Juniper Networks Design—Security (JND-SEC)

Niveau
Tijdsduur

Juniper Networks Design—Security (JND-SEC)

Westcon
Logo van Westcon

Tip: meer info over het programma, prijs, en inschrijven? Download de brochure!

Startdata en plaatsen

Er zijn nog geen startdata bekend voor dit product.

Beschrijving

Course Outline

This course is targeted specifically for those who have a solid understanding of operation and configuration and are looking to enhance their skill sets by learning the principles of security design.

Prerequisites & Audience

The following are the prerequisites for this course:

  • Knowledge of network security concepts, including:

  • Traditional and next-generation firewalls.

  • IPsec VPNs.

  • Network Address Translation (NAT).

  • Security intelligence.

  • Knowledge of Juniper Networks products and solutions.

  • Network automation and virtualization concepts.

  • Basic knowledge of hypervisors and high availability concepts.

  • Completion of the Juniper Networks Design Fundamentals (JNDF…

Lees de volledige beschrijving

Veelgestelde vragen

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Nog niet gevonden wat je zocht? Bekijk deze onderwerpen: Junos / Juniper, Veeam, VPN, MPLS en Big Ip.

Course Outline

This course is targeted specifically for those who have a solid understanding of operation and configuration and are looking to enhance their skill sets by learning the principles of security design.

Prerequisites & Audience

The following are the prerequisites for this course:

  • Knowledge of network security concepts, including:

  • Traditional and next-generation firewalls.

  • IPsec VPNs.

  • Network Address Translation (NAT).

  • Security intelligence.

  • Knowledge of Juniper Networks products and solutions.

  • Network automation and virtualization concepts.

  • Basic knowledge of hypervisors and high availability concepts.

  • Completion of the Juniper Networks Design Fundamentals (JNDF) course.

Course Objectives

After successfully completing this course, you should be able to:

  • Describe high level security concepts about the different design architectures.

  • Explain the value of implementing security solutions in any network design.

  • Identify key factors in Juniper Networks security focus.

  • List and describe the security platforms and solutions offered by Juniper Networks.

  • Describe the steps required to identify customer security requirements.

  • Explain what is required to define the scope of the security design.

  • Identify the data required to perform a data analysis of the customer’s existing network and use that information in the design.

  • Describe traditional security practices used to secure a network.

  • Explain the added capabilities that next-generation firewalls provide.

  • Describe recent security trends and explain how these trends effect network design.

  • Describe intelligent networks.

  • Explain how security intelligence improves security in network design.

  • Describe security in the campus and the branch.

  • Discuss best practices for security in the campus and branch.

  • Describe security in the enterprise WAN.

  • Discuss security best practices for the enterprise WAN.

  • Describe security in the service provider WAN.

  • Discuss security best practices for the service provider WAN.

  • Identify security challenges in data centers.

  • Describe security design principles and elements.

  • Describe how to simplify data center security.

  • Identify security management challenges.

  • Describe how to secure individual network devices.

  • Describe the benefits of centralized security management.

  • Describe Juniper automation solutions.

  • Discuss the benefits of security automation.

  • Describe how security works in a virtualized environment.

  • Understand the benefits of service chaining.

  • Understand how VMware NSX works in a virtualized environment.

  • Describe the benefits of high availability with security devices.

  • Discuss how to handle asymmetrical traffic with security devices.

  • Describe how to design an SRX chassis cluster deployment.

Blijf op de hoogte van nieuwe ervaringen

Er zijn nog geen ervaringen.

Deel je ervaring

Heb je ervaring met deze cursus? Deel je ervaring en help anderen kiezen. Als dank voor de moeite doneert Springest € 1,- aan Stichting Edukans.

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Download gratis en vrijblijvend de informatiebrochure

(optioneel)
(optioneel)
(optioneel)
(optioneel)
(optioneel)

Heb je nog vragen?

(optioneel)

Aanmelden voor nieuwsbrief

We slaan je gegevens op om je via e-mail en evt. telefoon verder te helpen.
Meer info vind je in ons privacybeleid.