Security, Professional (JNCIP-SEC)
Overview

The Enterprise Routing and Switching track enables you to demonstrate competence with networking technology in general and Juniper Networks enterprise routing and switching platforms. JNCIE-ENT is at the pinnacle of the enterprise routing and switching certification track. The practical exam is designed to validate your ability to deploy, configure, manage and troubleshoot Junos-based enterprise routing and switching platforms.

Throughout the 6-hour exam, you will build an enterprise network infrastructure consisting of multiple routers and switching devices. You will perform system configuration on all devices and configure protocols and features, such as IGPs, BGP, EVPN, Layer 2 features, routing policies, and class of service.

$500

Description

Course Summary
JNCIP-SEC-TOPICS
Here’s a high-level view of the skillset required to successfully complete the JNCIP-SEC certification exam.
  • Describe the concepts, operation, or functionality of firewall filters:
    • Selective packet processing
    • Troubleshooting with firewall filters
    • Filter-based forwarding
  • Given a scenario, demonstrate how to configure, troubleshoot, or monitor firewall filters:
    • Troubleshooting Security Policy and Zones
    • Tools
      • Logging/tracing
      • Other outputs
  • Describe the concepts, operation, or functionality of Juniper Advanced Threat Prevention (on-premises appliance or Cloud-based service):
    • Collectors
    • Custom rules
    • Mitigation
  • Given a scenario, demonstrate how to configure or monitor Juniper Advanced Threat Prevention.
  • Describe the concepts, operation, or functionality of edge security features:
    • Hardware support
    • Security Intelligence (SecIntel)
    • Intrusion prevention system (IPS)
    • Corero DDoS Mitigation
    • Advanced threat prevention (ATP)
  • Describe the concepts or operation of security compliance:
    • Role-based access control (RBAC)
    • Junos Space® Security Director
    • Authentication, Authorization, and Accounting (AAA) and Security Assertion Markup Language (SAML) integration
  • Describe the concepts, operation, or functionality of threat mitigation:
    • Malware identification or mitigation
    • Malicious lateral traffic identification or mitigation
    • Zero trust microsegmentation
  • Given a scenario, demonstrate how to configure or monitor threat mitigation.
  • Describe the concepts, operation, or functionality of the logical systems:
    • Administrative roles
    • Security profiles
    • Logical systems (LSYS) communication
  • Describe the concepts, operation, or functionality of the tenant systems:
    • Master and tenant admins
    • Tenant systems (TSYS) capacity
  • Describe the concepts, operation, or functionality of Layer 2 security:
    • Transparent mode
    • Mixed mode
    • Secure wire
    • Media Access Control Security (MACsec)
  • Given a scenario, demonstrate how to configure or monitor Layer 2 security.
  • Describe the concepts, operation, or functionality of advanced NAT functionality:
    • Persistent NAT
    • Domain name system (DNS) doctoring
    • IPv6 NAT
  • Given a scenario, demonstrate how to configure, troubleshoot, or monitor advanced NAT scenarios.
  • Describe the concepts, operation, or functionality of advanced IPsec applications:
    • Remote access VPNs
    • Hub-and-spoke VPNs
    • Public Key Infrastructure (PKI)
    • Auto Discovery VPNs (ADVPNs)
    • Routing with IPsec
    • Overlapping IP addresses
    • Dynamic gateways
    • IPsec class of service (CoS)
  • Given a scenario, demonstrate how to configure, troubleshoot, or monitor advanced IPsec functionality.
Schedule & Pricing

Please write to us at [email protected] for the price and upcoming schedule.

+91 7710910003

What Our Customers Say