Wir beraten Sie gerne!
+49 40 253346-10     Kontakt
> > > IJSA Detaillierte Beschreibung

Implementing Juniper Networks Secure Analytics (IJSA)

Detaillierter Kursinhalt

Day 1
Chapter 1: Course Introduction
Chapter 2: Product Overview
  • Overview of the JSA Series Device
  • Hardware
  • Collection
  • Operational Flow
Chapter 3: Initial Configuration
  • A New Installation
  • Administration Console
  • Platform Configuration
  • Deployment Editor
  • Lab 1: Initial Configuration
Chapter 4: Architecture
  • Processing Log Activity
  • Processing Network Activity
  • JSA Deployment Options
Chapter 5: Log Activity
  • Log Activity Overview
  • Configuring Log Activity
  • Lab 2: Log Activity
Day 2
Chapter 6: Network Activity
  • Network Activity Overview
  • Configuring Network Activity
  • Lab 3: Network Activity
Chapter 7: Assets and Vulnerability Assessment
  • Asset Interface
  • Vulnerability Assessment
  • Vulnerability Scanners
  • Lab 4: Assets and Vulnerability Assessment
Chapter 8: Rules
  • Rules
  • Configure Rules and Building Blocks
  • Lab 5: Rules
Chapter 9: Offense Manager
  • Offense Manager
  • Offense Manager Configuration
  • Offense Investigation
  • Lab 6: Configure the Offense Manager
Day 3
Chapter 10: JSA Reporting
  • Reporting Functionality
  • Reporting Interface
  • Lab 7: Reporting
Chapter 11: Basic Tuning and Troubleshooting
  • Basic Tuning
  • Troubleshooting
Chapter 12: Configuring Junos Devices for Use with JSA
  • Collecting Junos Events
  • Collecting Junos Flows
  • Lab 8: Configuring Junos Devices for JSA
Appendix A: High Availability
  • High Availability
  • Configuring High Availability