Network Security
Call 1-800-868-4858
  Implementing Juniper Networks Secure Analytics (IJSA)    
  Course Fees: $2250 ( Training Credits Accepted )  
  Course Duration: 3 Days  
  Course Code: EDU-JUN-IJSA  
  Course Schedule: Click for Schedule and Registrationschd  
  Juniper Certification:    

Course Overview

This three-day course discusses the configuration of Juniper Networks JSA Series Secure Analytics (formerly known as Security Threat Response Manager [STRM]) in a typical network environment. Key topics include deploying a JSA Series device in the network, configuring flows, running reports, and troubleshooting.

Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting the JSA Series device. This course uses the Juniper Networks Secure Analytics JSA VM virtual appliance for the hands-on component. This course is based on JSA software 2014.2R4

Intended Audience

This course is intended for network engineers, support personnel, reseller support, and anyone responsible for implementing the JSA system.

Course Level

Implementing Juniper Networks Secure Analytics is an introductory-level course.


This course assumes that students have basic networking knowledge and experience in the following areas:

  • Understanding of TCP/IP operation;
  • Understanding of network security concepts; and
  • Experience in network security administration.

Course Contents

Day 1

Chapter 1: Course Introduction

Chapter 2: Product Overview

  • Overview of the JSA Series Device
  • Hardware
  • Collection
  • Operational Flow

Chapter 3: Initial Configuration

  • A New Installation
  • Administration Console
  • Platform Configuration
  • Deployment Editor
  • Lab 1: Initial Configuration

Chapter 4: Architecture

  • Processing Log Activity
  • Processing Network Activity
  • JSA Deployment Options

Chapter 5: Log Activity

  • Log Activity Overview
  • Configuring Log Activity
  • Lab 2: Log Activity

Day 2

Chapter 6: Network Activity

  • Network Activity Overview
  • Configuring Network Activity
  • Lab 3: Network Activity

Chapter 7: Assets and Vulnerability Assessment

  • Asset Interface
  • Vulnerability Assessment
  • Vulnerability Scanners
  • Lab 4: Assets and Vulnerability Assessment

Chapter 8: Rules

  • Rules
  • Configure Rules and Building Blocks
  • Lab 5: Rules

Chapter 9: Offense Manager

  • Offense Manager
  • Offense Manager Configuration
  • Offense Investigation
  • Lab 6: Configure the Offense Manager

Day 3

Chapter 10: JSA Reporting

  • Reporting Functionality
  • Reporting Interface
  • Lab 7: Reporting

Chapter 11: Basic Tuning and Troubleshooting

  • Basic Tuning
  • Troubleshooting

Chapter 12: Configuring Junos Devices for Use with JSA

  • Collecting Junos Events
  • Collecting Junos Flows
  • Lab 8: Configuring Junos Devices for JSA

Appendix A: High Availability

  • High Availability
  • Configuring High Availability



juniper schedule





Copy Right (c) 2018 Cosmos Security Center Inc.
The leading Juniper, CISSP, Check Point Training Center
Juniper Training :: CISSP Training :: CheckPoint Training
Juniper SRX Security Training, Juniper Routing & Switching Training,