Cisco-training

Insoft Services is een van de weinige aanbieders van opleidingen in EMEAR tot een volledige reeks van Cisco-certificering en gespecialiseerde technische opleiding aan te bieden.

Lees meer

Cisco-certificering

Ervaar een blended learning-aanpak die het beste van door een instructeur geleide training en e-learning in eigen tempo combineert om u te helpen zich voor te bereiden op uw certificeringsexamen.

Lees meer

Cisco Learning Credits

Cisco Learning Credits (CLCs) zijn prepaid trainingsvouchers die rechtstreeks bij Cisco worden ingewisseld en die het plannen van uw succes eenvoudiger maken bij de aankoop van Cisco-producten en -services.

Lees meer

Cisco Continuing Education

Het Cisco Continuing Education Program biedt alle actieve certificeringshouders flexibele opties om opnieuw te certificeren door een verscheidenheid aan in aanmerking komende trainingsitems te voltooien.

Lees meer

Cisco Digital Learning

Gecertificeerde medewerkers zijn GEWAARDEERDE activa. Verken de officiële Digital Learning Library van Cisco om uzelf te informeren via opgenomen sessies.

Lees meer

Cisco Business Enablement

Het Cisco Business Enablement Partner Program richt zich op het aanscherpen van de zakelijke vaardigheden van Cisco Channel Partners en klanten.

Lees meer

Cisco trainingscatalogus

Het Cisco Business Enablement Partner Program richt zich op het aanscherpen van de zakelijke vaardigheden van Cisco Channel Partners en klanten.

Lees meer

Fortinet-certificering

Het Fortinet Network Security Expert (NSE) -programma is een training- en certificeringsprogramma op acht niveaus om ingenieurs van hun netwerkbeveiliging te leren voor Fortinet FW-vaardigheden en -ervaring.

Technische trainingen

Fortinet-training

Insoft is erkend als Fortinet Authorized Training Center op geselecteerde locaties in EMEA.

Lees meer

Fortinet trainingscatalogus

Bekijk de volledige Fortinet trainingscatalogus. Het programma omvat een breed scala aan cursussen in eigen tempo en onder leiding van een instructeur.

Lees meer

ATC Status

Bekijk onze ATC-status in geselecteerde landen in Europa.

Lees meer

Fortinet Professionele Services

Wereldwijd erkend team van gecertificeerde experts helpt u een soepelere overgang te maken met onze vooraf gedefinieerde consultancy-, installatie- en migratiepakketten voor een breed scala aan Fortinet-producten.

Lees meer

Microsoft-training

Insoft Services biedt Microsoft-trainingen in EMEAR. We bieden technische trainingen en certificeringscursussen van Microsoft aan die worden geleid door instructeurs van wereldklasse.

Technische cursussen

Extreme-training

Find all the Extreme Networks online and instructor led class room based calendar here.

Technische cursussen

Technische-certificering

We provide comprehensive curriculum of technical competency skills on the certification accomplishment.

Lees meer

Extreme trainingscatalogus

Leer uitzonderlijke kennis en vaardigheden van Extreme Networks

Lees meer

ATP accreditatie

Als geautoriseerde trainingspartner (ATP) zorgt Insoft Services ervoor dat u de hoogste onderwijsnormen krijgt die beschikbaar zijn.

Lees meer

Services Oplossingen

Wij bieden innovatieve en geavanceerde ondersteuning bij het ontwerpen, implementeren en optimaliseren van IT-oplossingen.Ons klantenbestand omvat enkele van de grootste Telco's ter wereld.

Oplossingen

Wereldwijd erkend team van gecertificeerde experts helpt u een soepelere overgang te maken met onze vooraf gedefinieerde consultancy-, installatie- en migratiepakketten voor een breed scala aan Fortinet-producten.

Over ons

Insoft biedt geautoriseerde trainings- en consultancydiensten voor geselecteerde IP-leveranciers. Ontdek hoe we een revolutie teweegbrengen in de industrie.

Lees meer
  • +31 71 799 6230
  • You can unsubscribe from these communications at any time. For more information please review our Privacy Policy. By clicking 'Send Message' below, you consent to allow Insoft Services to store and process the personal information submitted above to provide you with the content requested.

    JSPES – Juniper Service Provider Edge Security

    Duration
    3 Dagen
    Delivery
    (Online and onsite)
    Price
    Price Upon Request

    This three-day course discusses edge security concepts for the service provider network. It discusses security for 5G networks on the main GPRS interfaces. Key topics include deploying an SRX Series device in different parts of the service provider network, implementing carrier-grade NAT, distributed denial of service (DDoS), malware inspection, command-and-control (C&C) prevention, IPsec tunnels, 5G security, control plane hardening, and BGP hardening. Additional topics include deploying MX-SPC3 card, configuring and verifying IPsec VPNs, and carrier-grade NAT, with unified services framework on MX Series platforms.

     

    Students will gain experience in configuring, testing, and troubleshooting Junos OS through demonstrations and hands-on labs. This course is based on Junos OS 21.1R1.11.

