&lt;li&gt;Describe the Juniper ATP Cloud features.&lt;/li&gt;&lt;li&gt;Explain the concepts of a chassis cluster.&lt;/li&gt;&lt;li&gt;Explain how to set up a chassis cluster.&lt;/li&gt;&lt;li&gt;Review troubleshooting steps for chassis clusters.&lt;/li&gt;&lt;li&gt;Explain how to set up a chassis cluster.&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;ul&gt;
&lt;li&gt;Basic networking knowledge and an understanding of the OSI reference model and the TCP/ IP protocol suite&lt;/li&gt;&lt;li&gt;Completing the &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/course/juniper-ijos&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Introduction to the Junos Operating System &lt;span class=&quot;fl-prod-pcode&quot;&gt;(IJOS)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; course&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;Individuals responsible for security operations using Juniper Networks security solutions, including network engineers, security engineers, administrators, support personnel, and resellers.&lt;/p&gt;</audience><contents>&lt;ul&gt;
&lt;li&gt;Implementing Intrusion Detection and Prevention&lt;/li&gt;&lt;li&gt;Implementing SSL Proxy&lt;/li&gt;&lt;li&gt;IPsec VPN Concepts&lt;/li&gt;&lt;li&gt;Implementing Site-to-Site IPsec VPNs&lt;/li&gt;&lt;li&gt;Implementing Juniper Secure Connect&lt;/li&gt;&lt;li&gt;Implementing Identity Aware Security Policies&lt;/li&gt;&lt;li&gt;Introducing Security Director&lt;/li&gt;&lt;li&gt;Introducing Policy Enforcer&lt;/li&gt;&lt;li&gt;Implementing Juniper ATP Cloud Anti-Malware&lt;/li&gt;&lt;li&gt;Implementing Juniper ATP Cloud Features&lt;/li&gt;&lt;li&gt;Understanding Chassis Cluster Concepts&lt;/li&gt;&lt;li&gt;Implementing a Chassis Cluster&lt;/li&gt;&lt;li&gt;Troubleshooting a Chassis Cluster&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Self-Study Module&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain Junos OS Routing Fundamentals&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;h4&gt;DAY 1&lt;/h4&gt;&lt;h5&gt;Module 1: Implementing Intrusion Detection and Prevention&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe the purpose of IDP&lt;/li&gt;&lt;li&gt;Utilize and update the IDP signature database&lt;/li&gt;&lt;li&gt;Configure an IDP policy&lt;/li&gt;&lt;li&gt;Utilize and configure an IDP policy using a template&lt;/li&gt;&lt;li&gt;Monitor IDP operations&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 1: Implementing IDP&lt;/p&gt;
&lt;h5&gt;Module 2: Implementing SSL Proxy&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain why SSL proxy is necessary&lt;/li&gt;&lt;li&gt;Describe and configure client-protection SSL proxy&lt;/li&gt;&lt;li&gt;Describe and configure server-protection SSL proxy&lt;/li&gt;&lt;li&gt;Discuss how to monitor SSL proxy&lt;/li&gt;&lt;li&gt;Explain the SSL mirror decrypt feature&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 2: Implementing SSL Proxy&lt;/p&gt;
&lt;h5&gt;Module 3: IPsec VPN Concepts&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Identify various types of VPNs&lt;/li&gt;&lt;li&gt;Describe IPsec VPNs and their functionalities&lt;/li&gt;&lt;li&gt;Describe how IPsec VPNs are established&lt;/li&gt;&lt;li&gt;Describe IPsec traffic processing&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 4: Implementing Site-to-Site IPsec VPNs&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe the high-level configuration options for an IPsec VPN&lt;/li&gt;&lt;li&gt;Describe the functionality of proxy IDs and traffic selectors&lt;/li&gt;&lt;li&gt;Configure an IPsec site-to-site VPN&lt;/li&gt;&lt;li&gt;Monitor a site-to-site IPsec VPN&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 3: Implementing Site-to-Site IPsec VPNs&lt;/p&gt;
&lt;h4&gt;DAY 2&lt;/h4&gt;&lt;h5&gt;Module 5: Implementing Juniper Secure Connect&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe Juniper Secure Connect features&lt;/li&gt;&lt;li&gt;Explain Juniper Secure Connect UI options&lt;/li&gt;&lt;li&gt;Configure Juniper Secure Connect on SRX Series devices&lt;/li&gt;&lt;li&gt;Connect Juniper Secure Connect Client&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 4: Implementing Juniper Secure Connect&lt;/p&gt;
&lt;h5&gt;Module 6: Implementing Identity Aware Security Policies&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe identity-aware firewall and list supported identity sources&lt;/li&gt;&lt;li&gt;Describe Active Directory as identity source&lt;/li&gt;&lt;li&gt;Configure Active Directory as identity source&lt;/li&gt;&lt;li&gt;Describe Juniper Identity Management Service&lt;/li&gt;&lt;li&gt;Explain how to install Juniper Identity Management Service&lt;/li&gt;&lt;li&gt;Configure Juniper Identity Management Service&lt;/li&gt;&lt;li&gt;Describe how to troubleshoot Juniper Identity Management Service&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 5: Implementing Identity Aware Security Policies&lt;/p&gt;
