Course Overview

This three-day course provides students with the foundational knowledge required to work with the Junos operating system and to configure Junos security devices. 

The course provides a brief overview of the Juniper security products and discusses the key architectural components of the Junos software. 

Key topics include UI options with a heavy focus on CLI, configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos Security devices.

The course then delves into foundational knowledge of security objects, security policies, and configuration examples including types of security objects, security policies, security services NAT, site-to-site IPsec VPN, and Juniper Secure Connect VPN.

Through demonstrations and hands-on labs, students will gain experience in configuring and monitoring Junos OS and monitoring basic device operations on the SRX device. 

This course is based on Junos OS Release 21.2R1.10. 

Course Level

Introduction to Juniper Security (IJSEC) is an introductory level course.

Relevant Juniper Product 

• SRX Series • Juniper Connected Security • Juniper AppSecure • Juniper Sky ATP

Course Objectives

• Describe Juniper Networks connected security device framework

• Describe SRX Series device features

• Describe initial and basic configuration

• Describe and demonstrate the Junos CLI options

• Configure security zone and screen objects

• Configure address and service objects

• Implement security policies

• Describe IPS and implement IPS policies

• Describe user-based firewall and implement integrated user-based firewall

• Describe UTM—Antivirus and Antispam

• Describe UTM—Content Filtering and Web Filtering

• Describe JATP Cloud Features

• Implement Source NAT

• Implement Destination and Static NAT

• Implement Site-to-Site IPsec VPN

• Describe SSL VPN by using Juniper Secure Connect

• Administer and Troubleshoot Security Services on an SRX Series Device

• Describe Monitoring and Reporting Features on the SRX Series Device

Course Content

DAY 1

Course Introduction

Juniper Connected Security

• Identify the high-level security challenges in today’s network

• Describe basic network security design

• Identify the key factors in Juniper Networks security focus

Juniper SRX Overview

• Describe the Junos architecture and SRX features

• Explain the traffic processing and logical packet flow on an SRX Series device

• Describe the Junos J-Web UI and its features

Juniper SRX Initial Configuration

• List and perform initial configuration tasks

• Perform basic interface configuration tasks

Lab 1: Initial System Configuration

UI Options – The Junos CLI

• Perform Junos CLI basics

• Describe Junos operational mode

• Describe Junos configuration mode

 Security Zones and Screen Objects

• Describe and configure security zones objects

• Describe and configure screen objects

Address Objects and Service Objects

• Describe and configure address objects

• Describe and configure service objects

Lab 2: Creating Security Objects

DAY 2

Security Policies

• Describe the purpose and types of security policies

• Define the security policy components

• Configure an application firewall with unified security policies

• Implement security policy for a given use case

Lab 3: Creating Security Policies

Security Services—IPS

• Explain the purpose of IPS

• Define the IPS policy components

• Configure IPS policies

Security Services—Integrated User-Based Firewall

• Explain the purpose of user-based firewall

• Configure integrated user-based firewall

Lab 4: Security Services—IPS Integrated User Firewall

UTM—Antivirus and Antispam

• Describe the purpose of UTM services

• Explain antispam and its functionality

UTM—Content Filtering and Web Filtering

• Explain the functionality of Content filtering

• Explain the functionality of Web filtering

Lab 5: Implementing UTM Virtual SRX

Juniper Connected Security—JATP Cloud

• Explain the purpose of JATP

• Describe the features of JATP

• Describe the process to enroll devices with JATP cloud

• Monitor JATP

Lab 6: JATP Overview

DAY 3

Source Network Address Translation

• Describe the purpose and functionality of NAT and PAT

• Configure and monitor source NAT

