Kursangebot
- Garantietermine
- Neue Trainings
- Fast Lane LIVE E-Learning
- Fast Lane Academy»
-
Fast Lane IT Workshops»
- IT-Training by Fast Lane
- Garantietermine
- Themen im Fokus
- Professional Services
- Trainingspakete
- IT- & Projektmanagement»
- Hersteller im Fokus
- Amazon Web Services»
- Arista»
- Aruba»
- Cisco»
- Citrix»
- Fortinet»
- Google Cloud»
- Microsoft»
- NetApp»
- Palo Alto Networks»
- Red Hat»
- VMware»
-
Weitere Hersteller»
- Apple
- Automation Anywhere
- Barracuda
- Bosch IoT Academy
- Brocade
- CA Technologies
- Check Point
- Cloud Security Alliance
- Cloudera
- Commvault
- CompTIA
- CWNP
- Cybersecurity First Responder
- DataCore
- Dell EMC
- EC-Council
- Extreme Networks
- F5
- Gigamon
- IBM
- (ISC)²
- Infoblox
- Juniper
- Kaspersky Lab
- Micro Focus
- NCTA Cloud
- Nutanix
- Oracle
- Pivotal / Spring
- Riverbed
- Ruckus
- Salesforce
- SAP
- SonicWall
- Sophos
- SUSE
- Symantec
- Trend Micro
- TÜV (IT-Security)
- Veritas
- Themen/Technologien im Fokus
- Artificial Intelligence (AI)»
- Business & Soft Skills»
- Cloud Computing»
- Cyber Security»
- Data Center»
- Internet of Things (IoT)»
- Kubernetes / Container»
- Linux»
- Network Analysis / Wireshark»
- Software Development»
- Wireless & Mobility»
IJSA
Online Training
Dauer 3 Tage
Digitale KursunterlagenDerzeit gibt es keine Online-Termine für diesen Kurs.
Classroom Training
Dauer 3 Tage
Preis (exkl. MwSt.)
-
Deutschland:
Country: DE2.250,- €
-
Schweiz:
Country: CHUS$ 2.400,-
- Juniper Training Credits: 2250 JTC
Derzeit gibt es keine Klassenraum-Termine für diesen Kurs.
Termin anfragenOnsite Training
Kurs anfragenDie Unterlagen werden dem Teilnehmer in elektronischer Form zur Verfügung gestellt.
Weitere Infos erhalten Sie unter www.flane.de/ebooks
- Home
- Training
- Juniper Networks
- IJSA

Implementing Juniper Networks Secure Analytics (IJSA)
Kursüberblick
Der IJSA ist der Nachfolger des Kurses CSTRM (Configuring Security Threat Response Manager). Bei Rückfragen stehen wir Ihnen gerne info@flane.de zur Verfügung.
Voraussetzungen
This course assumes that students have basic networking knowledge and experience in the following areas:
- Understanding of TCP/IP operation;
- Understanding of network security concepts; and
- Experience in network security administration.
Kursziele
After successfully completing this course, you should be able to:
- Describe the JSA system and its basic functionality.
- Describe the hardware used with the JSA system.
- Identify the technology behind the JSA system.
- Identify the JSA system’s primary design divisions—display versus detection, and events versus traffic.
- Plan and prepare for a new installation.
- Access the administration console.
- Configure the network hierarchy.
- Configure the automatic update process.
- Access the Deployment Editor.
- Describe the JSA system’s internal processes.
- Describe event and flow source configuration.
- List key features of the JSA architecture.
- Describe the JSA system’s processing logic.
- Interpret the correlation of flow data and event data.
- List the architectural component that provides each key function.
- Describe Events and explain where they come from.
- Access the Log Activity interface.
- Execute Event searches.
- Describe flows and their origin.
- Configure the Network Activity interface.
- Execute Flow searches.
- Specify the JSA system’s Asset Management and Vulnerability Assessment functionality.
- Access the Assets interface.
- View Asset Profile data.
- View Server Discovery.
- Access the Vulnerability Assessment Scan Manager to produce vulnerability assessments (VAs).
- Access vulnerability scanner configuration.
- View vulnerability profiles.
- Describe rules.
- Configure rules.
- Configure Building Blocks (BBs).
- Explain how rules and flows work together.
- Access the Offense Manager interface.
- Understand Offense types.
- Configure Offense actions.
- Navigate the Offense interface.
- Explain the Offense summary screen.
- Search Offenses.
- Use the JSA system’s Reporting functionality to produce graphs and reports.
- Navigate the Reporting interface.
- Configure Report Groups.
- Demonstrate Report Branding.
- View Report formats.
- Identify the basic information on maintaining and troubleshooting the JSA system.
- Navigate the JSA dashboard.
- List flow and event troubleshooting steps.
- Access the Event Mapping Tool.
- Configure Event Collection for Junos devices.
- Configure Flow Collection for Junos devices.
- Explain high availability (HA) functionality on a JSA device.
Kursinhalt
This three-day course discusses the configuration of Juniper Networks JSA Series Secure Analytics (formerly known as Security Threat Response Manager [STRM]) in a typical network environment. Key topics include deploying a JSA Series device in the network, configuring flows, running reports, and troubleshooting.
Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting the JSA Series device. This course uses the Juniper Networks Secure Analytics (JSA) VM virtual appliance for the hands-on component. This course is based on JSA software 2014.2R4.
Online Training
Dauer 3 Tage
Digitale KursunterlagenDerzeit gibt es keine Online-Termine für diesen Kurs.
Classroom Training
Dauer 3 Tage
Preis (exkl. MwSt.)
-
Deutschland:
Country: DE2.250,- €
-
Schweiz:
Country: CHUS$ 2.400,-
- Juniper Training Credits: 2250 JTC
Derzeit gibt es keine Klassenraum-Termine für diesen Kurs.
Termin anfragenDerzeit gibt es keine Trainingstermine für diesen Kurs. Termin anfragen