&lt;h5&gt;Module 7: Introducing Security Director&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain the benefits of Security Director&lt;/li&gt;&lt;li&gt;Explain Security Director deployment options&lt;/li&gt;&lt;li&gt;Demonstrate how to access and use the Security Director UI&lt;/li&gt;&lt;li&gt;Demonstrate how to onboard a device&lt;/li&gt;&lt;li&gt;Demonstrate how to manage security policies&lt;/li&gt;&lt;li&gt;Demonstrate how to deploy and validate configuration changes&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 6: Using Security Director&lt;/p&gt;
&lt;h4&gt;DAY 3&lt;/h4&gt;&lt;h5&gt;Module 8: Introducing Policy Enforcer&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain the benefits of Policy Enforcer&lt;/li&gt;&lt;li&gt;Explain how to configure a secure fabric&lt;/li&gt;&lt;li&gt;Describe how infected host remediation occurs&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 9: Implementing Juniper ATP Cloud Anti-Malware&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe Juniper ATP Cloud anti-malware capabilities&lt;/li&gt;&lt;li&gt;Describe the Juniper ATP Cloud Web UI options&lt;/li&gt;&lt;li&gt;Configure the SRX Series Firewall to use Juniper ATP Cloud anti-malware&lt;/li&gt;&lt;li&gt;Discuss a Juniper ATP Cloud anti-malware case study&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 7: Enrolling Devices in Juniper ATP Cloud&lt;/p&gt;
&lt;h5&gt;Module 10: Implementing Juniper ATP Cloud Features&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain Security Intelligence&lt;/li&gt;&lt;li&gt;Describe Encrypted Traffic Insights&lt;/li&gt;&lt;li&gt;Describe Adaptive Threat Profiling&lt;/li&gt;&lt;li&gt;Explain IoT Security&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 8: Implementing ATP Cloud Features&lt;/p&gt;
&lt;h4&gt;DAY 4&lt;/h4&gt;&lt;h5&gt;Module 11: Understanding Chassis Cluster Concepts&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Describe why customers implement a chassis cluster&lt;/li&gt;&lt;li&gt;Identify chassis cluster components&lt;/li&gt;&lt;li&gt;Describe the causes of failover&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 12: Implementing a Chassis Cluster&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Configure a chassis cluster&lt;/li&gt;&lt;li&gt;Explain additional chassis cluster configuration options&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Lab 9: Implementing a Chassis Cluster&lt;/p&gt;
&lt;h5&gt;Module 13: Troubleshooting a Chassis Cluster&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Troubleshoot a chassis cluster&lt;/li&gt;&lt;li&gt;Explain the chassis cluster case studies&lt;/li&gt;&lt;/ul&gt;&lt;h4&gt;SELF-STUDY MODULE&lt;/h4&gt;&lt;h5&gt;Module 14: Explain Junos OS Routing Fundamentals&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Explain the difference between directly connected, static, and dynamic routes&lt;/li&gt;&lt;li&gt;Explain how route preference determines the active route to a destination&lt;/li&gt;&lt;li&gt;Demonstrate how to display and examine the inet.0 and inet6.0 routing tables&lt;/li&gt;&lt;li&gt;Configure and validate static routing&lt;/li&gt;&lt;li&gt;Explain the flow process&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>- Explain the basics of intrusion detection.
- Explain the function of SSL Proxy.
- Explain IPsec VPN concepts.
- Implement site-to-site IPsec VPNs.
- Implement Juniper® Secure Connect.
- Implement identity-aware security policies.
- Explain Security Director.
- Introduce Policy Enforcer.
- Describe the Juniper ATP Cloud Anti-Malware.
- Describe the Juniper ATP Cloud features.
- Explain the concepts of a chassis cluster.
- Explain how to set up a chassis cluster.
- Review troubleshooting steps for chassis clusters.
- Explain how to set up a chassis cluster.</objective_plain><essentials_plain>- Basic networking knowledge and an understanding of the OSI reference model and the TCP/ IP protocol suite
- Completing the Introduction to the Junos Operating System (IJOS) course</essentials_plain><audience_plain>Individuals responsible for security operations using Juniper Networks security solutions, including network engineers, security engineers, administrators, support personnel, and resellers.</audience_plain><contents_plain>- Implementing Intrusion Detection and Prevention
- Implementing SSL Proxy
- IPsec VPN Concepts
- Implementing Site-to-Site IPsec VPNs
- Implementing Juniper Secure Connect
- Implementing Identity Aware Security Policies
- Introducing Security Director
- Introducing Policy Enforcer
- Implementing Juniper ATP Cloud Anti-Malware
- Implementing Juniper ATP Cloud Features
- Understanding Chassis Cluster Concepts
- Implementing a Chassis Cluster
- Troubleshooting a Chassis Cluster
Self-Study Module