• Explain the purpose of proxy ARP

Destination Network Address Translation and Static Network Address Translation

• Configure and monitor destination NAT

• Configure and monitor static NAT

Lab 7: Implementing NAT

Site-to-Site IPsec VP

• Describe the high-level overview and configuration options for IPsec VPN

• Implement IPsec VPN for a given use case

• Describe the functionality of proxy-id and traffic selectors

• Monitor site-to-site IPsec VPN

Lab 8: Implementing IPsec VPN

Juniper Secure Connect

• Describe Juniper Secure Connect features

• Explain Juniper Secure Connect UI options

• Deploy Juniper Secure Connect

• Monitor Juniper Secure Connect

Lab 9: Implementing Juniper Secure Connect

SRX Troubleshooting

• Discuss SRX and vSRX licensing

• Describe how to use packet capture

• Describe the traceoptions on the SRX Series device

• Discuss how to verify Content Security policy usage

Monitoring and Reporting

• Explain the basic monitoring features

• Explain the use of network utility tools on the SRX Series device

• Describe the procedure of maintaining Junos OS

• Identify the various reports available on SRX J-Web interface

Lab 10: Monitoring and Reporting

The following appendices can be covered – time permitting – if requested by the delegate/s at the time of booking the course:

SRX Series Hardware and Interfaces

Virtual SRX

Juniper Sky Enterprise

IPsec VPN Concepts

Course Overview

This introductory three-day course serves as the springboard to understanding the Mist AI™ Full Stack offerings. This course provides students a comprehensive understanding of a fully deployed, driven by Mist AI wired, wireless, and software-defined WAN (SD-WAN) network. In their lab environments, students will explore each Mist AI offering at a high level, focusing on wireless and Edge products, switching and campus design, SDWAN connectivity, enterprise routing capabilities, deploying Juniper Mist™ Access Assurance, and Juniper® Location Service, driven by Mist AI™. This course is for students seeking to understand Mist AI and how the full stack combines for complete AI-native networking. After completing this course, students can articulate the benefits and essential functions of the Mist AI flexible, scalable, and distributed architecture with AI across their wired, wireless, and SD-WAN networks.

This course is for students seeking to understand Mist AI and how the full stack combines for complete AI-native networking. After completing this course, students can articulate the benefits and essential functions of the Mist AI flexible, scalable, and distributed architecture with AI across their wired, wireless, and SD-WAN networks.

This is an introductory course.

Related Juniper Products

• EX Series • Junos OS • MX Series • SRX Series • Network Design • Juniper Apstra • Mist AI • Session Smart Routers

Course Objectives

After successfully completing this course, you should be able to:

• Describe the Juniper Mist™ cloud.

• Explain the key concepts, terminology, and configuration for the Juniper Mist Full Stack, including:

o   Juniper Mist Wireless Assurance.

o   Juniper Mist™ Wired Assurance.

o   Juniper Mist™ WAN Assurance.

• Articulate key features in the Juniper Mist solutions, including:

o   Marvis® Virtual Network Assistant, Marvis Actions, Marvis Minis.

o   Juniper Mist Network Analytics.

o   Juniper Mist™ Premium Analytics.

o   Juniper Mist™ Access Assurance (NAC).

o   Juniper Mist™ Routing Assurance.

o   Location Service, driven by Mist AI.

o   Juniper Mist™ Edge.

o   Juniper Secure Services Edge integrations.

o   Apstra Cloud Services Integration with Mist AI.

Course Content

Day 1

1 Introduction to Juniper Mist

• Outline Juniper Mist

• Describe Marvis and Marvis Minis

• Define Juniper Mist full stack

• Outline Juniper Mist services and solutions

2 Introduction to Artificial Intelligence and the Juniper Mist AI-Native Network

• Describe the evolution of artificial intelligence

• Describe machine learning

• Describe Mist AI

• Describe the Juniper Mist cloud

3 Introduction to Marvis VNA

• Describe Marvis VNA

• Describe Marvis Actions

• Provide an overview of the Marvis Conversational Assistant and the Marvis Query Language

