Skip to content
Juniper Network Certification Program – Security  cover image

Juniper Network Certification Program – Security
Fortray Global Services LTD

JNCIS-SEC

Summary

Price
£495.99 inc VAT
Or £55.11/mo. for 9 months...
Study method
Online
Course format
Video
Duration
3 months · Self-paced
Access to content
12 months
Certification
Juniper Networks Certified Internet Specialist – Junos Security (JNCIS-SEC)
Professional certification What's this?

Add to basket or enquire

Buy with Apple Pay
Buy with Google Pay

Overview

Fortray’s JUNOS Security (J-SEC) course covers the configuration, operation, and implementation of SRX Series Services Gateways in a typical network environment.

The topics covered within this course include security technologies such as security zones, security policies, intrusion detection and prevention (IDP), Network Address Translation (NAT), and high availability clusters, as well as details about underlying implementation, configuration, and management.

Fortray’s Juniper JNCIS-SEC course will ensure that the learner gains extensive
hands-on experience on the Real & Licensed hardware along with an
industry-experienced trainer with only one vision in mind.

This course provides knowledge of

  • Describe traditional routing and security and the current trends in internetworking.
  • Provide an overview of SRX Series devices and software architecture.
  • Describe the logical packet flow and session creation performed by SRX Series appliance.
  • Describe, configure, and monitor zones.
  • Describe, configure, and monitor security policies.
  • Describe, configure, and monitor firewall user authentication.
  • Describe various types of network attacks.
  • Configure and monitor Screen options to prevent network attacks.
  • Explain, implement, and monitor NAT, as implemented on JUNOS security platforms.
  • Explain the purpose and mechanics of IP Security (IPsec) virtual private networks (VPNs).
  • Implement and monitor policy-based and route-based IPsec VPNs.
  • Utilize and update the IDP signature database.
  • Configure and monitor IDP policy with policy templates.
  • Describe, configure, and monitor high-availability chassis clusters.
  • Explain how to deploy and manage vSRX.

Certification

Juniper Networks Certified Internet Specialist – Junos Security (JNCIS-SEC)

Awarded by Juniper Networks

Description

Junos Security Overview

  • Identify concepts, general features, and functionality of Junos OS security
    • Junos security architecture
    • Branch vs. high-end platforms
    • Major hardware components of SRX Series services gateways
    • Packet flow
    • Packet-based vs. session-based forwarding

Zones

  • Identify concepts, benefits, and operation of zones
    • Zone types
    • Dependencies
    • Host inbound packet behavior
    • Transit packet behavior
  • Demonstrate knowledge of how to configure, monitor and troubleshoot zones
    • Zone configuration steps
    • Hierarchy priority (Inheritance)
    • Monitoring and troubleshooting

Security Policies

  • Identify the concepts, benefits, and operation of security policies
    • Policy types (default policy)
    • Policy components
    • Policy ordering
    • Host inbound traffic examination
    • Transit traffic examination
    • Scheduling
    • Rematching
    • ALGs
    • Address books
    • Applications
  • Demonstrate knowledge of how to configure, monitor and troubleshoot security policies
    • Policies
    • ALGs
    • Address books
    • Custom applications
    • Monitoring and troubleshooting

Firewall User Authentication

  • Describe the concepts, benefits, and operation of firewall user authentication
    • User Firewall
    • User authentication types
    • Authentication server support
    • Client groups

Screens

  • Identify the concepts, benefits, and operation of Screens
    • Attack types and phases
    • Screen options
  • Demonstrate knowledge of how to configure, monitor and troubleshoot Screens
    • Screen configuration steps
    • Monitoring and troubleshooting

NAT

  • Identify the concepts, benefits, and operation of NAT
    • NAT types
    • NAT/PAT processing
    • Address persistence
    • NAT proxy ARP
    • Configuration guidelines
  • Demonstrate knowledge of how to configure, monitor and troubleshoot NAT
    • NAT configuration steps
    • Monitoring and troubleshooting

IPSec VPNs

  • Identify the concepts, benefits, and operation of IPSec VPNs
    • Secure VPN characteristics and components
    • IPSec tunnel establishment
    • IPSec traffic processing
    • Junos OS IPSec implementation options
  • Demonstrate knowledge of how to configure, monitor and troubleshoot IPSec VPNs
    • IPSec VPN configuration steps
    • Monitoring and troubleshooting

High Availability (HA) Clustering

  • Identify the concepts, benefits, and operation of HA
    • HA features and characteristics
    • Deployment requirements and considerations
    • Chassis cluster features and operation
    • Cluster modes
    • Cluster and node IDs
    • Redundancy groups
    • Cluster interfaces
    • Real-time objects
    • State synchronization
    • Ethernet switching considerations
    • IPSec considerations
    • Manual failover
    • Demonstrate knowledge of how to configure, monitor and troubleshoot clustering
    • Cluster preparation
    • Cluster configuration steps
    • Monitoring and troubleshooting

Unified Threat Management (UTM)

  • Identify concepts, general features, and functionality of UTM
    • Packet flow and processing
    • Design considerations
    • Policy flow
    • Platform support
    • Licensing
  • Describe the purpose, configuration, and operation of antispam filtering
    • Methods
    • Whitelists vs. blacklists
    • Order of operations
    • Traffic examination
    • Configuration steps using the CLI
    • Monitoring and troubleshooting
  • Explain the purpose, configuration, and operation of antivirus protection
    • Scanning methods
    • Antivirus flow process
    • Scanning options and actions
    • Configuration steps using the CLI
    • Monitoring and troubleshooting
  • Explain the concepts, benefits, and operation of content and Web filtering
    • Filtering features and solutions
    • Configuration steps using the CLI
    • Monitoring and troubleshooting

Who is this course for?

  • System administrators
  • Support Analysts
  • Security managers
  • Network engineers

Requirements

Students should have a solid background of networking knowledge and an understanding of the OSI model and the TCP/IP protocol suite. Students should also either attend the Introduction to the JUNOS Operating System (IJOS) and JUNOS Routing Essentials (JRE) courses before attending this class or have equivalent experience with JUNOS Software.

Questions and answers

Currently there are no Q&As for this course. Be the first to ask a question.

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Interest free credit agreements provided by Zopa Bank Limited trading as DivideBuy are not regulated by the Financial Conduct Authority and do not fall under the jurisdiction of the Financial Ombudsman Service. Zopa Bank Limited trading as DivideBuy is authorised by the Prudential Regulation Authority and regulated by the Financial Conduct Authority and the Prudential Regulation Authority, and entered on the Financial Services Register (800542). Zopa Bank Limited (10627575) is incorporated in England & Wales and has its registered office at: 1st Floor, Cottons Centre, Tooley Street, London, SE1 2QG. VAT Number 281765280. DivideBuy's trading address is First Floor, Brunswick Court, Brunswick Street, Newcastle-under-Lyme, ST5 1HH. © Zopa Bank Limited 2025. All rights reserved.