Introduction to Juniper Security Devices and Policy
Offered By: Pluralsight
Course Description
Overview
This introduction to Juniper Security Devices and Policy teaches different security approaches, Juniper SRX global policy, and the creation of a Juniper security policy.
Juniper is one of the main networking and security vendors and the knowledge of their product and solution offerings can be an advantage when coming into many modern working environments. In this course, Introduction to Juniper Security Devices and Policy, along with the two other accompanying courses, focuses on the Juniper Connected Security approach, and then goes into more detail about how their SRX appliance offerings operate within this framework including supporting stateless and stateful firewall, IPS, NAT, UTM, and other security features. First, you will learn about the different security approaches that are used by security professionals, including Juniper's connected security approach. Next, you will explore the different capabilities that are part of Junipers SRX next generation firewall solution. Then, you will discover the different security objects that are used in the creation of a Juniper security policy. Finally, you will gain an understanding of policy creation using the SRX platform, using zone, global and unified policy options. By the end of this course, you'll have a firm base of understanding of the basics of Juniper connected security.
Juniper is one of the main networking and security vendors and the knowledge of their product and solution offerings can be an advantage when coming into many modern working environments. In this course, Introduction to Juniper Security Devices and Policy, along with the two other accompanying courses, focuses on the Juniper Connected Security approach, and then goes into more detail about how their SRX appliance offerings operate within this framework including supporting stateless and stateful firewall, IPS, NAT, UTM, and other security features. First, you will learn about the different security approaches that are used by security professionals, including Juniper's connected security approach. Next, you will explore the different capabilities that are part of Junipers SRX next generation firewall solution. Then, you will discover the different security objects that are used in the creation of a Juniper security policy. Finally, you will gain an understanding of policy creation using the SRX platform, using zone, global and unified policy options. By the end of this course, you'll have a firm base of understanding of the basics of Juniper connected security.
Syllabus
- Course Overview 1min
- Reviewing Juniper Connected Security Solutions 24mins
- Discussing Juniper SRX Device Capabilities 44mins
- Discovering Security Policies Using Juniper SRX Solutions 40mins
- Exploring Security Policies Using Juniper SRX Solutions 36mins
Taught by
Sean Wilkins
Related Courses
5G for EveryoneQualcomm via Coursera Advanced Cyber Security Training
EC-Council via FutureLearn Working with tcpdump Filters
Coursera Project Network via Coursera Cloud Computing Fundamentals on Alibaba Cloud
Alibaba Cloud Academy via Coursera Protecting Cloud Architecture with Alibaba Cloud
Alibaba via Coursera