• Describe Marvis Minis

4 Juniper Mist—Accounts and Management

• Describe how to create and manage a Juniper Mist account

• Outline Juniper Mist management and administration

• Describe Juniper Mist e-mail alerts and notifications

• Outline Juniper Mist subscription options

Lab 1: Juniper Mist Accounts

5 Juniper Mist SD-WAN Capabilities and Use Cases

• Define SD-WAN

• Describe WAN Edge and Overlay

• Explain tunnel-free routing

• Outline platform considerations and deployment patterns

6 Juniper Mist WAN Assurance—Deployment Workflow

• Outline the Juniper® SD-WAN driven by Mist AI™ Intent Model

• Outline WAN Edge templates and hub profiles

• Describe Application Steering and SD-WAN policies

• Outline secure services edge integrations

Day 2

7 Juniper Mist WAN Assurance—Management and Monitoring

• Explain Session Smart SD-WAN SLEs

• Describe Marvis Actions and WAN Edge Insights for SD-WAN

• Outline WAN user experiences and application-based context

• Outline the customer deployment journey

Lab 2: WAN Assurance

8 Juniper Mist Access Assurance—Capabilities and Use Cases

• Describe the components of network access control

• Explain the features of Juniper Mist Access Assurance

• Describe the Juniper Mist Access Assurance use cases

• Describe authentication policies

• Describe posture compliance

9 Juniper Mist Routing Assurance—Capabilities and Use Cases

• Outline Juniper Mist Routing Assurance features

• Describe Juniper Mist Routing Assurance use cases

• Describe the onboarding and configuration workflows for Day 0 and Day 1

• Explain WAN Monitoring SLEs and Day 2 experiences

10 Juniper Mist Wired Assurance—Day 0 Expectations

• Define Day 0 expectations

• Describe the Wired Assurance configuration hierarchy

• Outline wired configuration elements

• Describe how to configure VLANs and port profiles, and how to assign them

• Describe dynamic port profiles

11 Juniper Mist Wired Assurance—Deployment and Workflow

• Define Day 1 expectations

• Explain Juniper Mist Wired Assurance and Wired Visibility

• Describe Juniper Mist Wired devices and Virtual Chassis

• Outline how to onboard switches

• Describe distributed enterprise deployments

• Compare traditional campus networks to EVPNVXLAN campus fabrics

• Explain microsegmentation

• Outline the Juniper Mist EVPN Campus Fabric Wizard

12 Juniper Mist Wired Assurance—Management and Monitoring

• Define Day 2+ expectations

• Describe wired insights, SLEs, and monitoring

• Describe Marvis Actions for Juniper switches

Lab 3: Wired Assurance

Day 3

13 Juniper Mist Wireless Assurance—Day 0 Expectations

• Define Day 0 expectations

• Outline the configuration of sites, WLAN templates, WLANs, and VLANs

• Describe RF templates and device profiles

• Explain SSID strategies for 802.1X, portals, and BYOD

14 Juniper Mist Wireless Assurance—Deployment and Workflow

• Describe Day 1 expectations

• Define Juniper Access Points

• Describe how to onboard access points

• Outline Juniper Mist Wireless Assurance use cases

15 Juniper Mist Wireless Assurance—Management and Monitoring

• Define Day 2+ expectations

• Define Juniper Mist Wireless Assurance

• Describe wireless insights, SLEs, and monitoring

• Describe viewing clients

• Describe Marvis Actions for Juniper Aps

Lab 4: Wireless Assurance

16 Juniper Mist Location Services—Capabilities and Use Cases

• Describe the use cases for Location Services

• Outline Juniper Mist Location Service Devices

• Explain BLE

• Describe vBLE Engagement and virtual beacons

• Outline the features of Asset Visibility

• Explain Juniper Mist User Engagement

17 Juniper Mist Templatization, Variables, and Automation

• Define Juniper Mist templates

• Outline Wireless, Wired, and SD-WAN templating

• Describe Juniper Mist template deployment

• Describe Juniper Mist variables

18 Juniper Mist API

• Explain API concepts

• Describe the Juniper Mist RESTful API

• Describe the Juniper Mist WebSocket API

