CODE: JUN_IJSA
LENGTH: 24 Hours (3 days)
PRICE: £2,550.00
Duration: 3 days
This three-day course discusses the configuration of Juniper Networks JSA Series Secure Analytics (formerly known as Security Threat Response Manager [STRM]) in a typical network environment.
Key topics include deploying a JSA Series device in the network, configuring flows, running reports, and troubleshooting.
Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting the JSA Series device.
This course uses the Juniper Networks Secure Analytics (JSA) VM virtual appliance for the hands-on component.
This course is based on JSA software 2014.2R4.
Implementing Juniper Networks Secure Analytics is an introductory level course
Related Juniper Product:
This course is intended for network engineers, support personnel, reseller support, and anyone responsible for implementing the JSA system.
Day 1
Course Introduction
Product Overview
• Overview of the JSA Series Device
• Hardware
• Collection
• Operational Flow
Initial Configuration
• A New Installation
• Administration Console
• Platform Configuration
• Deployment Editor
LAB 1: Initial Configuration
Architecture
• Processing Log Activity
• Processing Network Activity
• JSA Deployment Options
Log Activity
• Log Activity Overview
• Configuring Log Activity
LAB 2: Log Activity
Day 2
Network Activity
• Network Activity Overview
• Configuring Network Activity
LAB 3: Network Activity
Assets and Vulnerability Assessment
• Asset Interface
• Vulnerability Assessment
• Vulnerability Scanners
LAB 4: Assets and Vulnerability Assessment
Rules
• Rules
• Configure Rules and Building Blocks
LAB 5: Rules
Offense Manager
• Offense Manager
• Offense Manager Configuration
• Offense Investigation
LAB 6: Configure the Offense Manager
Day 3
JSA Reporting
• Reporting Functionality
• Reporting Interface
LAB 7: Reporting
Configuring Junos Devices for Use with JSA
• Collecting Junos Events
• Collecting Junos Flows
LAB 8: Configuring Junos Devices for JSA
Basic Tuning and Troubleshooting
• Basic Tuning
• Troubleshooting
Appendix A: High Availability
• High Availability
• Configuring High Availability