    • Define the general security architecture for 4G and 5G networks.
    • Configure data plane security protections.
    • Explain DoS and DDoS attacks.
    • Describe BGP flowspec in protecting against DDoS attacks.
    • Explain the Corero solution for DDoS attacks.
    • Describe the use of stateful firewalls.
    • Explain the use of ALGs in stateful security firewalls.
    • Explain how to secure BGP on Junos devices.
    • Describe how to use IPsec to secure traffic.
    • Explain the new Internet of Things (IoT) threat to networks.
    • Describe AutoVPN IPsec architectures.
    • Explain the use and configuration of carrier-grade NAT on SRX devices.

     

    Additional objectives for self-study:

    • Describe SPC3 for MX Series platforms.
    • Configure and verify IPsec VPN with unified services framework using MX-SPC3.
    • Configure and verify carrier-grade NAT with MX-SPC3.
    • Troubleshoot some common issues with MX-SPC3.

    DAY 1

    1. Course Introduction

     

    2. Security Challenges for Service Providers

    • Describe limitations of security devices
    • Describe BGP security threats
    • Describe DDoS attack threats
    • Explain IP address depletion challenges
    • Describe 5G security challenges

     

    3. Juniper Networks Solutions for Service Providers

    • Describe Juniper Networks’ security solutions for the service provider challenges

     

    4. Stateful Firewalls

    • Describe stateless firewall filters
    • Describe stateful firewall policies
    • Describe screens and ALGs
    • Explain asymmetrical routing

     

    Lab 1: Configure stateful firewalls

     

    5. 5G Architecture

    • Describe security insertion points
    • Describe 5G network evolution

     

    6. DDoS Protection

    • Explain DDoS history and common protections
    • Describe SRX DDoS protection
    • Describe BGP flowspec
    • Describe Corero with MX DDoS protection

    Lab 2: DDoS Protection

     

    DAY 2

    7. Carrier-Grade NAT

    • Explain IPv4 address exhaustion
    • Describe source NAT
    • Describe CGNAT
    • Describe NAT64

     

    Lab 3: CGNAT

     

    8. Juniper Connected Security for Service Providers

    • Describe SecIntel security
    • Describe a use case for IoT protection
    • Explain Encrypted Traffic Insights

     

    Lab 4: Implementing Juniper Connected Security

     

    9. IPsec Overview

    • Describe the IPsec and IKE protocols
    • Configure site-to-site IPsec VPNs
    • Describe and configure Proxy IDs and Traffic selectors
    • Monitor site-to-site IPsec VPNs
    • Describe IPsec use with gNodeB devices

     

    Lab 5: Implementing IPsec VPN

     

    10. Scaling IPsec

    • Describe and implement PKI certificates in Junos OS
    • Describe AutoVPN
    • Describe SecGW firewall use case for scaling IPsec

     

    Lab 6: Configuring AutoVPN

     

    DAY 3

    11. GPRS and GTP

    • Describe how to secure GTP tunnels
    • Describe the GPRS protocol
    • Describe the GTP
    • Explain how Roaming Firewall secures GTP

     

    12. SCTP

    • Describe the SCTP Protocol

     

    13. Securing the Control Plane

    • Explain how to secure the control plane on Junos devices
    • Describe how the loopback filter works to secure the control plane
    • Explain how to protect the control plane from DDoS attacks
    • Describe how to secure the IGP against attacks

     

    Lab 7: Configure Control Plane Protections

     

    14. Securing the BGP Protocol

    • Describe how to secure the BGP
    • Describe BGP security features
    • Describe BGP dampening

     

    Lab 8: Configure BGP protections

     

    SELF-STUDY MODULES

    15. SPC3 for MX Series Platforms

    • Identify the main components of SPC3
    • Describe the unified services framework

     

    16. IPsec VPN with SPC3 on MX Series Platforms

    • Describe USF for IPsec
    • Provide configuration and verification examples for the IPsec P2P mode
    • Provide configuration and verification examples for the IPsec Traffic Selector mode
    • Describe the software architecture of MX-SPC3
    • Describe PowerMode IPsec
    • Describe Fat Core
    • Describe the unified services framework

     

    17. CGNAT with SPC3 on MX Series Platforms

    • Describe carrier-grade NAT coverage on Juniper MX Series
    • Configure and verify NAT for Next-Gen Services

     

    18. Troubleshooting MX-SPC3

    • Describe some common problems and solutions related to MX-SPC3

    Individuals responsible for implementing, monitoring, and troubleshooting Juniper security components

    • TCP/IP networking and security knowledge
    • Introduction to Juniper Security course, or equivalent knowledge

    This three-day course discusses edge security concepts for the service provider network. It discusses security for 5G networks on the main GPRS interfaces. Key topics include deploying an SRX Series device in different parts of the service provider network, implementing carrier-grade NAT, distributed denial of service (DDoS), malware inspection, command-and-control (C&C) prevention, IPsec tunnels, 5G security, control plane hardening, and BGP hardening. Additional topics include deploying MX-SPC3 card, configuring and verifying IPsec VPNs, and carrier-grade NAT, with unified services framework on MX Series platforms.

     

    Students will gain experience in configuring, testing, and troubleshooting Junos OS through demonstrations and hands-on labs. This course is based on Junos OS 21.1R1.11.