• Describe the Juniper Mist Webhooks API

19 Juniper Mist Documentation and Support

• Explain Juniper Mist documentation

• Outline how to create support tickets

• Explain feature requests

Lab 5: Troubleshooting and Juniper Mist Help



Course Overview

In this two-day course, Introduction to Cisco Secure Workload Firewall Operations and Administration, (CSWOPS) will familiarize you and help you understand how The Cisco Secure Workload Firewall Analytics™ platform enables efficient data center operations by providing pervasive visibility, behavior-based application insight and migration to a zero-trust model.

Course Objectives

Upon completing this course, the learner will be able to understand how Cisco Secure Workload Firewall Analytics™:

  • Enables pervasive visibility of traffic across datacenter infrastructure
  • Uses long term data retention for forensics and analysis
  • Creates communication and dependencies for all applications within the datacenter
  • Empowers companies to get to a whitelist policy model
  • Identifies behavior deviation in real time
  • Performs forensics operations

Course Content

Module 1: Cisco Secure Workload Firewall Overview

  • Defining and Positioning Cisco Cisco Secure Workload Firewall Analytics
  • Telemetry
  • Platform
  • Intent-Based Policy
  • Machine Learning
  • Network Performance Monitoring and other Use Cases

Module 2: Cisco Secure Workload Firewall Components

  • Architecture
  • Data Collection
  • Sensors and Agents
  • Flow Collectors
  • Analytics Engine
  • Open Access

Module 3: Operational Concepts

  • Scopes
  • Tenants
  • RBAC
  • Annotations

Module 4: Cisco Secure Workload Firewall Setup and Deployment Models

  • On Premise Options
  • SaaS
  • Cisco Secure Workload Firewall-V
  • Installation Procedure
  • Creating Scopes, Roles, and Users
  • Deploy Hardware Sensors
  • Deploy NetFlow Sensors
  • Deploy ERSPAN Sensors

Module 5: Software Agents

  • Software Agents Overview
  • Software Agents Features
  • Software Agents Configuration

Module 6: Application Dependency Mapping

  • Why ADM?
  • Cisco Secure Workload Firewall Application Insight
  • ADM Process
  • ADM Run Results

Module 7: Cisco Secure Workload Firewall Analytics Policy Enforcement Overview

Module 8: Cisco Secure Workload Firewall Flow Search

  • Results Filtered by Scope
  • Searching with Conjunctions
  • Flow Explore Integrated
  • User Annotations

Module 9: Cisco Secure Workload Firewall Policy Analysis

  • Enable Policy Analysis
  • Live Policy Analysis
  • Backdated Policy Experiments
  • Quick Policy Analysis

Module 10: Cisco Secure Workload Firewall Apps and API

  • App Store
  • User Apps
  • Visualize Data Sources
  • Bring your own Data
  • OpenAPI

Module 11: Cisco Secure Workload Firewall Ecosystem

  • Platform Integrations
    • ADCs
    • FW Management Tools
    • Phantom
    • InfoBlox
    • ServiceNow
    • Splunk
    • Turbonomic
    • Veeam
  • Corvil and Extra Hop

Lab Outline:

Labs are designed to assure learners a whole practical experience, through the following practical activities:

  • Lab 1: Exploring the GUI
  • Lab 2: Software Agent Installation
  • Lab 3: Application Dependency Mapping with Agents
  • Lab 4: Enforcement
  • Lab 5: Flow Search
  • Lab 6: Advanced ADM Run
  • Lab 7: Policy Analysis

Course Overview

The Introducing Cisco Cloud Consumer Security course gives you a technical overview of the basic concepts and components of the cloud. as well as the Cisco solutions that can be used to provide comprehensive security of a cloud-based environment. In this primarily lecture-based course, you’ll learn the basics from a cloud consumer perspective including securing cloud and Software as a Service (SaaS) application environments. This introductory course provides insights on using Cisco Stealthwatch Cloud, Cisco CloudLock, Cisco Umbrella and more to protect the user when using cloud-based applications.

