杭州博学教育IT认证培训学校

杭州哪里有JNCIS-SEC(初级-Junos安全)培训?

JUNIPER网络公司路由器操作和故障排除(OTJNR)是一门由教师指导的中级课程,主要介绍JUNIPER网络公司M-系列和T-系列平台的操作和故障排除。该课程向学员讲授故障分析步骤和故障排除技巧以帮助他们确定并排除故障。讲授的这些技能和JUNIPER网络公司技术援助中心(JTAC)工程师在日常工作中使用的技能非常相似。请注意,这一课程的不是配置或路由的运行/理论。

该课程分配大量时间来进行各种故障排除亲手实验操作。这些实验操作的是M-系列和T-系列硬件、JUNOS软件、接口和传输线路、路由及转发平面的故障隔离和纠正措施。该课程还介绍有助于完成故障隔离的JTAC流程和建议的较佳实践方法。

杭州瞻博互联网初级(JNCIS-SEC)培训班

培训课程

面向安全平台的Junos (JSEC)   3天

Junos 统一威胁管理(JUTM)      1天

 

◎ Junos Security (JSEC) 面向安全平台的Junos

This three-day course covers the configuration, operation, and implementation of SRX Series Services Gateways in a typical network environment. Key topics within this course include security technologies such as security zones, security policies, intrusion detection and prevention (IDP), Network Address Translation (NAT), and high availability clusters, as well as details pertaining to basic implementation, configuration, and management. 

Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Junos OS and monitoring device operations. This course uses Juniper Networks SRX Series Services Gateways for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. This course is based on Junos OS Release 12.1R1.9.

 

课程目标

After successfully completing this course, you should be able to:

°§ Describe traditional routing and security and the current trends in internetworking.

°§Provide an overview of SRX Series devices and software architecture.

°§Describe the logical packet flow and session creation performed by SRX Series devices.

°§Describe, configure, and monitor zones.

°§Describe, configure, and monitor security policies.

°§Describe, configure, and monitor firewall user authentication.

°§Describe various types of network attacks.

°§Configure and monitor Screen options to prevent network attacks.

°§ Explain, implement, and monitor NAT, as implemented on Junos security platforms.

°§Explain the purpose and mechanics of IP Security (IPsec) virtual private networks (VPNs).

°§Implement and monitor policy-based and route-based IPsec VPNs.

°§Utilize and update the IDP signature database.

°§Configure and monitor IDP policy with policy templates.

°§Describe, configure, and monitor high availability chassis clusters.

 

培训对象

This course benefits operators of SRX Series devices. These operators include network engineers, administrators, support personnel, and reseller support personnel.

 

学员基础

Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite. Students should also attend the Introduction to the Junos Operating System (IJOS) course and the Junos Routing Essentials (JRE) course, or have equivalent experience prior to attending this class.

 

课程内容

Day 1

Chapter 1: Course Introduction

Chapter 2: Introduction to Junos Security

°§Traditional Routing

°§Traditional Security

°§The Junos OS Architecture

Chapter 3: Zones

°§The Definition of Zones

°§Zone Configuration

°§Monitoring Security Zones

°§Lab 1: Configuring and Monitoring Zones

Chapter 4: Security Policies

°§Security Policy Overview

°§Junos ALGs

°§Policy Components

°§Verifying Policy Operation

°§Policy Scheduling and Rematching

°§Policy Case Study

°§Lab 2: Security Policies

Day 2

Chapter 5: Firewall User Authentication

°§Firewall User Authentication Overview

°§Pass-Through Authentication

°§Web Authentication

°§Client Groups

°§Using External Authentication Servers

°§Verifying Firewall User Authentication

°§Lab 3: Configuring Firewall Authentication

Chapter 6: Screen Options

°§Multilayer Network Protection

°§Stages and Types of Attacks

°§Using Junos Screen OptionsReconnaissance Attack Handling

°§Using Junos Screen OptionsDenial of Service Attack Handling

°§Using Junos Screen OptionsSuspicious Packets Attack Handling

°§Applying and Monitoring Screen Options

°§Lab 4: Implementing Screen Options

Chapter 7: Network Address Translation

°§NAT Overview

°§Source NAT Operation and Configuration

°§Destination NAT Operation and Configuration

°§Static NAT Operation and Configuration

°§Proxy ARP

°§Monitoring and Verifying NAT Operation

°§Lab 5: Network Address Translation

Day 3

Chapter 8: IPsec VPNs

°§VPN Types

°§Secure VPN Requirements

°§IPsec Details

°§Configuration of IPsec VPNs

°§IPsec VPN Monitoring

°§Lab 6: Implementing IPsec VPNs

Chapter 9: Introduction to Intrusion Detection and Prevention

°§Introduction to Junos IDP

°§IDP Policy Components and Configuration

°§Signature Database

°§Case Study: Applying the Recommended IDP Policy

°§Monitoring IDP Operation

°§Lab 7: Implementing IDP

Chapter 10: High Availability Clustering Theory

°§High Availability Overview

°§Chassis Cluster Components

°§Advanced Chassis Cluster Topics

Chapter 11: High Availability Clustering Implementation

°§Chassis Cluster Operation

°§Chassis Cluster Configuration

°§Chassis Cluster Monitoring

°§Lab 8: Implementing High Availability Techniques

Appendix A: SRX Series Hardware and Interfaces

°§Branch SRX PlatformOverview

°§High End SRX PlatformOverview

°§SRX Traffic Flow and Distribution

°§SRX Interfaces

 

◎ Junos Unified Threat Management (JUTM) Junos统一威胁管理

This one-day course includes detailed coverage of Web filtering, antivirus (AV), antispam, and content filtering. Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring the Unified Threat Management (UTM) features of the Junos operating system. This course is based on the Junos OS Release 11.4R1.6.

