JNCIS-SEC


The JNCIS-SEC exam has been designed for networking professionals who are experienced and have intermediate knowledge when it comes to the Junos software from the Juniper Network. The examination, which is conducted in a written format, aims to verify the understanding of the candidate in terms of security technologies as well as related troubleshooting and platform configuration. The exam topics of JNCIS-SEC are based keeping in mind the content of training courses led by recommended instructors. The JNCIS-SEC certification carries a validity of two years following which students can get recertified by clearing the JNO-332 examination.

Overview of the course:

Security Overview: Identification of general features. Concepts and functionality of the Junos OS security, Branch vs high end platforms, packet flow, Junos security architechture, packet based vs session based forwarding.

Zones: Description of the benefits, operation and concept of zones, dependencies, zone types, transit packet behaviour, zone configuration steps, monitoring and troubleshooting, etc

Security policies: Description of the benefits, operation and concept of security policies, types of policy, to the device traffic examination, policy components, rematching, scheduling, ALGs, address books, monitoring, configuring and troubleshooting security policies, etc.

Firewall user authentication: Description of the benefits, operation and concept of firewall user authentication, authentication server support, client groups, etc.

Screens: Description of the benefits, operation and concept of screens, screen options, attack types and phases, screen configuration.

NAT: Description of the benefits, operation and concept of NAT, NAT/PAT processing, NAT types, etc.

IPSec VPNs: Description of the benefits, operation and concept of IPSec VPNs, IPSec tunnel establishment, Junos OS IPSec implementation options, etc.

High Availability (HA) Clustering: Description of the benefits, operation and concept of HA, characteristics and features of HA, requirements and considerations of deployment, cluster modes, redundancy groups, real time objects, etc

Unified Threat Management (UTM): Description of the benefits, operation and concept of UTM, licensing, packet flow, whitelist vs blacklist etc.

 

 

"NETTECH IS THE BEST TRAINING PROVIDER FOR CCNA, CCNP, CCIE, MCSA, MCITP, RHCE, ETHICAL HACKING, VMWARE IN THANE WITH CERTIFIED PROFESSIONAL."
Nettech India

Contact us

If you want more information fill in this form. You will be contacted as soon as possible. Please fill in all required fields.

Name*
Email*
Mobile*
Message*
Send a copy to my own email address


CAREER PACKAGES