Course Objectives

After completing this course you should be able to:

  • Describe public, private, and hybrid cloud models, concepts, and design
  • Explain the concepts and components for securing cloud environments
  • Describe Cisco security offerings for Amazon Web Services (AWS)
  • Define methods to secure SaaS application usage

Course Content

Introducing the Cloud

  • Describe the Evolution of Cloud Computing
  • Explain Cloud Service Models
  • Explore Cloud Deployment Models

Introducing Securing the Cloud

  • Describe the Cisco Threat-Centric Approach to Network Security
  • Describe Cloud Physical Environment Security
  • Describe Cloud Network Infrastructure Security
  • Explain Application Security
  • Explore Cloud Management and API Security
  • Describe Cisco Cloud-Based Security Solutions
  • Describe Network Functions Virtualization (NFV), Virtual Network Function (VNF), and Secure Agile Exchange (SAE)
  • Describe Cisco CloudCenter for MultiCloud Management
  • Describe Cisco Stealthwatch

Describing Cloud Security Solutions Using AWS

  • Identify AWS Security Offerings
  • Identify Cisco Security Solutions in AWS

Introducing Security in an SaaS Environment

  • Describe SaaS Applications
  • Describe SaaS Security Challenges
  • Explain Cloud Access Security Broker
  • Describe Cisco CloudLock
  • Describe OAuth and OAuth Attacks
  • Describe Cisco Advanced Malware Protection for Endpoints
  • Describe Cisco Cloud Email Security
  • Describe Cisco Umbrella

Labs

  • Explore Cisco Stealthwatch Cloud
  • Explore Stealthwatch Cloud Alerts Settings, Watchlists, and Sensors
  • Explore Cisco Security Solutions in AWS Marketplace
  • Explore the Cisco CloudLock Dashboard and User Security
  • Explore Cisco CloudLock Application and Data Security
  • Explore Cisco Advanced Malware Protection (AMP) Endpoints
  • Explore the Cisco Umbrella Roaming Client

Course Overview

As we’ve learned, Information Security is ultimately about protecting the assets most crucial to your business through preserving the Confidentiality, Integrity, and Availability of your information. In this 3-day course, IT professionals and security officers learn to assess and manage risk in their organization and plan for the unexpected.

Risk management includes recognizing the assets key to your business success, documenting known threats, and their likelihood, calculating the impact of a potential breach and implementing specific controls to avoid breaches or minimize the impact if any occur. Further, for those assets, you identify processes to recover from a breach, and explicitly recognize the remaining risk that you choose to accept. Business continuity and disaster recovery planning extends this by responding when the unexpected happens and preparing to continue conducting business as usual, and as quickly as possible with as little impact on day to day operations. When disaster strikes, how much will it affect your company? Your reputation? Your customers? In this course, you learn to identify and evaluate risk to your highest priority assets, and also how to design, implement, and maintain effective, risk treatment controls. This course is also helpful for those working toward industry certifications like CRISC, ABCP, CFCP, CBCI, Security+ or others.

Course Objectives

Students attending this course will:

Describe generalized risk management

lifecycle as starting point in organizational

discussions and how processes fit together

• Identify models/frameworks related

to Risk Management and Business

Continuity Planning/Disaster

Recovery Planning

• Paraphrase the process for business

impact analysis interviews and

calculating values

• Paraphrase the process for assessing and

analyzing risk scenarios quantitatively and

qualitatively

• Outline the contents expected in a Risk

Treatment Plan and BCP/DRP documents

• Participate in risk management

implementation audit

Describe the role of governance in managing

risk and compliance

• Describe management support and

identify team responsibilities. Create and

configure virtual machines in Azure

• Scope the current situation in terms

of documents to gather and questions

to ask

Describe the management requirements to

implement risk and resiliency strategy

• Recognize the scope of potential risk

response and BCP/DRP strategies

appropriate to level of risk

• Categorize investment requirements

Discuss requirements and proposals with

security professional

Begin to prepare for various security-related

certification exams or a security lead positon

Course Content

Module 1: Mapping risk management and

continuity planning to your business • Describe risk management

• Discuss the relationship between security, business continuity management and risk management

