[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jwrrf49u’ admin_preview_bg=”] juniper network

juniper security courses

This Juniper Networks training course with Anthony Sequeira will teach you the fundamentals of networking and the Junos operating system. Learn the basics of Junos configuration, routing, monitoring, firewall filters, and more, as you prepare for the JNCIA-Junos (JN0-102) certification exam.

Recommended Experience

  • Completion of CompTIA A+ and CompTIA Network+ (N10-007) is recommended, but not required

Recommended Equipment

  • Any Juniper Networks JUNOS device, such as SRX routers and EX switches

Related Certifications

  • JNCIA-JUNOS

Related Job Functions

  • Network engineering
  • Network administration

Anthony Sequeira has been a CBT Nuggets trainer since 2012 and holds a variety of Juniper, Cisco, Microsoft, and AWS certifications. Anthony is also a CCIE in Routing and Switching. His earlier networking courses here at CBT Nuggets continue to be some of the top-rated courses in the library.

ASSOCIATEJunos, Associate (JNCIA-Junos)

Designed for networking professionals with beginner-intermediate knowledge of networking, this written exam verifies the candidate’s understanding of networking fundamentals, as well as core functionality of the Juniper Networks Junos OS.

Topics of JNCIA

[/av_textblock] [av_table purpose=’tabular’ pricing_table_design=’avia_pricing_default’ pricing_hidden_cells=’avia_show_empty_cells’ caption=” responsive_styling=’avia_responsive_table’ av_uid=’av-1p7vc5k82′] [av_row row_style=” av_uid=’av-1p215jl2a’][av_cell col_style=” av_uid=’av-637q1voi’][/av_cell][av_cell col_style=” av_uid=’av-1oux7j71e’]JNCIA-Junos
[/av_cell][av_cell col_style=” av_uid=’av-1ooq25dlu’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-1ol2bzs9u’][av_cell col_style=” av_uid=’av-1odg6h57m’]Networking Fundamentals(5H)
[/av_cell][av_cell col_style=” av_uid=’av-1oapp0tsy’]IJOS(8H) [/av_cell][av_cell col_style=” av_uid=’av-1o5fc9kyq’]JRE(8H) [/av_cell][/av_row] [av_row row_style=” av_uid=’av-1nzzfgov6′][av_cell col_style=” av_uid=’av-1nw4lapeq’]What is a network?
[/av_cell][av_cell col_style=” av_uid=’av-1nqnmzi76′]Chapter 1: Course Introduction [/av_cell][av_cell col_style=” av_uid=’av-1noc2k6g2′]Chapter 1: Course Introduction [/av_cell][/av_row] [av_row row_style=” av_uid=’av-5yioqdlu’][av_cell col_style=” av_uid=’av-1nf4qu142′]· Network models
[/av_cell][av_cell col_style=” av_uid=’av-1n9qoporm’]Chapter 2: Junos Operating System Fundamentals [/av_cell][av_cell col_style=” av_uid=’av-5x1a9p9e’]Chapter 2: Routing Fundamentals [/av_cell][/av_row] [av_row row_style=” av_uid=’av-1n1mn015u’][av_cell col_style=” av_uid=’av-1mwskor6q’]· How data flows from one computer to another
[/av_cell][av_cell col_style=” av_uid=’av-1mr53srmq’]· The Junos OS [/av_cell][av_cell col_style=” av_uid=’av-1moxvd0de’]· Routing Concepts: Overview of Routing [/av_cell][/av_row] [av_row row_style=” av_uid=’av-1mh098z36′][av_cell col_style=” av_uid=’av-1md8oyteq’]· Network addressing
[/av_cell][av_cell col_style=” av_uid=’av-5tnvmleq’]· Traffic Processing [/av_cell][av_cell col_style=” av_uid=’av-1m6bg2zdu’]· Routing Concepts: The Routing Table [/av_cell][/av_row] [av_row row_style=” av_uid=’av-1lz1ugcgy’][av_cell col_style=” av_uid=’av-1lued3l9e’]Ethernet LANs
[/av_cell][av_cell col_style=” av_uid=’av-1lr17zf36′]· Platforms Running the Junos OS [/av_cell][av_cell col_style=” av_uid=’av-1lkkzqmjm’]· Routing Concepts: Routing Instances [/av_cell][/av_row] [av_row row_style=” av_uid=’av-1lj5x82hu’][av_cell col_style=” av_uid=’av-1lbf66x9e’]· How Ethernet networks operate