    • Define the general security architecture for 4G and 5G networks.
    • Configure data plane security protections.
    • Explain DoS and DDoS attacks.
    • Describe BGP flowspec in protecting against DDoS attacks.
    • Explain the Corero solution for DDoS attacks.
    • Describe the use of stateful firewalls.
    • Explain the use of ALGs in stateful security firewalls.
    • Explain how to secure BGP on Junos devices.
    • Describe how to use IPsec to secure traffic.
    • Explain the new Internet of Things (IoT) threat to networks.
    • Describe AutoVPN IPsec architectures.
    • Explain the use and configuration of carrier-grade NAT on SRX devices.

     

    Additional objectives for self-study:

    • Describe SPC3 for MX Series platforms.
    • Configure and verify IPsec VPN with unified services framework using MX-SPC3.
    • Configure and verify carrier-grade NAT with MX-SPC3.
    • Troubleshoot some common issues with MX-SPC3.

    DAY 1

    1. Course Introduction

     

    2. Security Challenges for Service Providers

    • Describe limitations of security devices
    • Describe BGP security threats
    • Describe DDoS attack threats
    • Explain IP address depletion challenges
    • Describe 5G security challenges

     

    3. Juniper Networks Solutions for Service Providers

    • Describe Juniper Networks’ security solutions for the service provider challenges

     

    4. Stateful Firewalls

    • Describe stateless firewall filters
    • Describe stateful firewall policies
    • Describe screens and ALGs
    • Explain asymmetrical routing

     

    Lab 1: Configure stateful firewalls

     

    5. 5G Architecture

    • Describe security insertion points
    • Describe 5G network evolution

     

    6. DDoS Protection

    • Explain DDoS history and common protections
    • Describe SRX DDoS protection
    • Describe BGP flowspec
    • Describe Corero with MX DDoS protection

    Lab 2: DDoS Protection

     

    DAY 2

    7. Carrier-Grade NAT

    • Explain IPv4 address exhaustion
    • Describe source NAT
    • Describe CGNAT
    • Describe NAT64

     

    Lab 3: CGNAT

     

    8. Juniper Connected Security for Service Providers

    • Describe SecIntel security
    • Describe a use case for IoT protection
    • Explain Encrypted Traffic Insights

     

    Lab 4: Implementing Juniper Connected Security

     

    9. IPsec Overview

    • Describe the IPsec and IKE protocols
    • Configure site-to-site IPsec VPNs
    • Describe and configure Proxy IDs and Traffic selectors
    • Monitor site-to-site IPsec VPNs
    • Describe IPsec use with gNodeB devices

     

    Lab 5: Implementing IPsec VPN

     

    10. Scaling IPsec

    • Describe and implement PKI certificates in Junos OS
    • Describe AutoVPN
    • Describe SecGW firewall use case for scaling IPsec

     

    Lab 6: Configuring AutoVPN

     

    DAY 3

    11. GPRS and GTP

    • Describe how to secure GTP tunnels
    • Describe the GPRS protocol
    • Describe the GTP
    • Explain how Roaming Firewall secures GTP

     

    12. SCTP

    • Describe the SCTP Protocol

     

    13. Securing the Control Plane

    • Explain how to secure the control plane on Junos devices
    • Describe how the loopback filter works to secure the control plane
    • Explain how to protect the control plane from DDoS attacks
    • Describe how to secure the IGP against attacks

     

    Lab 7: Configure Control Plane Protections

     

    14. Securing the BGP Protocol

    • Describe how to secure the BGP
    • Describe BGP security features
    • Describe BGP dampening

     

    Lab 8: Configure BGP protections

     

    SELF-STUDY MODULES

    15. SPC3 for MX Series Platforms

    • Identify the main components of SPC3
    • Describe the unified services framework

     

    16. IPsec VPN with SPC3 on MX Series Platforms

    • Describe USF for IPsec
    • Provide configuration and verification examples for the IPsec P2P mode
    • Provide configuration and verification examples for the IPsec Traffic Selector mode
    • Describe the software architecture of MX-SPC3
    • Describe PowerMode IPsec
    • Describe Fat Core
    • Describe the unified services framework

     

    17. CGNAT with SPC3 on MX Series Platforms

    • Describe carrier-grade NAT coverage on Juniper MX Series
    • Configure and verify NAT for Next-Gen Services

     

    18. Troubleshooting MX-SPC3

    • Describe some common problems and solutions related to MX-SPC3

    Individuals responsible for implementing, monitoring, and troubleshooting Juniper security components

    • TCP/IP networking and security knowledge
    • Introduction to Juniper Security course, or equivalent knowledge
      Datum op aanvraag

    Follow Up Courses

    Filter
    • 2 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 4 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 5 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 2 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 4 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 1 Dag
      Datum op aanvraag
      Price on Request
      Book Now
    • 2 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 3 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 3 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 4 Dagen
      Datum op aanvraag
      Price on Request
      Book Now

    Know someone who´d be interested in this course?
    Let them know...

    Use the hashtag #InsoftLearning to talk about this course and find students like you on social media.