Configuring Security Threat Response Manager

Level

Configuring Security Threat Response Manager

Aikona
Logo Aikona

Need more information? Get more details on the site of the provider.

Starting dates and places

There are no known starting dates for this product.
  • View related products with starting dates: Security.

Description

Overview

This course is intended for network engineers, support personnel, reseller support, and anyon implementing STRM.

  • Course Introduction
  • Product Overview
  • Initial Configuration
  • Architecture
  • Dashboard, Event Viewer, and Flow Viewer
  • Network Surveillance
  • Assets and Vulnerability Assessment
  • Offense Manager
  • STRM Device Reports
  • Basic Tuning and Troubleshooting

Juniper Configuring Security Threat Response Manager (CSTRM) (JP-CSTRM)This two-day course discusses the configuration of Juniper Networks Security Threat Response Manager (STRM) in a typical network environment. Key topics include depolying an STRM device in the network, configuring flows, running reports, and troubleshooting. This…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Overview

This course is intended for network engineers, support personnel, reseller support, and anyon implementing STRM.

  • Course Introduction
  • Product Overview
  • Initial Configuration
  • Architecture
  • Dashboard, Event Viewer, and Flow Viewer
  • Network Surveillance
  • Assets and Vulnerability Assessment
  • Offense Manager
  • STRM Device Reports
  • Basic Tuning and Troubleshooting

Juniper Configuring Security Threat Response Manager (CSTRM) (JP-CSTRM)This two-day course discusses the configuration of Juniper Networks Security Threat Response Manager (STRM) in a typical network environment. Key topics include depolying an STRM device in the network, configuring flows, running reports, and troubleshooting. This course is based on STRM software 2008.3.

Prerequisites

This course assumes delegates have basic networking knowledge and have an understanding of TCP/IP operation, network security concepts and experience in network security administration.

Delegates will learn how to

  • After successfully completing this course delegates will be able to:
  • Define STRM and its basic functionality
  • Define the STRM functional architecture
  • Interpret the correlation of flow and event data
  • Configure STRM by reviewing and editing global views and sentries
  • Navigate the STRM Dashboard and Event Viewer
  • Access the Network Surveillance interface
  • Access the Flow Viewer interface
  • Access the Offense Manager interface
  • Specify STRM's asset management and vulnerability assessment functionality
  • Use STRM's reporting functionality
  • Explain the purpose and structure of STRM rules
  • List basic tuning methodology
  • Identify the basic information for maintaining and troubleshooting STRM
There are no reviews yet.
  • View related products with reviews: Security.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.