Introduction to Juniper Security (IJSEC) Training in Hong Kong

  • Learn via: Classroom
  • Duration: 3 Days
  • Level: Intermediate
  • Price: From €2,853+VAT
We can host this training at your preferred location. Contact us!

This course is designed to provide students with the foundational knowledge required to work with SRX Series devices.

This course will use the J-Web user interface to introduce students to the Junos operating system.
The course provides a brief overview of security problems and how Juniper Networks approaches a complete security solution with Juniper Connected Security.
Key topics include configuration tasks for initial system configuration, interface configuration, security object configuration, security policy configuration, IPsec VPN configuration, and NAT configuration.

The course then delves into Layer 7 security using UTM, IDP, and AppSecure to provide students with the understanding of application level security to block advanced threats.

An overview of Sky ATP is included for students to understand zero-day network protection technologies.

Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations.

This course is based on Junos OS Release 19.1R1.6.

IJSEC is an introductory-level course.

  • Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/ IP protocol suite.

  • Identify high-level security challenges in today’s networks.
  • Identify products that are incorporated into the Juniper Connected Security solution.
  • Explain the value of implementing security solutions.
  • Explain how Juniper Connected Security solves the cyber security challenges of the future.
  • Explain the SRX Series devices and the added capabilities that next-generation firewalls provide.
  • Explain traffic flows through the SRX Series devices.
  • List the different security objects and how to create them.
  • Describe interface types and perform basic interface configuration tasks.
  • Describe the initial configuration for an SRX Series device.
  • Explain security zones.
  • Describe screens and their use.
  • Explain address objects.
  • Describe services and their use.
  • Describe the purpose for security policies on an SRX Series device.
  • Describe zone-based policies.
  • Describe global policies and their use.
  • Explain unified security policies.
  • Configure unified security policies with the J-Web user interface.
  • Describe IDP signatures.
  • Configure an IDP policy using predefined templates with the J-Web user interface.
  • Describe the use and configuration of the integrated user firewall feature.
  • Describe the UTM security services
  • List the available UTM services on the SRX Series device.
  • Configure UTM filtering on a security policy with the J-Web user interface.
  • Explain Sky ATP’s use in security.
  • Describe how Sky ATP and SRX Series devices operate together in blocking threats.
  • Describe NAT and why it is used.
  • Explain source NAT and when to use it.
  • Explain destination NAT and when to use it.
  • Explain static NAT and its uses.
  • Describe the operation and configuration the different types of NAT.
  • Identify various types of VPNs.
  • Describe IPsec VPNs and their functionality.
  • Describe how IPsec VPNs are established.
  • Describe IPsec traffic processing.
  • Configure IPsec VPNs with the J-Web user interface.
  • Describe and configure proxy IDs and traffic selectors with the J-Web user interface.
  • Monitor IPsec VPNs with the J-Web user interface.
  • Describe the J-Web monitoring features.
  • Explain the J-Web reporting features.
  • Describe the Sky Enterprise service and how it can save resources.
  • Explain the functionality of Junos Space Security Director.

Day 1

1 COURSE INTRODUCTION

2 Juniper Security Concepts

  • Security Challenges
  • Security Design Overview
  • Juniper Connected Security

3 Juniper Connected Security – SRX Series Devices

  • Connected Security
  • Interfaces
  • Initial Configuration

LAB 1: Initial Configuration

4 Security Objects

  • Security Zone Objects
  • Security Screen Objects
  • Security Address Objects
  • Security Services Objects

LAB 2: Creating Security Objects with J-Web

5 Security Policies

  • Security Policy Overview
  • Zone-Based Policies
  • Global Security Policies
  • Application Firewall with Unified Security Policies

LAB 3: Creating Security Policies with J-Web

Day 2

6 Security Services – IDP and User Firewall

  • IDP Security Services
  • Integrated User Firewall

LAB 4: Adding IDP and User Firewall Security Services to Security Policies

7 Security Services – UTM

  • Content Filtering
  • Web Filtering
  • Antivirus
  • Antispam

LAB 5: Adding UTM Security Services to Security Policies

8 Juniper Connected Security – Sky ATP

  • Sky ATP Overview
  • Blocking Threats

Lab 6: Demonstrating Sky ATP

9 Network Address Translation

  • NAT Overview
  • Source NAT
  • Destination NAT
  • Static NAT

Lab 7: Implementing Network Address Translation

Day 3

10 IPsec VPN Concepts

  • VPN Types
  • Secure VPN Requirements
  • IPsec Tunnel Establishment
  • IPsec Traffic Processing

11 Site-to-Site VPNs

  • IPsec Configuration
  • IPsec Site-to-Site Tunnel

Lab 8: Implementing Site-to-Site IPsec VPNs

12 Monitoring and Reporting

  • J-Web monitoring options
  • J-Web Reporting options

Lab 9: Using Monitoring and Reporting

  • Appendix A: SRX Series Hardware
  • Appendix B: Virtual SRX
  • Appendix C: CLI Primer
  • Appendix D: Sky Enterprise Services
  • Appendix E: Junos Space Security Director


Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Hong Kong facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
10 August 2024
Hong Kong, Kowloon, Tsuen Wan
3 Days
Classroom / Virtual Classroom
19 August 2024
Hong Kong, Kowloon, Tsuen Wan
3 Days
Classroom / Virtual Classroom
01 September 2024
Hong Kong, Kowloon, Tsuen Wan
3 Days
Classroom / Virtual Classroom
07 September 2024
Hong Kong, Kowloon, Tsuen Wan
3 Days
Classroom / Virtual Classroom
09 September 2024
Hong Kong, Kowloon, Tsuen Wan
€2,853 +VAT Book Now
Classroom / Virtual Classroom
18 September 2024
Hong Kong, Kowloon, Tsuen Wan
3 Days
Classroom / Virtual Classroom
17 September 2024
Hong Kong, Kowloon, Tsuen Wan
3 Days
Classroom / Virtual Classroom
13 October 2024
Hong Kong, Kowloon, Tsuen Wan
3 Days
Introduction to Juniper Security (IJSEC) Training Course in Hong Kong

Hong Kong is officially known as the Hong Kong Special Administrative Region of the People's Republic of China (HKSAR) and is a city and special administrative region of China on the eastern Pearl River Delta in South China. Hong Kong is one of the most densely populated places in the world, with over 7.5 million population. The official languages of the HKSAR are Chinese and English. Hong Kong is a highly developed territory and ranks fourth on the United Nations Human Development Index and the residents of Hong Kong have the highest life expectancies in the world.

The best time to visit Hong Kong is from September to December, since the temperatures, averaging between 19 to 28 degree Celsius. During this outdoor activities-friendly travelling season, you can take a walk along Victoria Harbour, visit the islands of Lantau, Lamma and Cheung Chau and participate in the Mid-Autumn Festival. Top choices of the tourists to visit in Hong Kong are Big Buddha statue, Wong Tai Sin Temple, Repulse Bay and the Beaches and Hong Kong Disneyland.

Explore our diverse range of IT courses, encompassing programming, software development, cyber security, data science, business skills, and Agile/Scrum. Wherever you are in Hong Kong, our seasoned instructors will bring practical training and expert knowledge to your preferred training venue.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.