[/av_cell][av_cell col_style=” av_uid=’av-1l82phiw2′]Chapter 3: User Interface Options [/av_cell][av_cell col_style=” av_uid=’av-1l5st6z8i’]· Static Routing [/av_cell][/av_row] [av_row row_style=” av_uid=’av-1kzargi5e’][av_cell col_style=” av_uid=’av-1kwnqfs6a’]· Early Ethernet network devices, including hubs and bridges
[/av_cell][av_cell col_style=” av_uid=’av-1kpn8uzky’]· User Interface Options [/av_cell][av_cell col_style=” av_uid=’av-1kk89zsyq’]· Dynamic Routing [/av_cell][/av_row] [av_row row_style=” av_uid=’av-1kfzsn7fm’][av_cell col_style=” av_uid=’av-1kc66jaqq’]· Today’s Ethernet network devices, including switches and Virtual LANs (VLANs)
[/av_cell][av_cell col_style=” av_uid=’av-1k8kqjiw2′]· The Junos CLI: CLI Basics [/av_cell][av_cell col_style=” av_uid=’av-1k4v99zfm’]· Lab 1: Routing Fundamentals [/av_cell][/av_row] [av_row row_style=” av_uid=’av-1jxrn69ia’][av_cell col_style=” av_uid=’av-1jvtgem5e’]· Wireless LANs
[/av_cell][av_cell col_style=” av_uid=’av-1jr1djcrm’]· The Junos CLI: Operational Mode [/av_cell][av_cell col_style=” av_uid=’av-5k9i9sde’]Chapter 3: Routing Policy [/av_cell][/av_row] [av_row row_style=” av_uid=’av-1jhjik336′][av_cell col_style=” av_uid=’av-1jbclic4i’]Routing basics
[/av_cell][av_cell col_style=” av_uid=’av-1j8u4t942′]· The Junos CLI: Configuration Mode [/av_cell][av_cell col_style=” av_uid=’av-1j2kpv1sy’]· Routing Policy Overview [/av_cell][/av_row] [av_row row_style=” av_uid=’av-5hlnhe5e’][av_cell col_style=” av_uid=’av-1istws9uq’]· Layer 2 and 3 addressing
[/av_cell][av_cell col_style=” av_uid=’av-1iqcx2roi’]· Lab 1: The Junos CLI [/av_cell][av_cell col_style=” av_uid=’av-1ilzjhv36′]· Case Study: Routing Policy [/av_cell][/av_row] [av_row row_style=” av_uid=’av-1ie5eeuua’][av_cell col_style=” av_uid=’av-1icrsvvmq’]· Interconnecting different broadcast domains using routers
[/av_cell][av_cell col_style=” av_uid=’av-5eutiz1e’]Chapter 4: Initial Configuration [/av_cell][av_cell col_style=” av_uid=’av-1i2af1ijm’]· Lab 2: Routing Policy [/av_cell][/av_row] [av_row row_style=” av_uid=’av-1hxvacntu’][av_cell col_style=” av_uid=’av-1hubjojaa’]· Address resolution
[/av_cell][av_cell col_style=” av_uid=’av-1hod2vag2′]· Factory-Default Configuration [/av_cell][av_cell col_style=” av_uid=’av-1hjffcy76′]Chapter 4: Firewall Filters [/av_cell][/av_row] [av_row row_style=” av_uid=’av-1hfimcdr6′][av_cell col_style=” av_uid=’av-1hauhrpya’]· How data is sent from one broadcast domain or network to another
[/av_cell][av_cell col_style=” av_uid=’av-1h3kd37oi’]· Initial Configuration [/av_cell][av_cell col_style=” av_uid=’av-1h1qeqj6q’]· Firewall Filters Overview [/av_cell][/av_row] [av_row row_style=” av_uid=’av-j1ewb36′][av_cell col_style=” av_uid=’av-59yu5ew2′]IP addressing
[/av_cell][av_cell col_style=” av_uid=’av-1gnjq6eaq’]· Interface Configuration [/av_cell][av_cell col_style=” av_uid=’av-1gifydo82′]· Case Study: Firewall Filters [/av_cell][/av_row] [av_row row_style=” av_uid=’av-1gd06c8yq’][av_cell col_style=” av_uid=’av-1g86fxn36′]· Internet Protocol (IP)
[/av_cell][av_cell col_style=” av_uid=’av-1g6epd1nm’]· Lab 2: Initial System Configuration [/av_cell][av_cell col_style=” av_uid=’av-1fz6tnhnm’]· Unicast Reverse-Path-Forwarding Checks [/av_cell][/av_row] [av_row row_style=” av_uid=’av-1fwi4hzky’][av_cell col_style=” av_uid=’av-1fss5dfz6′]· IP addressing
[/av_cell][av_cell col_style=” av_uid=’av-55tzs6g2′]Chapter 5: Secondary System Configuration [/av_cell][av_cell col_style=” av_uid=’av-1fhoo3yoy’]· Lab 3: Firewall Filters [/av_cell][/av_row] [av_row row_style=” av_uid=’av-1fcm9q7tu’][av_cell col_style=” av_uid=’av-1f84z1kv6′] · Network masks