• Define risk terms

• Describe the risk equation

• Define the key words relating to BCP/DRP

• Position resiliency in your management strategy

• Describe the types of response strategies

• Describe the role of governance in managing risk and compliance

Module 2: Making the case for risk management

and business continuity planning • Discuss the importance of risk management and the need for BCP/DRP in any environment

• List business considerations and drivers for risk management and business continuity planning

• Determine which drivers apply to your environment

Module 3: Managing risk as a process • Describe the purpose of frameworks, reference models, standards

• List possible risk management models or frameworks as your guide

• Compare BCP/DRP frameworks for your environment

• Describe the lifecycle of risk management

• Distinguish between risk assessment, risk analysis, and business impact analysis

• Promote the ongoing need for training and plan updates

• Define the activities involved in managing risk

• List responsibilities and potential members for a risk management team

• Define the activities involved in developing and maintaining a BCP/DRP

• List responsibilities and potential members for a BCP team

• Describe elements of a proposal for board approval

• Identify stakeholders and their concerns

Module 4: Analyzing business impact:

where to focus • List detailed steps to conduct a business impact analysis project

• Describe steps to conduct interviews to gather data

• Describe how to increase success with BIA interviewing

• Define analytical terms for business impact and recovery requirements

• Explain the process to calculate and document recovery requirements for your critical business functions

Module 5: Assessing risk: what threats and

vulnerabilities exist • List the requirements of a risk assessment team

• Describe how to select assessment targets based on BIA

• Outline the steps in a risk assessment project

• Define the scope of an assessment

• Identify what goes into a plan for examination activities (interviews and vulnerability scanning)

• Compare data gathering methods

• Compare risk assessment methods and tools

• List expectations for documenting assessment results

• List steps to mitigate risks of being a risk assessor

Module 6: Analyzing risks: how much it’s worth • Compare quantitative and qualitative risk analysis

• Describe methods to calculate quantitative risk

• Define probability classes

Module 7: Documenting risk treatment plans: how

to protect assets • Define risk management strategies

• Describe how to select risk treatment plans (physical, technical, social) appropriate to analysis results

• Describe the importance of documenting a policy to review risk management needs

Course data sheet

Follow us:

Module 8: Planning for resiliency: how to continue

your business

• List the sections of a Business Continuity Plan document

• Describe the BCP’s underlying plans

• List other BC-related plans and their contents

• Position the Disaster Recovery Plan with respect to the BCP

• List key elements for a Disaster Recovery plan

• Compare Disaster Recovery strategies for your company

• Compare levels of redundancy and retention

• Identify roles and responsibilities for recovery teams

• Optimize distribution and utility of documents

Module 9: Implement risk treatment plan • Integrate the project requirements across risk, BCP, and DRP plans

• Follow project management best practices to implement plans for risk treatment across the organization

• Describe the steps to take during a security incident

• List the elements of a security incident report

• Identify what constitutes an incident

• Describe the process to collect evidence related to an incident

Module 10: Failing back • Discuss what happens when you’re ready to go back

• Evaluate the opportunity to upgrade business effectiveness and/or resiliency

• Describe the steps

Module 11: Auditing risk management

implementation and testing BCP procedures

• Differentiate between an audit and an assessment

• Define the characteristics of an audit

• Describe when an audit may be applicable

• Predict evidence requested during an audit process

• Compare risk management audit, compliance audit, and BCP testing

• Describe the levels of testing for BCP/DRP plans

Module 12: Summary and case study • Test your knowledge

• Given sufficient detail, design an appropriate risk strategy

Module 13: Business continuity

planning—Next steps

• Ask the right questions to determine where your company currently stands

• Champion the need for Business Continuity Planning with your management

• Determine how much help you need and get it

Course Overview

Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when it is needed.