 

课程目标

After successfully completing this course, you should be able to:

°§ Describe the challenges that branch offices present to network managers.

°§List the major features that UTMoffers.

°§Explain how each major feature addresses the challenges of the branch office.

°§List the SRX Series Services Gateways hardware devices on which UTM is available.

°§Describe the UTM features that require specific licenses.

°§Define terms used in the creation of effective antispam UTMpolicies.

°§Describe the process by which UTM examines traffic for spam.

°§Describe the overall process of configuring an antispamUTMpolicy.

°§Describe the kinds of information available from the device when it has

 detected spam.

°§Describe how the AV process examines traffic.

°§Describe the differences between full file-based AV versus express AV.

°§Describe the settings that are required for configuring AV protection.

°§ Explain how these settings affect scanning performance and effectiveness.

°§Describe options available for scanning supported protocols.

°§List the general steps required to configure AV.

°§Describe the statistical information available to verify AV functionality.

°§Describe content and Web filtering and their purpose.

°§List and describe each of the parameters used when configuring Web and content filtering.

°§Describe in general terms the steps necessary to configure web and content filtering.

°§Monitor Web and content filtering.

 

培训对象

This course benefits individuals responsible for implementing and monitoring the UTM features available on branch SRX Services Gateways and J Series Services Routers.

 

学员基础

Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) model and the TCP/IP protocol suite. Students should also have working knowledge of security policies. Students should also attend the Introduction to the Junos Operating System(IJOS), Junos Routing Essentials (JRE), and Junos Security (JSEC) courses prior to attending this class.

 

课程内容

Chapter 1: Course Introduction

Chapter 2: UTMOverview

°§Branch Office Challenges

°§UTMFeature Overview

°§Design Basics

°§Hardware Support

°§Licensing of Features

°§Lab 1: Connecting to the Lab Equipment and Testing Connectivity

Chapter 3: Antispam

°§Antispam Terminology

°§Overview of Antispam Process

°§UTMPolicy Overview

°§Configuration Steps

°§Monitoring Antispam

°§Lab 2: Configuring an Antispam Policy

Chapter 4: Full File-Based and Express Antivirus

°§Antivirus Terminology

°§Overview of Antivirus Process

°§AV Operation

°§Full File-based AV Configuration

°§Express AV Configuration

°§Monitoring AV

°§Lab 3: Antivirus Configuration and Testing

Chapter 5: Content and Web Filtering

°§Overview and Terminology

°§Configuration

°§Verification and Monitoring

°§Lab 4: Configuring Content and Web Filtering

杭州博学IT教育培训中心

杭州博学信息技术服务有限公司即博学教育培训中心,成立于2003年8月是国内IT领域O2O 教育,国内的专业IT培训,致力于培养且具备培养OCM、RHCA、CCIE三大人才条件的中心。博学是一家以教育培训、技术服务为主的IT服务型企业,其宗旨在于为社会各界人士提供、定制的专业IT培训,认证培训,职业就业培训等服务。目前是电子信息产业基地实训中心,杭州市服务外包人才培训,浙江省别的Oracle授权培训中心,浙江省Cisco授权培训中心,浙江省红帽授权培训中心,同时也是IBM培训合作伙伴,HP 培训合作伙伴,Prometric、VUE 授权中心,每年培训学员5000人次,是100余家500强、单位、大型国企、上市公司的专业IT培训供应商。

博学致力于IT高端教育,在计算机软件(Oracle、Microsoft、VMware、CIW、RedHat Linux等), 硬件(如HP、IBM、SUN 等),网络(Cisco、华为)等与厂商有着良好的合作关系并通过 长期努力得了厂家别的授权合作,并与多家国内、外IT企业建立了合作伙伴关系。

博学拥有一支强大的技术服务队伍,具有的技术服务力量和教学设施,同时与专业伙伴紧 密结合,拥有丰富的计算机培训服务经验以及为部门、电信、教育、金融等行业提供专业计算 机技术服务经验,专职培训老师均为业内的讲师或技术工程师。

联系我们

想了解更多杭州博学IT认证培训课程,欢迎使用屏幕上方的联系方式联系我们,我们会有专业的老师对您的问题进行解答;也可以留下您的联系方式,我们将会在第①时间联系您,欢迎您随时来杭州博学体验我们的课程!



| 回到顶部