Over

155,000

Africa & Middle East

7Days 10.00 A.M - 10.00 P.M

Call us

Enquire Now

Junos Intrusion prevention System Functionality (JIPS)

Course Objectives

  • Describe general types of intrusions and network penetration steps.
  • Describe how to access the SRX Series Services Gateways with IPS functionality for configuration and management.
  • Configure the SRX Series Services Gateways for IPS functionality.
  • Define and describe terminology which comprises Juniper Networks IPS functionality.
  • Describe the steps that the IPS engine takes when inspecting packets.
  • Describe the components of IPS rules and rulebases.
  • Explain the types of signature-based attacks.
  • Describe the uses of custom signatures and how to configure them.
  • Explain how scanning can be used to gather information about target networks.
  • Configure screens to block various scan types.
  • Describe commonly used evasion techniques and how to block them.
  • Describe denial of service (DoS) and distributed denial of service (DDoS) attacks.
  • Explain the mechanisms available on the SRX Series device to detect and block DoS and DDoS attacks.
  • Configure screens to block DoS and DDoS attacks.
  • Describe the reporting capabilities available for IPS functionality.
  • Explain the terms and concepts related to intrusion prevention.
  • Describe the basic functions and features available on the SRX Series platform that provide IPS functionality.
  • Configure fundamental IPS features and functions on an SRX240 device.

Course Objectives

  • Describe general types of intrusions and network penetration steps.
  • Describe how to access the SRX Series Services Gateways with IPS functionality for configuration and management.
  • Configure the SRX Series Services Gateways for IPS functionality.
  • Define and describe terminology which comprises Juniper Networks IPS functionality.
  • Describe the steps that the IPS engine takes when inspecting packets.
  • Describe the components of IPS rules and rulebases.
  • Explain the types of signature-based attacks.
  • Describe the uses of custom signatures and how to configure them.
  • Explain how scanning can be used to gather information about target networks.
  • Configure screens to block various scan types.
  • Describe commonly used evasion techniques and how to block them.
  • Describe denial of service (DoS) and distributed denial of service (DDoS) attacks.
  • Explain the mechanisms available on the SRX Series device to detect and block DoS and DDoS attacks.
  • Configure screens to block DoS and DDoS attacks.
  • Describe the reporting capabilities available for IPS functionality.
  • Explain the terms and concepts related to intrusion prevention.
  • Describe the basic functions and features available on the SRX Series platform that provide IPS functionality.
  • Configure fundamental IPS features and functions on an SRX240 device.

APPLY TO COURSE

Sum the simple Operation :
3 + 14 =