This module Information Security Management Professional based on ISO/IEC 27001 tests understanding of the organizational, physical and technical aspects of information security.

Course Objectives

  • Perspectives in Information Security: Business, Customer, Service Provider/Supplier (10%).
  • Risk Management: Analysis, Controls, Remaining Risks (30%).
  • Information Security Controls: Organizational, Technical, Physical (60%).

Course Content

Information security perspectives: the perspectives of the business, the customer, and the service provider
Risk Management: Analysis of the risks, choosing controls, dealing with remaining risks
Information security controls: Organizational, technical and physical controls

Course Overview

Information security is becoming more and more important. The globalisation of the economy leads to an increasing exchange of information between organisations (employees, customers and suppliers), an increasing use of networks, such as the internal company network, the interconnection with networks of other companies and the Internet. Moreover, the activities of many companies now depend on ICT, with information becoming a valuable business asset.

Information security is essential to ensure the proper functioning and continuity of the organisation: information must be reliable.This Information Security Foundation based on ISO IEC 27001 course provide you all knowledge for the EXIN Information Security Foundation and is a relevant certification for all professionals who work with confidential information. It tests the understanding of concepts and value of information security as well as the threats and risks.

Course Objectives

– Information and Security
– Threats and risks
– Approach and Organisation
– Actions
– Law and Regulations
– Examination training

Course Content

  • Information and security
  • Threats and risks
  • Approach and organization
  • Measures
  • Legislation and regulation

Course Overview

Previously known as “Core DDI Advanced Troubleshooting (CDAT)”. Troubleshoot the Infoblox Grid and HA (high availability) pairs. Study common root cause analysis and resolution strategies and techniques for network connectivity and DNS and DHCP issues. Use a case-study approach to apply your learnings to real-life failure scenarios and recovery methods.

Course Content

  • Troubleshooting Basics in NIOS
  • DNS Troubleshooting Methodology
  • DHCP Troubleshooting Methodology
  • Describing DHCPv4 Failover
  • Troubleshooting DHCPv4 Failover in NIOS


Course Overview

NIOS DDI OPERATOR Learn the fundamentals of the NIOS Grid and how to navigate the Grid Manager UI. Build a working knowledge of operator-level responsibilities in the NIOS Grid including the operation of DHCP services, DNS services and IPAM. Get hands-on experience with managing DHCP Objects and DNS Resource Records and using Extensible Attributes, Smart Folders, Global Search, DNS Views, and CSV Export functionality. Understand how DHCP Failover works.

NIOS DDI ADMINISTRATOR – Build a working knowledge of administrator-level responsibilities in NIOS including managing NIOS Grid Members and understanding NTP Statistics. Learn the steps to complete the most executed DHCP, DNS, and IPAM configuration tasks in NIOS. Understand critical NIOS workflows including Approvals, CSV Import, and Remote Authentication.

Course Content

NIOS DDI OPERATOR
• NIOS Grid Overview
• Using the NIOS Grid Manager UI
• NIOS DHCP Service Overview
• Managing NIOS DHCP Objects
• Using NIOS Extensible Attributes and Smart Folders
• NIOS DNS Service Overview
• Managing NIOS DNS Resource Records
• Using NIOS IP Address Management (IPAM) and Global Search
• Using NIOS DNS Views
• NIOS DHCP Failover Overview
• Using NIOS CSV Export

NIOS DDI ADMINISTRATOR
• Managing NIOS Grid Members
• Explaining NTP Statistics in NIOS
• Configuring NIOS DHCP Service and Properties
• Configuring NIOS Extensible Attributes (EA) and Smart Folders
• Configuring NIOS Administrator Accounts and Permissions
• Configuring NIOS Scheduled Tasks
• Configuring NIOS Approval Workflows
• Configuring NIOS DNS Services
• Configuring NIOS IPAM and Discovery
• Using NIOS CSV Import
• Configuring NIOS DNS Anycast
• Configuring NIOS DNS Views
• Configuring NIOS Remote Authentication
• Configuring NIOS DHCPv4 Failover
• Configuring NIOS DNS Zones
• Configuring NIOS DHCP Networks and Filters

Exam not included.