[/av_cell][av_cell col_style=” av_uid=’av-53y4yndu’]· User Configuration and Authentication [/av_cell][av_cell col_style=” av_uid=’av-1ezpdrd0i’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-535rw8wy’][av_cell col_style=” av_uid=’av-1esai7g4i’] · Working with binary numbers
[/av_cell][av_cell col_style=” av_uid=’av-1emh4rplu’]· System Logging and Tracing [/av_cell][av_cell col_style=” av_uid=’av-1efhxmq76′][/av_cell][/av_row] [av_row row_style=” av_uid=’av-1eaia2xr6′][av_cell col_style=” av_uid=’av-1e95brv4y’] · Subnetting
[/av_cell][av_cell col_style=” av_uid=’av-1e20ya7du’]· Network Time Protocol [/av_cell][av_cell col_style=” av_uid=’av-502hmfaa’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-1dsapg602′][av_cell col_style=” av_uid=’av-1dqoal5cy’] · Routing data through a network using longest match routing
[/av_cell][av_cell col_style=” av_uid=’av-1dkd6wqci’]· Archiving Configurations [/av_cell][av_cell col_style=” av_uid=’av-1dhrayx42′][/av_cell][/av_row] [av_row row_style=” av_uid=’av-1dd3k3882′][av_cell col_style=” av_uid=’av-1d7qjh6zm’] · IPv6 Addressing
[/av_cell][av_cell col_style=” av_uid=’av-1d3275wbm’]· SNMP [/av_cell][av_cell col_style=” av_uid=’av-1cy5jdkde’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-1cu73f31e’][av_cell col_style=” av_uid=’av-1cq3djbqa’] WAN technologies
[/av_cell][av_cell col_style=” av_uid=’av-1cjdx2nmq’]· Lab 3: Secondary System Configuration [/av_cell][av_cell col_style=” av_uid=’av-1cf2t24wy’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-1cad83bvm’][av_cell col_style=” av_uid=’av-1c77koiqq’] · Point-to-Point Protocol (PPP)
[/av_cell][av_cell col_style=” av_uid=’av-1c0h9uqsi’]Chapter 6: Operational Monitoring and Maintenance [/av_cell][av_cell col_style=” av_uid=’av-4skfra8y’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-1bs7un7ky’][av_cell col_style=” av_uid=’av-1bp10d6w2′] · Frame Relay and Asynchronous Transfer Mode(ATM)
[/av_cell][av_cell col_style=” av_uid=’av-1bi4knlia’]· Monitoring Platform and Interface Operation [/av_cell][av_cell col_style=” av_uid=’av-1bdqom95u’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-1bbodlo6a’][av_cell col_style=” av_uid=’av-1b6yxzrky’] · Multiprotocol Label Switching (MPLS)
[/av_cell][av_cell col_style=” av_uid=’av-4phzukgy’]· Network Utilities [/av_cell][av_cell col_style=” av_uid=’av-1awbvxq02′][/av_cell][/av_row] [av_row row_style=” av_uid=’av-1arrt89eq’][av_cell col_style=” av_uid=’av-1an7gzv4y’] · Carrier Ethernet
[/av_cell][av_cell col_style=” av_uid=’av-1ahvyk9ya’]· Maintaining the Junos OS [/av_cell][av_cell col_style=” av_uid=’av-1ag035baa’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-1a9iul2ua’][av_cell col_style=” av_uid=’av-1a5a8h0gy’] Transport Layer protocols
[/av_cell][av_cell col_style=” av_uid=’av-19zqazsde’]· Password Recovery [/av_cell][av_cell col_style=” av_uid=’av-19utevdya’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-19pp1n23m’][av_cell col_style=” av_uid=’av-19kogqzs2′] · User Datagram Protocol (UDP)
[/av_cell][av_cell col_style=” av_uid=’av-19j6fnug2′]· Lab 4: Operational Monitoring and Maintenance [/av_cell][av_cell col_style=” av_uid=’av-19bpjh1r6′][/av_cell][/av_row] [av_row row_style=” av_uid=’av-19806djj6′][av_cell col_style=” av_uid=’av-192790ici’] · Transmission Control Protocol (TCP)
[/av_cell][av_cell col_style=” av_uid=’av-18yauvs0y’][/av_cell][av_cell col_style=” av_uid=’av-18wg7iw4i’][/av_cell][/av_row] [/av_table] [av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jwrr5hq2′ admin_preview_bg=”]

