Implementing Juniper Networks Secure Analytics (IJSA)

 

Prerequisites

This course assumes that students have basic networking knowledge and experience in the following areas:

  • Understanding of TCP/IP operation;
  • Understanding of network security concepts; and
  • Experience in network security administration.

Course Objectives

After successfully completing this course, you should be able to:

  • Describe the JSA system and its basic functionality.
  • Describe the hardware used with the JSA system.
  • Identify the technology behind the JSA system.
  • Identify the JSA system’s primary design divisions—display versus detection, and events versus traffic.
  • Plan and prepare for a new installation.
  • Access the administration console.
  • Configure the network hierarchy.
  • Configure the automatic update process.
  • Access the Deployment Editor.
  • Describe the JSA system’s internal processes.
  • Describe event and flow source configuration.
  • List key features of the JSA architecture.
  • Describe the JSA system’s processing logic.
  • Interpret the correlation of flow data and event data.
  • List the architectural component that provides each key function.
  • Describe Events and explain where they come from.
  • Access the Log Activity interface.
  • Execute Event searches.
  • Describe flows and their origin.
  • Configure the Network Activity interface.
  • Execute Flow searches.
  • Specify the JSA system’s Asset Management and Vulnerability Assessment functionality.
  • Access the Assets interface.
  • View Asset Profile data.
  • View Server Discovery.
  • Access the Vulnerability Assessment Scan Manager to produce vulnerability assessments (VAs).
  • Access vulnerability scanner configuration.
  • View vulnerability profiles.
  • Describe rules.
  • Configure rules.
  • Configure Building Blocks (BBs).
  • Explain how rules and flows work together.
  • Access the Offense Manager interface.
  • Understand Offense types.
  • Configure Offense actions.
  • Navigate the Offense interface.
  • Explain the Offense summary screen.
  • Search Offenses.
  • Use the JSA system’s Reporting functionality to produce graphs and reports.
  • Navigate the Reporting interface.
  • Configure Report Groups.
  • Demonstrate Report Branding.
  • View Report formats.
  • Identify the basic information on maintaining and troubleshooting the JSA system.
  • Navigate the JSA dashboard.
  • List flow and event troubleshooting steps.
  • Access the Event Mapping Tool.
  • Configure Event Collection for Junos devices.
  • Configure Flow Collection for Junos devices.
  • Explain high availability (HA) functionality on a JSA device.

Course Content

This course replaces the CSTRM (Configuring Security Threat Response Manager)

This three-day course discusses the configuration of Juniper Networks JSA Series Secure Analytics (formerly known as Security Threat Response Manager [STRM]) in a typical network environment. Key topics include deploying a JSA Series device in the network, configuring flows, running reports, and troubleshooting.

Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting the JSA Series device. This course uses the Juniper Networks Secure Analytics (JSA) VM virtual appliance for the hands-on component. This course is based on JSA software 2014.2R4.

מחירים & Delivery methods

הדרכה מקוונת

אורך
3 ימים

מחיר
  • על פי בקשה
שיעורים בכיתה

אורך
3 ימים

מחיר
  • ישראל: 7,810 ₪

לוח זמנים

אנגלית

1 hour difference

הדרכה מקוונת Time zone: שעון קיץ מרכז אירופה שפת קורס: אנגלית
הדרכה מקוונת זהו קורס FLEX. Time zone: שעון קיץ מרכז אירופה
הדרכה מקוונת זהו קורס FLEX. Time zone: שעון מרכז אירופה
הדרכה מקוונת בהנחיית מדריכים:   המדריך מעביר קורסים מקוונים If you have any questions about our online courses, feel free to contact us via phone or Email anytime.
זהו קורס FLEX, המועבר באופן וירטואלי ובכיתה.

אירופה

גרמניה

פרנקפורט שפת קורס: אנגלית
Stuttgart שפת קורס: אנגלית
זהו קורס FLEX, המועבר באופן וירטואלי ובכיתה.