Juniper Networks Certified Internet Specialist Training Curriculum
Junos Security (JSEC)
Chapter 1: Course Introduction Chapter 2: Introduction to Junos Security Chapter 3: Zones Chapter 4: Security Policies Chapter 5: Firewall User Authentication Chapter 6: Screen Options Chapter 7: Network Address Translation Chapter 8: IPsec VPNs Chapter 9: Introduction to Intrusion Detection and Prevention Chapter 10: High Availability Clustering Theory Chapter 11: High Availability Clustering Implementation Appendix A: SRX Series Hardware and Interfaces
Junos Unified Threat Management (JUTM)
Chapter 1: Course Introduction Chapter 2: UTM Overview Chapter 3: Antispam Chapter 4: Full File-Based and Express Antivirus Chapter 5: Content and Web Filtering
Highlights
Contact Us