SPECIALISTSecurity, Specialist (JNCIS-SEC)

Designed for experienced networking professionals with intermediate knowledge of the Juniper Networks Junos OS for SRX Series devices, this written exam verifies the candidate’s understanding of security technologies and related platform configuration and troubleshooting skills.

Topics of JNCIS

[/av_textblock] [av_table purpose=’tabular’ pricing_table_design=’avia_pricing_default’ pricing_hidden_cells=” caption=” responsive_styling=’avia_scrollable_table’ av_uid=’av-18pk1xo0y’] [av_row row_style=” av_uid=’av-18lglkuea’][av_cell col_style=” av_uid=’av-4fz9bbqa’]JUTM(8H)
[/av_cell][av_cell col_style=” av_uid=’av-18b51b28y’]JSEC(24H) [/av_cell][/av_row] [av_row row_style=” av_uid=’av-186ypctcy’][av_cell col_style=” av_uid=’av-183l2z2n6′]Chapter 1: Course Introduction
[/av_cell][av_cell col_style=” av_uid=’av-17xfv8yzm’]Chapter 1: Course Introduction [/av_cell][/av_row] [av_row row_style=” av_uid=’av-17vpy623m’][av_cell col_style=” av_uid=’av-17oji97qa’]Chapter 2: UTM Overview
[/av_cell][av_cell col_style=” av_uid=’av-17jl262g2′]Chapter 2: Introduction to Junos Security [/av_cell][/av_row] [av_row row_style=” av_uid=’av-4cdjsm76′][av_cell col_style=” av_uid=’av-17br8eaoy’]· Branch Office Challenges
[/av_cell][av_cell col_style=” av_uid=’av-178q2xe3m’]· Traditional Routing [/av_cell][/av_row] [av_row row_style=” av_uid=’av-1734s16si’][av_cell col_style=” av_uid=’av-16y21qrtu’]· UTM Feature Overview
[/av_cell][av_cell col_style=” av_uid=’av-16rj5n6w2′]· Traditional Security [/av_cell][/av_row] [av_row row_style=” av_uid=’av-16p0ldi8y’][av_cell col_style=” av_uid=’av-49abb3du’]· Design Basics
[/av_cell][av_cell col_style=” av_uid=’av-16ewb2g9u’]· The Junos OS Architecture [/av_cell][/av_row] [av_row row_style=” av_uid=’av-16cwd6usi’][av_cell col_style=” av_uid=’av-480zzduq’]· Hardware Support
[/av_cell][av_cell col_style=” av_uid=’av-478qhl0i’]Chapter 3: Zones [/av_cell][/av_row] [av_row row_style=” av_uid=’av-46rjw7he’][av_cell col_style=” av_uid=’av-15u0j56le’]· Licensing of Features
[/av_cell][av_cell col_style=” av_uid=’av-15plqyfky’]· The Definition of Zones [/av_cell][/av_row] [av_row row_style=” av_uid=’av-45hraxeq’][av_cell col_style=” av_uid=’av-15eulubky’]· Lab 1: Connecting to the Lab Equipment and Testing Connectivity
[/av_cell][av_cell col_style=” av_uid=’av-159937heq’]· Zone Configuration [/av_cell][/av_row] [av_row row_style=” av_uid=’av-154d2n21u’][av_cell col_style=” av_uid=’av-1504djtnm’]Chapter 3: Antispam
[/av_cell][av_cell col_style=” av_uid=’av-14v20ydlu’]· Monitoring Security Zones [/av_cell][/av_row] [av_row row_style=” av_uid=’av-42w79s9u’][av_cell col_style=” av_uid=’av-14m3nbqjm’]· Antispam Terminology
[/av_cell][av_cell col_style=” av_uid=’av-14jm1l6zm’]· Lab 1: Configuring and Monitoring Zones [/av_cell][/av_row] [av_row row_style=” av_uid=’av-14g4dxoo2′][av_cell col_style=” av_uid=’av-14aejwplu’]· Overview of Antispam Process
[/av_cell][av_cell col_style=” av_uid=’av-143msosf6′]Chapter 4: Security Policies [/av_cell][/av_row] [av_row row_style=” av_uid=’av-140jh83ky’][av_cell col_style=” av_uid=’av-13xlj9aci’]· UTM Policy Overview
[/av_cell][av_cell col_style=” av_uid=’av-13prow2zm’]· Security Policy Overview [/av_cell][/av_row] [av_row row_style=” av_uid=’av-13kwvsasi’][av_cell col_style=” av_uid=’av-13gt6hz36′]· Configuration Steps
[/av_cell][av_cell col_style=” av_uid=’av-13e08c2jm’]· Junos ALGs [/av_cell][/av_row] [av_row row_style=” av_uid=’av-136tyyztu’][av_cell col_style=” av_uid=’av-133biqogy’]· Monitoring Antispam
[/av_cell][av_cell col_style=” av_uid=’av-1300gn4iq’]· Policy Components [/av_cell][/av_row] [av_row row_style=” av_uid=’av-12w0hwrj6′][av_cell col_style=” av_uid=’av-12qmo4hnm’]· Lab 2: Configuring an Antispam Policy
[/av_cell][av_cell col_style=” av_uid=’av-12mt4ebdu’]· Verifying Policy Operation [/av_cell][/av_row] [av_row row_style=” av_uid=’av-12gcjnf4y’][av_cell col_style=” av_uid=’av-12c36qujm’]Chapter 4: Full File-Based and Express Antivirus
[/av_cell][av_cell col_style=” av_uid=’av-3tk8u9k2′]· Policy Scheduling and Rematching [/av_cell][/av_row] [av_row row_style=” av_uid=’av-122b96lgi’][av_cell col_style=” av_uid=’av-11yl0j46a’]· Antivirus Terminology
[/av_cell][av_cell col_style=” av_uid=’av-11tu6bd5u’]· Policy Case Study [/av_cell][/av_row] [av_row row_style=” av_uid=’av-11pf3et9e’][av_cell col_style=” av_uid=’av-11lzr3zmq’]· Overview of Antivirus Process
[/av_cell][av_cell col_style=” av_uid=’av-3qpua7s2′]· Lab 2: Security Policies [/av_cell][/av_row] [av_row row_style=” av_uid=’av-11df8elia’][av_cell col_style=” av_uid=’av-117caubc2′]· AV Operation