- Explain Junos OS Routing Fundamentals</contents_plain><outline_plain>DAY 1

Module 1: Implementing Intrusion Detection and Prevention


- Describe the purpose of IDP
- Utilize and update the IDP signature database
- Configure an IDP policy
- Utilize and configure an IDP policy using a template
- Monitor IDP operations
Lab 1: Implementing IDP

Module 2: Implementing SSL Proxy


- Explain why SSL proxy is necessary
- Describe and configure client-protection SSL proxy
- Describe and configure server-protection SSL proxy
- Discuss how to monitor SSL proxy
- Explain the SSL mirror decrypt feature
Lab 2: Implementing SSL Proxy

Module 3: IPsec VPN Concepts


- Identify various types of VPNs
- Describe IPsec VPNs and their functionalities
- Describe how IPsec VPNs are established
- Describe IPsec traffic processing
Module 4: Implementing Site-to-Site IPsec VPNs


- Describe the high-level configuration options for an IPsec VPN
- Describe the functionality of proxy IDs and traffic selectors
- Configure an IPsec site-to-site VPN
- Monitor a site-to-site IPsec VPN
Lab 3: Implementing Site-to-Site IPsec VPNs

DAY 2

Module 5: Implementing Juniper Secure Connect


- Describe Juniper Secure Connect features
- Explain Juniper Secure Connect UI options
- Configure Juniper Secure Connect on SRX Series devices
- Connect Juniper Secure Connect Client
Lab 4: Implementing Juniper Secure Connect

Module 6: Implementing Identity Aware Security Policies


- Describe identity-aware firewall and list supported identity sources
- Describe Active Directory as identity source
- Configure Active Directory as identity source
- Describe Juniper Identity Management Service
- Explain how to install Juniper Identity Management Service
- Configure Juniper Identity Management Service
- Describe how to troubleshoot Juniper Identity Management Service
Lab 5: Implementing Identity Aware Security Policies

Module 7: Introducing Security Director


- Explain the benefits of Security Director
- Explain Security Director deployment options
- Demonstrate how to access and use the Security Director UI
- Demonstrate how to onboard a device
- Demonstrate how to manage security policies
- Demonstrate how to deploy and validate configuration changes
Lab 6: Using Security Director

DAY 3

Module 8: Introducing Policy Enforcer


- Explain the benefits of Policy Enforcer
- Explain how to configure a secure fabric
- Describe how infected host remediation occurs
Module 9: Implementing Juniper ATP Cloud Anti-Malware


- Describe Juniper ATP Cloud anti-malware capabilities
- Describe the Juniper ATP Cloud Web UI options
- Configure the SRX Series Firewall to use Juniper ATP Cloud anti-malware
- Discuss a Juniper ATP Cloud anti-malware case study
Lab 7: Enrolling Devices in Juniper ATP Cloud

Module 10: Implementing Juniper ATP Cloud Features


- Explain Security Intelligence
- Describe Encrypted Traffic Insights
- Describe Adaptive Threat Profiling
- Explain IoT Security
Lab 8: Implementing ATP Cloud Features

DAY 4

Module 11: Understanding Chassis Cluster Concepts


- Describe why customers implement a chassis cluster
- Identify chassis cluster components
- Describe the causes of failover
Module 12: Implementing a Chassis Cluster


- Configure a chassis cluster
- Explain additional chassis cluster configuration options
Lab 9: Implementing a Chassis Cluster

Module 13: Troubleshooting a Chassis Cluster


- Troubleshoot a chassis cluster
- Explain the chassis cluster case studies
SELF-STUDY MODULE

Module 14: Explain Junos OS Routing Fundamentals


- Explain the difference between directly connected, static, and dynamic routes
- Explain how route preference determines the active route to a destination
- Demonstrate how to display and examine the inet.0 and inet6.0 routing tables
- Configure and validate static routing
- Explain the flow process</outline_plain><duration unit="d" days="4">4 Tage</duration><pricelist><price country="DE" currency="EUR">3750.00</price><price country="AT" currency="EUR">3750.00</price><price country="CH" currency="CHF">4800.00</price><price country="IL" currency="ILS">13010.00</price><price country="MK" currency="EUR">2950.00</price><price country="GR" currency="EUR">2950.00</price><price country="HU" currency="EUR">2950.00</price><price country="UA" currency="EUR">3750.00</price><price country="SK" currency="EUR">3750.00</price></pricelist><miles><milesvalue country="DE" vendorcurrency="JTC" vendorcurrencyname="Juniper Training Credits">4000.00</milesvalue></miles></course>