098 70 803004 / 5
            

Enquiry Form

JNCIS-SEC

JNCIS-SEC

The JNCIS-SEC exam has been designed for networking professionals who are experienced and have intermediate knowledge when it comes to the Junos software from the Juniper Network. The examination, which is conducted in a written format, aims to verify the understanding of the candidate in terms of security technologies as well as related troubleshooting and platform configuration. The exam topics of JNCIS-SEC are based keeping in mind the content of training courses led by recommended instructors. The JNCIS-SEC certification carries a validity of two years following which students can get recertified by clearing the JNO-332 examination.

Back to top

Overview of the course:

• Security Overview: Identification of general features. Concepts and functionality of the Junos OS security, Branch vs high end platforms, packet flow, Junos security architechture, packet based vs session based forwarding.

• Zones: Description of the benefits, operation and concept of zones, dependencies, zone types, transit packet behaviour, zone configuration steps, monitoring and troubleshooting, etc

• Security policies: Description of the benefits, operation and concept of security policies, types of policy, to the device traffic examination, policy components, rematching, scheduling, ALGs, address books, monitoring, configuring and troubleshooting security policies, etc.

• Firewall user authentication: Description of the benefits, operation and concept of firewall user authentication, authentication server support, client groups, etc.

• Screens: Description of the benefits, operation and concept of screens, screen options, attack types and phases, screen configuration.

• NAT: Description of the benefits, operation and concept of NAT, NAT/PAT processing, NAT types, etc.

• IPSec VPNs: Description of the benefits, operation and concept of IPSec VPNs, IPSec tunnel establishment, Junos OS IPSec implementation options, etc.

• High Availability (HA) Clustering: Description of the benefits, operation and concept of HA, characteristics and features of HA, requirements and considerations of deployment, cluster modes, redundancy groups, real time objects, etc

• Unified Threat Management (UTM): Description of the benefits, operation and concept of UTM, licensing, packet flow, whitelist vs blacklist etc.

Back to top

Available delivery methods for this course:

Classroom

In-house

Online

Virtual

Enquiry Form

Name

Email

Phone Number

Comments