[/av_cell][av_cell col_style=” av_uid=’av-dd2gcgy’]Chapter 5: Firewall User Authentication [/av_cell][/av_row] [av_row row_style=” av_uid=’av-3p4az676′][av_cell col_style=” av_uid=’av-10t4b8xnm’]· Full File-based AV Configuration
[/av_cell][av_cell col_style=” av_uid=’av-10q3ia4rm’]· Firewall User Authentication Overview [/av_cell][/av_row] [av_row row_style=” av_uid=’av-10iqjsi1u’][av_cell col_style=” av_uid=’av-10h2hzkiq’]· Express AV Configuration
[/av_cell][av_cell col_style=” av_uid=’av-10bwn6882′]· Pass-Through Authentication [/av_cell][/av_row] [av_row row_style=” av_uid=’av-104mnumea’][av_cell col_style=” av_uid=’av-103bozkde’]· Monitoring AV
[/av_cell][av_cell col_style=” av_uid=’av-zy4ug7s2′]· Web Authentication [/av_cell][/av_row] [av_row row_style=” av_uid=’av-zr5ez5wi’][av_cell col_style=” av_uid=’av-zp4yn4o2′]· Lab 3: Antivirus Configuration and Testing
[/av_cell][av_cell col_style=” av_uid=’av-zih4ixuq’]· Client Groups [/av_cell][/av_row] [av_row row_style=” av_uid=’av-zg0ogqn6′][av_cell col_style=” av_uid=’av-zb2nuv36′]Chapter 5: Content and Web Filtering
[/av_cell][av_cell col_style=” av_uid=’av-z404gbhe’]· Using External Authentication Servers [/av_cell][/av_row] [av_row row_style=” av_uid=’av-z0wn1ale’][av_cell col_style=” av_uid=’av-yutvfcgy’]· Overview and Terminology
[/av_cell][av_cell col_style=” av_uid=’av-ytrf6izm’]· Verifying Firewall User Authentication [/av_cell][/av_row] [av_row row_style=” av_uid=’av-yos7pfvm’][av_cell col_style=” av_uid=’av-yjkf8dsy’]· Configuration
[/av_cell][av_cell col_style=” av_uid=’av-ycg7p23m’]· Lab 3: Configuring Firewall Authentication [/av_cell][/av_row] [av_row row_style=” av_uid=’av-y9xy56ci’][av_cell col_style=” av_uid=’av-y5c7wd9e’]· Verification and Monitoring
[/av_cell][av_cell col_style=” av_uid=’av-xypbpvxe’]Chapter 6: Screen Options [/av_cell][/av_row] [av_row row_style=” av_uid=’av-xxi40882′][av_cell col_style=” av_uid=’av-xphek4te’]· Lab 4: Configuring Content and Web Filtering
[/av_cell][av_cell col_style=” av_uid=’av-xo4i1d0i’]· Multilayer Network Protection [/av_cell][/av_row] [av_row row_style=” av_uid=’av-xi9pecgy’][av_cell col_style=” av_uid=’av-xdbo71b6′][/av_cell][av_cell col_style=” av_uid=’av-3bkh83c2′]· Stages and Types of Attacks [/av_cell][/av_row] [av_row row_style=” av_uid=’av-x5caz1wi’][av_cell col_style=” av_uid=’av-x0x99d7m’][/av_cell][av_cell col_style=” av_uid=’av-3a9pi8ki’]· Using Junos Screen Options—Reconnaissance Attack Handling [/av_cell][/av_row] [av_row row_style=” av_uid=’av-wqqvc9eq’][av_cell col_style=” av_uid=’av-39cwa8de’][/av_cell][av_cell col_style=” av_uid=’av-38tvlqoy’]· Using Junos Screen Options—Denial of Service Attack Handling [/av_cell][/av_row] [av_row row_style=” av_uid=’av-wbqgaqua’][av_cell col_style=” av_uid=’av-37up8qzm’][/av_cell][av_cell col_style=” av_uid=’av-w2qcr0v6′]· Using Junos Screen Options—Suspicious Packets Attack Handling [/av_cell][/av_row] [av_row row_style=” av_uid=’av-vy9y7ski’][av_cell col_style=” av_uid=’av-vw3iy9ya’][/av_cell][av_cell col_style=” av_uid=’av-vpcquxgi’]· Applying and Monitoring Screen Options [/av_cell][/av_row] [av_row row_style=” av_uid=’av-vjsy5676′][av_cell col_style=” av_uid=’av-35gekwf6′][/av_cell][av_cell col_style=” av_uid=’av-vaddx5lu’]· Lab 4: Implementing Screen Options [/av_cell][/av_row] [av_row row_style=” av_uid=’av-v97w4kte’][av_cell col_style=” av_uid=’av-v1ayfbc2′][/av_cell][av_cell col_style=” av_uid=’av-uyx9si5e’]Chapter 7: Network Address Translation [/av_cell][/av_row] [av_row row_style=” av_uid=’av-uvcbnqg2′][av_cell col_style=” av_uid=’av-uq3x5mzm’][/av_cell][av_cell col_style=” av_uid=’av-uki7z15u’]· NAT Overview [/av_cell][/av_row] [av_row row_style=” av_uid=’av-ugm0zi3m’][av_cell col_style=” av_uid=’av-u9m8ewwy’][/av_cell][av_cell col_style=” av_uid=’av-u6vketuq’]· Source NAT Operation and Configuration [/av_cell][/av_row] [av_row row_style=” av_uid=’av-u2x1h6hu’][av_cell col_style=” av_uid=’av-tx2esi02′][/av_cell][av_cell col_style=” av_uid=’av-tt14fgma’]· Destination NAT Operation and Configuration [/av_cell][/av_row] [av_row row_style=” av_uid=’av-tpwecxcy’][av_cell col_style=” av_uid=’av-tjig9yaq’][/av_cell][av_cell col_style=” av_uid=’av-tgus1bqa’]· Static NAT Operation and Configuration [/av_cell][/av_row] [av_row row_style=” av_uid=’av-2xg28cbm’][av_cell col_style=” av_uid=’av-t7neivky’][/av_cell][av_cell col_style=” av_uid=’av-t2esa59e’]· Proxy ARP [/av_cell][/av_row] [av_row row_style=” av_uid=’av-svq95r1e’][av_cell col_style=” av_uid=’av-sso55pcy’][/av_cell][av_cell col_style=” av_uid=’av-sp5t3f8i’]· Monitoring and Verifying NAT Operation [/av_cell][/av_row] [av_row row_style=” av_uid=’av-sj9rswbm’][av_cell col_style=” av_uid=’av-sdowdyqq’][/av_cell][av_cell col_style=” av_uid=’av-s8b3sk2q’]· Monitoring and Verifying NAT Operation [/av_cell][/av_row] [av_row row_style=” av_uid=’av-s5fq3xlu’][av_cell col_style=” av_uid=’av-s0tnygf6′][/av_cell][av_cell col_style=” av_uid=’av-rvuycdgi’]Chapter 8: IPsec VPNs [/av_cell][/av_row] [av_row row_style=” av_uid=’av-rshpnlnm’][av_cell col_style=” av_uid=’av-rnosf8f6′][/av_cell][av_cell col_style=” av_uid=’av-rhazp5sy’]· VPN Types [/av_cell][/av_row] [av_row row_style=” av_uid=’av-rc67kztu’][av_cell col_style=” av_uid=’av-r8e2gnz6′][/av_cell][av_cell col_style=” av_uid=’av-r4l5cyoy’]· Secure VPN Requirements [/av_cell][/av_row] [av_row row_style=” av_uid=’av-qyc4p5wi’][av_cell col_style=” av_uid=’av-qv15krz6′][/av_cell][av_cell col_style=” av_uid=’av-qqp3mjs2′]· IPsec Details [/av_cell][/av_row] [av_row row_style=” av_uid=’av-qn58se02′][av_cell col_style=” av_uid=’av-qfl7h8de’][/av_cell][av_cell col_style=” av_uid=’av-qe3fx0pu’]· Configuration of IPsec VPNs [/av_cell][/av_row] [av_row row_style=” av_uid=’av-q9f3lq1u’][av_cell col_style=” av_uid=’av-q1u8iw6a’][/av_cell][av_cell col_style=” av_uid=’av-q0wt9ule’]· IPsec VPN Monitoring [/av_cell][/av_row] [av_row row_style=” av_uid=’av-pv71mlya’][av_cell col_style=” av_uid=’av-ppq24jj6′][/av_cell][av_cell col_style=” av_uid=’av-pl0a0j8i’]· Lab 6: Implementing IPsec VPNs [/av_cell][/av_row] [av_row row_style=” av_uid=’av-piqj2w0y’][av_cell col_style=” av_uid=’av-pce94p2a’][/av_cell][av_cell col_style=” av_uid=’av-2iue9hcy’]Chapter 9: Introduction to Intrusion Detection and Prevention [/av_cell][/av_row] [av_row row_style=” av_uid=’av-p1za7maq’][av_cell col_style=” av_uid=’av-ozt98i76′][/av_cell][av_cell col_style=” av_uid=’av-ov9tqy76′]· Introduction to Junos IDP [/av_cell][/av_row] [av_row row_style=” av_uid=’av-oonldt2a’][av_cell col_style=” av_uid=’av-ois05zhe’][/av_cell][av_cell col_style=” av_uid=’av-ohl7c5wi’]· IDP Policy Components and Configuration [/av_cell][/av_row] [av_row row_style=” av_uid=’av-odcdhgo2′][av_cell col_style=” av_uid=’av-o5jcahya’][/av_cell][av_cell col_style=” av_uid=’av-o425kggy’]· Signature Database [/av_cell][/av_row] [av_row row_style=” av_uid=’av-nz01wihu’][av_cell col_style=” av_uid=’av-nu8dx38i’][/av_cell][av_cell col_style=” av_uid=’av-npvpce1u’]· Case Study: Applying the Recommended IDP Policy [/av_cell][/av_row] [av_row row_style=” av_uid=’av-nkjebztu’][av_cell col_style=” av_uid=’av-nfb85yua’][/av_cell][av_cell col_style=” av_uid=’av-n8ohcdya’]· Monitoring IDP Operation [/av_cell][/av_row] [av_row row_style=” av_uid=’av-n4ov44o2′][av_cell col_style=” av_uid=’av-n08rw4v6′][/av_cell][av_cell col_style=” av_uid=’av-2acvbjqa’]· Lab 7: Implementing IDP [/av_cell][/av_row] [av_row row_style=” av_uid=’av-2a5w2mg2′][av_cell col_style=” av_uid=’av-29kkmvoi’][/av_cell][av_cell col_style=” av_uid=’av-mjzc8pnm’]Chapter 10: High Availability Clustering Theory [/av_cell][/av_row] [av_row row_style=” av_uid=’av-mctam9sy’][av_cell col_style=” av_uid=’av-mbcem17m’][/av_cell][av_cell col_style=” av_uid=’av-m4oonvmq’]· High Availability Overview [/av_cell][/av_row] [av_row row_style=” av_uid=’av-lzeud2jm’][av_cell col_style=” av_uid=’av-ly10i0v6′][/av_cell][av_cell col_style=” av_uid=’av-lpiryg82′]· Chassis Cluster Components [/av_cell][/av_row] [av_row row_style=” av_uid=’av-lnd6gluq’][av_cell col_style=” av_uid=’av-lgfacv8i’][/av_cell][av_cell col_style=” av_uid=’av-lf7442g2′]· Advanced Chassis Cluster Topics [/av_cell][/av_row] [av_row row_style=” av_uid=’av-l946js9u’][av_cell col_style=” av_uid=’av-l3xnbo6a’][/av_cell][av_cell col_style=” av_uid=’av-l0fsiyle’]Chapter 11: High Availability Clustering Implementation [/av_cell][/av_row] [av_row row_style=” av_uid=’av-kwha6qua’][av_cell col_style=” av_uid=’av-krdw2zoi’][/av_cell][av_cell col_style=” av_uid=’av-kkjxof1e’]· Chassis Cluster Operation [/av_cell][/av_row] [av_row row_style=” av_uid=’av-21rxqbhe’][av_cell col_style=” av_uid=’av-kcyb7nc2′][/av_cell][av_cell col_style=” av_uid=’av-k6x1s59e’]· Chassis Cluster Configuration [/av_cell][/av_row] [av_row row_style=” av_uid=’av-20cl3e5e’][av_cell col_style=” av_uid=’av-1zv7ctcy’][/av_cell][av_cell col_style=” av_uid=’av-ju8ofizm’]· Chassis Cluster Monitoring [/av_cell][/av_row] [av_row row_style=” av_uid=’av-jrhvnz36′][av_cell col_style=” av_uid=’av-jl4cgu5e’][/av_cell][av_cell col_style=” av_uid=’av-jg4w28yq’]· Lab 8: Implementing High Availability Techniques [/av_cell][/av_row] [/av_table] [av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jwrrvyqw’ admin_preview_bg=”]

