- Seminar / Training
- Juniper
- Juniper Apstra
- Juniper Data Center Fabric with EVPN and VXLAN
- Junos Contrail
- Juniper Firewall
- Juniper Internet Expert Fast Track
- Juniper ISPs Fast Track
- Junos 22.2 Basics
- Junos 22.2 CoS
- Junos 22.2 Layer 2 VPNs
- Junos 22.2 Layer 3 VPNs
- Junos 22.2 MPLS
- Junos 22.2 Multicast Routing
- Junos 22.2 Routing
- Junos 22.2 Routing for ISPs
- Junos 22.2 Security
- Junos 22.2 Safety Structure
- Junos 22.2 Safety Complete Fast Track
- Junos 22.2 Security for ISPs
- Junos 22.2 Space Fundamentals and Network Director
- Junos 22.2 Switching
- Junos 22.2 Switching for Data Centres
- Junos 22.2 Switching for ISPs
- Junos 22.2 Platform Automation
- Juniper NOC Troubleshooting
- Juniper Router Introduction
- Mist System
- Seminar / Training
- Juniper
- Juniper Apstra
- Juniper Data Center Fabric with EVPN and VXLAN
- Junos Contrail
- Juniper Firewall
- Juniper Internet Expert Fast Track
- Juniper ISPs Fast Track
- Junos 22.2 Basics
- Junos 22.2 CoS
- Junos 22.2 Layer 2 VPNs
- Junos 22.2 Layer 3 VPNs
- Junos 22.2 MPLS
- Junos 22.2 Multicast Routing
- Junos 22.2 Routing
- Junos 22.2 Routing for ISPs
- Junos 22.2 Security
- Junos 22.2 Safety Structure
- Junos 22.2 Safety Complete Fast Track
- Junos 22.2 Security for ISPs
- Junos 22.2 Space Fundamentals and Network Director
- Junos 22.2 Switching
- Junos 22.2 Switching for Data Centres
- Junos 22.2 Switching for ISPs
- Junos 22.2 Platform Automation
- Juniper NOC Troubleshooting
- Juniper Router Introduction
- Mist System
Junos 22.2 Safety Complete Fast Track
Seminar / Training Junos Security Complete Fast-Track
Part 1
Introduction - Traditional Routing and Security - Architecture - Logical Packet Flow - Junos Space - Security Director Overview
Zones - Zone Configuration - Monitoring
Security Policies - Overview - Policy Components - Policy Case Study
Security Director Firewall Policies - Configuration - Processing - Deployment - Monitoring
Advanced Security Policies - Session Management - Junos ALGs - Policy Planning - Logging - Security Director
Troubleshooting - General Troubleshooting - Tools
Network Address Translation - NAT Overview - Source NAT - Destination NAT - Static NAT - Proxy ARP - Persistent NAT - IPv6 with NAT - Troubleshooting
IPsec VPN Concepts - VPN Types - VPN Requirements - IPsec Tunnel Setup
IPsec VPN Implementation - Configuration - Proxy IDs and Traffic Selectors - Monitoring
Hub-and-spoke VPNs - Overview - Configuration - Monitoring - Security Director
Group VPNs - Overview - Configuration - Monitoring
PKI and ADVPNs - Public Key Infrastructure - Overview - Configuration - Monitoring
Advanced IPsec - NAT with IPsec - Classes of Service with IPsec - Routing OSPF over IPsec - Overlapping Address - Dynamic Gateway IP Addresses - Troubleshooting IKE Phase 1 and 2 - Logging
Chassis Cluster - Concepts - Components - Operation - Implementation - Advanced Chassis Cluster Options - Troubleshooting
SRX Platform - Overview - SRX Traffic Flow and Distribution - Interfaces - Virtual SRX - Virtualization Overview - Network Virtualization and SDN - Deployment Scenarios - Integration with AWS
Part 2
Junos Layer 2 Packet Handling and Security Features - Transparent Mode Security - Layer 2 Next Generation Ethernet Switching - MACsec
Virtualization - Overview - Routing Instances - Logical Systems
AppSecure - Overview - AppTrack - AppFW - APBR - SSL Proxy
Sky ATP - Overview - Setup with Web Interface and Security Director - Troubleshooting - Monitoring Infected Hosts SDSN with Policy Enforcer - Overview - Configuring
UTM - Overview - AntiSpam - AntiVirus - Content and Web Filtering
IPS - Overview - Protecting Network Assets - Intrusion Attack Methods - Intrusion Prevention Systems - IPS Policies - SRX IPS Requirements - Operating Modes - IPS Rulebase Operations
SSL Proxy - Overview - Client Protection - Server Protection
User Authentication - User Role Firewall Overview - Firewall Implementation - Monitoring
Monitoring - Log Director Overview - Log Director Installation - Log Events - Alerts and Reports
We conduct this seminar online for you. You can book the training as a public seminar or as a company seminar. The practical exercises are carried out in our Remotelab and make up 40-50 percent of the seminar.
Your contacts
-
Promise Akachukwu Kelechi
E-Mail: promise@computer-training.ng
Phone: +234 1 227 9218 -
Peter Chidiebere Ugochukuw
E-Mail: peter@computer-training.ng
Phone: +234 1 227 9218 -
Raphael Chukuwgozie Ndubuisi
E-Mail: raphael@computer-training.ng
Phone: +234 1 227 9218
We offer seminars with a high practical relevance. The contents and exercises are geared to your daily tasks in the company and completely dispense with advertising references to other products of the software manufacturer.
All our training courses are manufacturer-independent. This enables us to offer critical considerations of the products themselves and comparisons with competitors of the manufacturer in the seminar. The course contents are our own and derived from the practical experience of our trainers in projects.
Of course, the contents of company seminars can be individually adapted to your needs. Please do not hesitate to contact us.
- Implementation guarantee - Implementation guarantee for two or more participants
- Mobile classrooms - the ideal complement for company seminars
- Free support - for questions after the seminar
- Delivery on account - no prepayment required
- Interview with the trainer / quality assurance - get to know and assess the trainer in advance
- Clarify seminar requirements - review your knowledge with the trainer
- Assistance with travel costs - we cover part of the costs of hotel accommodation
- Meals - all day cold / hot drinks and a full lunch in the restaurant
- Location of training centres - always centrally located and easily accessible
- Discount - we have attractive prices, take advantage of our additional discounts
- Remotelabs - rent our Remotelabs for your own seminars or as a complement to your company seminars