Course Overview

The Implementing Secure Solutions with Virtual Private Networks (SVPN) course teaches you how to implement, configure, monitor, and support enterprise Virtual Private Network (VPN) solutions. Through a combination of lessons and hands-on experiences you will acquire the knowledge and skills to deploy and troubleshoot traditional Internet Protocol Security (IPsec), Dynamic Multipoint Virtual Private Network (DMVPN), FlexVPN, and remote access VPN to create secure and encrypted data, remote accessibility, and increased privacy.

Course Objectives

After completing this course you should be able to:

  • Introduce site-to-site VPN options available on Cisco router and firewalls
  • Introduce remote access VPN options available on Cisco router and firewalls
  • Review site-to-site and remote access VPN design options
  • Review troubleshooting processes for various VPN options available on Cisco router and firewalls

Course Content

Introducing VPN Technology Fundamentals

  • Role of VPNs in Network Security
  • VPNs and Cryptography

Implementing Site-to-Site VPN Solutions

  • Site-to-Site VPN Solutions Overview
  • Cisco IOS VPN Point-to-Point Solutions
  • Cisco ASA VPN Point-to-Point Solutions
  • Cisco IOS VTI Point-to-Point Solutions
  • Cisco DMVPN Solutions

Implementing Cisco Internetwork Operating System (Cisco IOS®) Site-to-Site FlexVPN Solutions

  • Overview of the Cisco FlexVPN Solution
  • Point-to-Point FlexVPN
  • Hub-and-Spoke FlexVPN
  • Spoke-to-Spoke FlexVPN

Implement Cisco IOS Group Encrypted Transport (GET) VPN Solutions

  • Overview of Cisco GET VPN Solution
  • Configure GET VPN

Implementing Cisco AnyConnect VPNs

  • Remote Access Overview
  • Design Remote Access Solutions
  • Basic Cisco AnyConnect VPN on Cisco ASA
  • Advanced Cisco AnyConnect TLS VPN on Cisco ASA
  • Advanced AAA in Cisco AnyConnect VPNs
  • Cisco AnyConnect IKEv2 VPNs

Implementing Clientless VPNs

  • Remote Access Overview
  • Design Remote Access Solutions
  • Clientless TLS VPN Overview
  • Basic Cisco AnyConnect TLS VPN on Cisco ASA
  • Application Access in Cisco ASA Clientless VPN
  • Advanced AAA in Clientless VPN

Labs

  • Discovery Lab 1: Explore IPsec Technologies
  • Discovery Lab 2: Implement and Verify Cisco IOS Point-to-Point VPN
  • Discovery Lab 3: Implement and Verify Cisco ASA Point-to-Point VPN
  • Discovery Lab 4: Implement and Verify Cisco IOS VTI VPN
  • Discovery Lab 5: Implement and Verify DMVPN
  • Discovery Lab 6: Troubleshoot DMVPN
  • Discovery Lab 7: Implement and Verify FlexVPN with Smart Defaults
  • Discovery Lab 8: Implement and Verify Point-to-Point FlexVPN
  • Discovery Lab 9: Implement and Verify Hub and Spoke FlexVPN
  • Discovery Lab 10: Implement and Verify Spoke-to-Spoke FlexVPN
  • Discovery Lab 11: Troubleshoot Cisco IOS FlexVPN
  • Discovery Lab 12: Implement and Verify AnyConnect TLS VPN on ASA
  • Discovery Lab 13: Implement and Verify AAA on AnyConnect VPN
  • Discovery Lab 14: Implement and Verify Clientless VPN on ASA