PROFESSIONALSecurity, Professional (JNCIP-SEC)

Designed for experienced networking professionals with advanced knowledge of the Juniper Networks Junos OS for SRX Series devices, this written exam verifies the candidate’s understanding of advanced security technologies and related platform configuration and troubleshooting skills.

Topics of JNCIP

[/av_textblock] [av_table purpose=’tabular’ pricing_table_design=’avia_pricing_default’ pricing_hidden_cells=” caption=” responsive_styling=’avia_scrollable_table’ av_uid=’av-jbv5gpgi’] [av_row row_style=” av_uid=’av-j64kn86a’][av_cell col_style=” av_uid=’av-j4ru2sf6′]JNCIP-SEC [/av_cell][av_cell col_style=” av_uid=’av-iz3l7ffm’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-iugv8m1u’][av_cell col_style=” av_uid=’av-ipwldy76′]AJSEC(24H) [/av_cell][av_cell col_style=” av_uid=’av-il80ql2a’]JIPS(16H)
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-iey83eua’][av_cell col_style=” av_uid=’av-1tz91ggy’]Chapter 1: Course Introduction [/av_cell][av_cell col_style=” av_uid=’av-i85t25gi’]Chapter 1: Course Introduction
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-i2kpwl0i’][av_cell col_style=” av_uid=’av-hwwe2202′]Chapter 2: AppSecure [/av_cell][av_cell col_style=” av_uid=’av-htf9gf1e’]Chapter 2: Introduction to Intrusion Prevention Systems
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-hq04w89u’][av_cell col_style=” av_uid=’av-hkwh9jfm’]· AppSecure Overview [/av_cell][av_cell col_style=” av_uid=’av-hec5yogy’]· Network Asset Protection
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-1q5yu7vm’][av_cell col_style=” av_uid=’av-h7wy1btu’]· AppID [/av_cell][av_cell col_style=” av_uid=’av-h2ts9n4y’]· Intrusion Attack Methods
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-gw228l5u’][av_cell col_style=” av_uid=’av-gsbcbjc2′]· AppTrack [/av_cell][av_cell col_style=” av_uid=’av-goo4mdr6′]· Intrusion Prevention Systems
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-gk52tso2′][av_cell col_style=” av_uid=’av-gftmb68y’]· AppFW [/av_cell][av_cell col_style=” av_uid=’av-g98wpwrm’]· IPS Traffic Inspection Walkthrough
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-g5mup3j6′][av_cell col_style=” av_uid=’av-g26rlroi’]· AppDoS [/av_cell][av_cell col_style=” av_uid=’av-fxa50axu’]Chapter 3: IPS Policy and Initial Configuration
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-fqpmk8pu’][av_cell col_style=” av_uid=’av-1k4yc7vm’]· AppQoS [/av_cell][av_cell col_style=” av_uid=’av-fgvxw1ia’]· SRX IPS Requirements
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-ff6dwnxe’][av_cell col_style=” av_uid=’av-f827k7fm’]· Lab 1: Implementing AppSecure [/av_cell][av_cell col_style=” av_uid=’av-f6g284gy’]· IPS Operation Modes
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-ey4mdpgi’][av_cell col_style=” av_uid=’av-ewpioa76′]Chapter 3: Junos Layer 2 Packet Handling and Security Features [/av_cell][av_cell col_style=” av_uid=’av-ernikxuq’]· Basic IPS Policy Review
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-enz8s1k2′][av_cell col_style=” av_uid=’av-eidn61cy’]· Transparent Mode Security [/av_cell][av_cell col_style=” av_uid=’av-ef3mksiq’]· Basic IPS Policy Lab
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-ea6fql7m’][av_cell col_style=” av_uid=’av-e4x6vdwi’]· Layer 2 Ethernet Switching [/av_cell][av_cell col_style=” av_uid=’av-1eg9zl5u’]Chapter 4: IPS Rulebase Operations
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-dv0zpaqq’][av_cell col_style=” av_uid=’av-drsyk2hu’]· Lab 2: Implementing Layer 2 Security [/av_cell][av_cell col_style=” av_uid=’av-dn8wg1ia’]· Rulebase Operations
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-1cmmy55u’][av_cell col_style=” av_uid=’av-day0x4v6′]Chapter 4: Virtualization [/av_cell][av_cell col_style=” av_uid=’av-d5ws7qci’]· IPS Rules
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-d52kgs4i’][av_cell col_style=” av_uid=’av-cxnuv7aa’]· Virtualization Overview [/av_cell][av_cell col_style=” av_uid=’av-cux98un6′]· Terminal Rules
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-co1ym602′][av_cell col_style=” av_uid=’av-cjituew2′]· Routing Instances [/av_cell][av_cell col_style=” av_uid=’av-ch3k1zmq’]· IP Actions
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-ca6ov4iq’][av_cell col_style=” av_uid=’av-17qyvtia’]· Logical Systems [/av_cell][av_cell col_style=” av_uid=’av-c1fc9pk2′]· Configuring IPS Rulebases Lab
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-bxij9542′][av_cell col_style=” av_uid=’av-16ndk3aa’]· Lab 3: Implementing Junos Virtual Routing [/av_cell][av_cell col_style=” av_uid=’av-bmmbye02′]Chapter 5: Custom Attack Objects
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-bkvze7du’][av_cell col_style=” av_uid=’av-bfonla8y’]Chapter 5: Advanced NAT Concepts [/av_cell][av_cell col_style=” av_uid=’av-b9xed15u’]· Predefined Attack Objects
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-b6wd25sy’][av_cell col_style=” av_uid=’av-b0rqrnxe’]· Operational Review [/av_cell][av_cell col_style=” av_uid=’av-avtsjisi’]· Custom Attack Objects
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-aswe80iq’][av_cell col_style=” av_uid=’av-ap0a7nhe’]· NAT: Beyond Layer 3 and Layer 4 Headers [/av_cell][av_cell col_style=” av_uid=’av-ajue7fz6′]· Fine-Tuning the IPS Policy
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-aeed8in6′][av_cell col_style=” av_uid=’av-a9ogyh42′]· DNS Doctoring [/av_cell][av_cell col_style=” av_uid=’av-a3y52hwi’]· Custom Signatures Lab
