Titolo del corso:

Juniper Networks Design – Security


  • After successfully completing this course, you should be able to:
    • Identify high level security challenges with different design architectures.
    • Explain the value of implementing security solutions in any network design.
    • Identify key factors in Juniper Networks security focus.
    • List and describe the security platforms and solutions offered by Juniper Networks.
    • Perform the steps necessary to identify customer security requirements.
    • Explain what is required to define the scope of the security design.
    • Identify the data required to perform a data analysis of the customer’s existing network and use that information in the design.
    • Describe traditional security practices used to secure a network.
    • Explain the added capabilities that next generation firewalls provide.
    • Explain the evolution of modern security models.
    • Describe intelligent networks.
    • Explain how Software-Defined Secure Networking improves security in network design.
    • Explain the need for centralized Security Management.
    • Describe what Junos Space Security Director can do to manage network security.
    • Describe the function of Juniper Secure Analytics in managing network security.
    • List the main components of the Juniper Automation Stack.
    • Explain Juniper Networks automation solutions.
    • Describe the benefits of automating security.
    • Describe how security works in a virtualized environment.
    • Explain the benefits of service chaining.
    • Describe Juniper Virtual SRX and Container SRX products.
    • Describe network virtualization with VMware NSX.
    • Describe the benefits of HA with security devices.
    • Discuss how to handle asymmetric traffic with security devices.
    • Describe different options for SRX chassis cluster deployments.
    • Describe the main security concerns for the campus and the branch networks.
    • Explain end-to-end security concepts.
    • Describe security functions at different network layers.
    • Explain network authentication and access control concepts.
    • Describe common campus and branch network security design examples.
    • Describe security considerations for the enterprise WAN.
    • Explain when to use IPsec and NAT in the enterprise WAN.
    • Explain virtual router applications for the enterprise WAN.
    • Discuss security best practices in the enterprise WAN.
    • Describe security in the service provider WAN.
    • Discuss security best practices for the service provider WAN.
    • Discuss the security requirements and design principles of the data center.
    • Describe the security elements of the data center.
    • Explain how to simplify security in the data center.
    • Discuss the security enforcement layers in the data center.


The following are the prerequisites for this course:

  • Knowledge of network security concepts, including:
    • Traditional and next-generation firewalls;
    • IPsec VPNs;
    • Network Address Translation (NAT); and
    • Security intelligence.
  • Knowledge of Juniper Networks products and solutions.
  • Network automation and virtualization concepts.
  • Basic knowledge of hypervisors and high availability concepts.
  • Completion of the Juniper Networks Design Fundamentals (JNDF) course.

Chi è atteso:

This course is targeted specifically for those who have a solid understanding of operation and configuration and are looking to enhance their skill sets by learning the principles of security design.


Il corso è propedeutico per il conseguimento della certificazione Juniper Networks Certification Design Specialist Security (JNCDS-SEC).


Security in Network Design

    • The Value of Security in Network Design
    • Juniper’s Security Focus

Assessing Security in Network Design

    • Overview
    • Customer Security Requirements
    • Customer Scope
    • Data Analysis

Traditional Security Architectures

    • Traditional Security Practices
    • NAT
    • IPsec VPNs
    • Next Generation Firewalls
    • Unified Threat Management
    • Lab: Designing a Traditional Security Architecture

Modern Security Principles

    • Modern Security Models
    • Designing an Intelligent Network
    • Use Cases
    • Modularity in Security Design
    • Lab: Designing for Security Intelligence

Managing Security

    • Security Management Challenges
    • Junos Space Security Director
    • Juniper Secure Analytics
    • Lab: Security Management

Automating Security

    • Automating Security Introduction
    • Juniper Automation Stack
    • Juniper Automation Tools
    • Automating Security
    • Lab: Automating Security

Virtualizing Security

    • Security in a Virtualized Environment
    • Virtual SRX
    • Security with SDN and NFV
    • Container SRX
    • Network Virtualization with VMware NSX
    • Lab: Virtualizing Security

Providing High Availability in Security Design

    • Benefits of High Availability with Security Devices
    • Implementing Physical High Availability
    • Assymmetrical Traffic Handling
    • SRX Chassis Clustering
    • Lab: High Availability

Securing the Campus and Branch

    • Campus and Branch Security: An Overview
    • Network Segmentation and Perimeter Security
    • Application-Level Security
    • Access Control and Authentication
    • Layer 2 Security Functions
    • Case Studies and Example Architectures
    • Lab: Designing for Campus and Branch Security

Securing the Enterprise WAN

    • Security in the Enterprise WAN: An Overview
    • Best Practices and Considerations
    • Case Studies and Example Architectures
    • Lab: Designing for Enterprise WAN Security

Securing the Service Provider WAN

    • Security in the Service Provider WAN: An Overview
    • Best Practices and Considerations
    • Case Studies and Example Architectures
    • Lab: Designing for Service Provider WAN Security

Securing the Data Center

    • Overview of Data Center Security
    • Security Elements
    • Simplifying Security in the Data Center
    • Advanced Data Center Security
    • Lab: Securing the Data Center

Juniper Security Solutions

    • Security Products and Solutions


Black check box free icon Black check box free icon Square free icon  INTERMEDIO

Durata: 5 giorni


Prossime date:

Modalità di Erogazione:

Instructor Led (ILT)
Live Virtual Training (LVT)
Blended (BLD)


Lingua Italiana English Language Langue Française Idioma Español


Prossimi corsi in Agenda