Jump to content

CBTNuggets - Juniper Networks Certified Specialist Security (JNCIS-SEC)

Recommended Posts


CBTNuggets Juniper Networks Certified Specialist Security (JNCIS-SEC) | 8.72Gb



The Juniper Networks Certified Specialist Security (JNCIS-SEC) certification track allows you to show core competency with general Juniper Networks security technology and the Junos software for SRX Series devices.


In this CBT Nugget series from security expert Michael J. Shannon, you will explore: SRX appliance essentials, security zones, SCREEN options, security policy, NAT and PAT, IPSec VPNs, high availability clustering options, IDP, firewall user authentication, an introduction to UTM, anti-spam filtering, anti-virus protection, content and web filtering, and more. Plus, you'l be prepared to take the JN0-332 exam!





Introduction to the Juniper SRX

This first Nugget of the Juniper Networks JNCIS-SEC series answers the question: What is a firewall system? Next, you will get a bit of history of what led up to the Juniper SRX security gateway product line. Then, you will look at the SRX as a branch/remote/retail office security gateway solution along with the related features. Finally, you will go on a web safari to find out about the SRX product line.





Junos CLI for the SRX

We need to establish core competency with the Junos CLI early on in order to establish a baseline for the remainder of the JNCIS-SEC series. This Nugget is will function as either a refresher for the earlier JNCIA Nugget series from Michael - or as a Junos CLI Primer for those who are new to Junos or perhaps migrating rapidly from a Cisco (or other vendor) security solution. This Nugget will be the first of many hands-on, real-world Nuggets in this series.





SRX Interface and Zone Basics

This Nugget covers the differences between classic firewalls and zone-based firewalls. We also define zones; examine packet flow through a SRX; explore interface basics; and review edit/show commands.





Configuring Remote Access to the SRX

We must first explore the SRX factory default configuration - in anticipation of configuring remote access connectivity to the security device. We will configure the interfaces and zones that were discussed in the previous Nugget. Next, we will configure system services like telnet, SSH, and HTTPS. We will confirure a default route as well. Finally, we will look at cennecting to and configuring the SRX with J-Web.





Administrative Access Control

This Nugget focuses on the fundamentals of administrative access to the SRX including local users and classes, custom classes, configuring the SRX to use a RADIUS server, demonstarting a possible scenario on a AAA authentication server.





System and Network Management

Every Juniper device, including the SRX, needs to have basic system and network management functionality configured early on in the deployment lifecycle. In this Nugget you will learn how to configure four key management services: NTP, DNS, SNMP, and Syslog.





Security Policy Basics (Part 1)

Here we will build a strong conceptual foundation for one of the most vital components of the SRX Security Gateway - security policy. You will learn the basic components of security policies (firewall rules), the syntax and logic of the policy, policy flow, and finishing up with address books and address sets.





Security Policy Basics (Part 2)

This second part of security policies will look at "Policy in Action." We will explore several real-world case studies that apply fundamental security policies in various scenarios.





Security Policy Basics (Part 3)

In this final Nugget on security policy, we take up where part two left off with a proof-of-concept demonstration of a denial policy. Then you will go deeper into syslog with the SRX as you learn how to send data to the Security Threat Response Monitor (STRM). Finally, you will learn methods for performing queries on existing log files and troubleshooting with TraceOptions.





NAT - Network Address Translation

Network Address Translation is a method for dealing with IPv4 address space depletion as well as a way to hide the addressing scheme of your security zones. This Nugget defines this important feature and describes the three major types of NAT supported on th SRX. You will also see configuration examples of Source NAT to the interface and a NAT pool.





IPsec VPN (Part 1)

Before we explore the vital function of virtual private netwotking on the SRX we must learn the fundamentals of VPNs, the various topologies and flavors, as well as how IPsec operates in a universal way. These concepts will be mastered before diving in to the IPsec distinctives on the Juniper SRX.





IPsec VPN (Part 2)

In part two we will look at Junos IPsec distinctives, including Routing and Policy-Based VPNs; pre-deployment considerations and options; and various VPN settings. Then you will look at the configuration of a site-to-site IPsec VPN in J-Web and the Junos CLI between two SRX security gateways.





Screen Options

Organizations are bombarded on a daily basis with a wide variety of reconnaisance attacks and information gathering sweeps that lead to more dangerous structured attacks. In this Nugget, we will explore the Screen option on the SRX to protect our network from a wide variety of vulnerabilities to ICMP, IP, TCP, and UDP. We will also take a peek at a common toolkit for launching this code: Back|Track 5.





Intrusion Detection and Prevention (IDP/IPS) Fundamentals

After the deployment of stateful firewalls and screens, the next critcal component of your firewall system will be intrusion detection and prevention (IDP). This feature is also being more commonly referred to as IPS in the Juniper world. In this Nugget, we will explore the key concepts and terminology of IDP along with the fundamentals for configuring this service on the SRX appliance.





Overview of HA Clustering

In this Nugget we will look at a pillar of security disaster recovery - high availability. You will learn the key concepts and technologies surrounding Chassis Clustering with focus on an Active/Passive cluster between two SRX210 devices.





Firewall User Authentication

Here is an interesting feature that is found on most firewalls where select users can authenticate with a telnet, ftp, or http session against a local or remote database to get access to resources in other zones. In this Nugget, you will learn about the two types of user authentication on the SRX: Pass-Through Authentication and Web Authentication.





UTM: Anti-Virus Protection

First we will define and explore the overall Unified Threat Management (UTM) feature on the SRX. Then we will tackle the four main types, one at a time, starting with the SRX anti-virus capabilities of UTM.





UTM: Web Filtering

Here we get a look at the three methods for filtering URLs on the SRX (as well as the J-Series router): Local Web Filtering, Integrated Web Filtering, and Redirect Filtering to a Websense server. We will specifically look at the configuration of Local Web Filtering on the SRX210.





UTM: Content and Anti-Spam Filtering

The final Nugget of the JNCIS-SEC series focuses on the last two Unified Threat Management features available on the SRX. First, you will learn about Content Filtering for MIME patterns and extensions as well as blocking content like ActiveX and Java applets. Second, the Anti-Spam feature will help us stop unwanted email from commercial, malicious, and fraudulent sources.


Total Series Duration: 10 hours

More Info:

Hidden Content

    Give reaction to this post to see the hidden content.


Hidden Content

    Give reaction to this post to see the hidden content.

Edited by downtemplate
  • Like 8

Share this post

Link to post
Share on other sites

I don't support torrent link. I only support free download links ( Uploaded Links for free user).


Thank you!

Done ? Where is the torrrent file :mellow:

Share this post

Link to post
Share on other sites

Before download I was thinking why these files are huge, After download these videos are recoded not downloaded with these

Hidden Content

    Give reaction to this post to see the hidden content.
since the huge size.


Audio 77% Video 23%


I suggest after download convert save space upto 5 times the original size

Edited by MITHI

Share this post

Link to post
Share on other sites

Anyone kind enough to post converted downscaled video files?(as MITHI suggested..?)can save a lot of bandwidth and time,,, thanks

Edited by noobie

Share this post

Link to post
Share on other sites

Anyone kind enough to post converted downscaled video files?(as MITHI suggested..?)can save a lot of bandwidth and time,,, thanks


Wait for someone to upload original videos, For time being you can use this videos.

Share this post

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Create New...