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-9zw9vaci’][av_cell col_style=” av_uid=’av-9xswqyn6′]· IPv6 NAT [/av_cell][av_cell col_style=” av_uid=’av-9rzmvtr6′]Chapter 6: Additional Attack Protection Mechanisms
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-9olxix0i’][av_cell col_style=” av_uid=’av-9j4ijkv6′]· Advanced NAT Scenarios [/av_cell][av_cell col_style=” av_uid=’av-9f0kbr36′]· Scan Prevention
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-9aj91oiq’][av_cell col_style=” av_uid=’av-96rgfgde’]· Lab 4: Advanced NAT Implementations [/av_cell][av_cell col_style=” av_uid=’av-90sphu8y’]· Blocking Evasion and DoS Attacks
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-8thjwggy’][av_cell col_style=” av_uid=’av-8r7o7cf6′]Chapter 6: IPsec Implementations [/av_cell][av_cell col_style=” av_uid=’av-8nv9a8v6′]· Security Flow Protection Mechanisms
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-8i2uz31e’][av_cell col_style=” av_uid=’av-8cic295u’]· Standard VPN Implementations Review [/av_cell][av_cell col_style=” av_uid=’av-888aqwrm’]· Security Flow Protection Mechanisms Lab
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-t0u5x7m’][av_cell col_style=” av_uid=’av-7xye0h42′]· Public Key Infrastructure [/av_cell][av_cell col_style=” av_uid=’av-7wepdzaa’]Chapter 7: IPS Logging and Reporting
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-7q9qldpe’][av_cell col_style=” av_uid=’av-7kg9l1k2′]· Hub-and-Spoke VPNs [/av_cell][av_cell col_style=” av_uid=’av-qpy5d9e’]· Junos Syslog and Operational Commands
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-7bs3auqq’][av_cell col_style=” av_uid=’av-78cehxeq’]· Lab 5: Hub-and-Spoke IPsec VPNs [/av_cell][av_cell col_style=” av_uid=’av-pibjvfm’]· STRM IPS Logging
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-6xy85noi’][av_cell col_style=” av_uid=’av-6uarj00y’]Chapter 7: Enterprise IPsec Technologies: Group and Dynamic VPNs [/av_cell][av_cell col_style=” av_uid=’av-6oes0rxe’]· IPS Logging Lab
[/av_cell][/av_row] [av_row row_style=” av_uid=’av-6lvop7xe’][av_cell col_style=” av_uid=’av-6hcaej4y’]· Group VPN Overview [/av_cell][av_cell col_style=” av_uid=’av-6d5d0ogy’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-65nccen6′][av_cell col_style=” av_uid=’av-63aomgyq’]· GDOI Protocol [/av_cell][av_cell col_style=” av_uid=’av-5zvivezm’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-5ti80ciq’][av_cell col_style=” av_uid=’av-5q0atwiq’]· Group VPN Configuration and Monitoring [/av_cell][av_cell col_style=” av_uid=’av-5lezgxk2′][/av_cell][/av_row] [av_row row_style=” av_uid=’av-5h4p8336′][av_cell col_style=” av_uid=’av-5b2z4g2q’]· Dynamic VPN Overview [/av_cell][av_cell col_style=” av_uid=’av-55rtse76′][/av_cell][/av_row] [av_row row_style=” av_uid=’av-4zvtoqhu’][av_cell col_style=” av_uid=’av-4x7h1c4i’]· Dynamic VPN Implementation [/av_cell][av_cell col_style=” av_uid=’av-4tly2e8y’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-4nm6tc82′][av_cell col_style=” av_uid=’av-4jygnqw2′]· Lab 6: Configuring Group VPNs [/av_cell][av_cell col_style=” av_uid=’av-4fncn86a’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-49loxbky’][av_cell col_style=” av_uid=’av-474abzaa’]Chapter 8: IPsec VPN Case Studies and Solutions [/av_cell][av_cell col_style=” av_uid=’av-3zj7iijm’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-3x7r980y’][av_cell col_style=” av_uid=’av-3qpwny76′]· Routing over VPNs [/av_cell][av_cell col_style=” av_uid=’av-3lvxbu8y’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-3ireei8y’][av_cell col_style=” av_uid=’av-3fmrb50i’]· IPsec with Overlapping Addresses [/av_cell][av_cell col_style=” av_uid=’av-3aw48l9e’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-331nuciq’][av_cell col_style=” av_uid=’av-2z1w96si’]· Dynamic Gateway IP Addresses [/av_cell][av_cell col_style=” av_uid=’av-2uzauwma’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-2qrg4s2q’][av_cell col_style=” av_uid=’av-2m415raa’]· Enterprise VPN Deployment Tips and Tricks [/av_cell][av_cell col_style=” av_uid=’av-2ga13js2′][/av_cell][/av_row] [av_row row_style=” av_uid=’av-uo17ky’][av_cell col_style=” av_uid=’av-27fmydia’]· Lab 7: Implementing Advanced IPsec VPN Solutions [/av_cell][av_cell col_style=” av_uid=’av-254i0bhe’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-1yixgijm’][av_cell col_style=” av_uid=’av-1vydqtb6′]Chapter 9: Troubleshooting Junos Security [/av_cell][av_cell col_style=” av_uid=’av-1op700iq’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-5xuzrhe’][av_cell col_style=” av_uid=’av-1g9suzxe’]· Troubleshooting Methodology [/av_cell][av_cell col_style=” av_uid=’av-1d2ttiea’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-19k88ale’][av_cell col_style=” av_uid=’av-12tz6tgi’]· Troubleshooting Tools [/av_cell][av_cell col_style=” av_uid=’av-10pqiioy’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-svoeogy’][av_cell col_style=” av_uid=’av-q6m5n36′]· Identifying IPsec Issues [/av_cell][av_cell col_style=” av_uid=’av-mb4rr1e’][/av_cell][/av_row] [av_row row_style=” av_uid=’av-eck4ko2′][av_cell col_style=” av_uid=’av-bcqvs2q’]· Lab 8: Performing Security Troubleshooting Techniques [/av_cell][av_cell col_style=” av_uid=’av-6s3xkwy’][/av_cell][/av_row] [/av_table] [av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av_uid=’av-jwrsqhun’ admin_preview_bg=”]

Students who intend to pass the above courses(Juniper courses) must have full knowledge of the concepts of the two reference model, OSI and TCP / IP.

[/av_textblock]