Configuring Juniper Networks Secure Access (CJSA)

Level:
Costs:
Total time:
Provider rating: 10 Perpetual Solutions has an average rating of 10 (out of 1 reviews)
Logo Perpetual Solutions

Tip: Receive more information about the programme, starting dates & price. Or request a proposal from multiple providers for in-house training.

Overview

Your experience of this course?

Did you attend the course Configuring Juniper Networks Secure Access (CJSA) at Perpetual Solutions? Help other people by submitting your review at Springest!

Springest will donate £1.- to the Edukans Foundation as a thank you for each review

 
Schedule:
Daytime
Run time:
2 days
Location type:
Open

completion, maximum participants, and starting dateplaces are unknown for this course.

Prerequisites:

This course assumes that students have moderate background in internetworking basics, security concepts, network administration, and application support.

Course Description:

This two-day course discusses the configuration of Secure Access (SA) products in a typical network environment. Key topics include SSL access technologies, basic implementation, and configuration and management options. Through demonstrations and hands on labs, students will gain experience in configuring, testing, and troubleshooting basic facets of the SA products.

Course Objectives

By the end of this course, students will understand the implementation of the SA product to support common environments.

Who Sho…

Read the complete description

Description

Prerequisites:

This course assumes that students have moderate background in internetworking basics, security concepts, network administration, and application support.

Course Description:

This two-day course discusses the configuration of Secure Access (SA) products in a typical network environment. Key topics include SSL access technologies, basic implementation, and configuration and management options. Through demonstrations and hands on labs, students will gain experience in configuring, testing, and troubleshooting basic facets of the SA products.

Course Objectives

By the end of this course, students will understand the implementation of the SA product to support common environments.

Who Should Attend

Network engineers, support personnel, reseller support, and anyone responsible for implementing SA products.

This course includes the following modules:

Course Content

  • Introduction to the SA platform
  • SA Terminology
  • Introduction to SSL and Public Key Infrastructure
  • Roles
  • Typical deployment scenarios
  • Role Restrictions
  • Realms
  • Resource Policies
  • Sign-in Policies
  • Authentication Servers
  • Local
  • LDAP
  • RADIUS (includeing two-factor)
  • NT
  • NIS
  • Authentication Policies
  • Host Checker
  • Cache Cleaner
  • Client/Server Support
  • JSAM
  • WSAM
  • Network Connect
  • Troubleshooting

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

Reviews

There are no reviews yet. Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

More courses within this subject:

Compare 32,279 training courses in subjects like Internet Security

Sign up to create your own Learning Lists.

Not for humans