Configuring Security Threat Response Manager
Starting dates and places
Description
Overview
This course is intended for network engineers, support personnel, reseller support, and anyon implementing STRM.
- Course Introduction
- Product Overview
- Initial Configuration
- Architecture
- Dashboard, Event Viewer, and Flow Viewer
- Network Surveillance
- Assets and Vulnerability Assessment
- Offense Manager
- STRM Device Reports
- Basic Tuning and Troubleshooting
Juniper Configuring Security Threat Response Manager (CSTRM) (JP-CSTRM)This two-day course discusses the configuration of Juniper Networks Security Threat Response Manager (STRM) in a typical network environment. Key topics include depolying an STRM device in the network, configuring flows, running reports, and troubleshooting. This…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Overview
This course is intended for network engineers, support personnel, reseller support, and anyon implementing STRM.
- Course Introduction
- Product Overview
- Initial Configuration
- Architecture
- Dashboard, Event Viewer, and Flow Viewer
- Network Surveillance
- Assets and Vulnerability Assessment
- Offense Manager
- STRM Device Reports
- Basic Tuning and Troubleshooting
Juniper Configuring Security Threat Response Manager (CSTRM) (JP-CSTRM)This two-day course discusses the configuration of Juniper Networks Security Threat Response Manager (STRM) in a typical network environment. Key topics include depolying an STRM device in the network, configuring flows, running reports, and troubleshooting. This course is based on STRM software 2008.3.
Prerequisites
This course assumes delegates have basic networking knowledge and have an understanding of TCP/IP operation, network security concepts and experience in network security administration.
Delegates will learn how to
- After successfully completing this course delegates will be able to:
- Define STRM and its basic functionality
- Define the STRM functional architecture
- Interpret the correlation of flow and event data
- Configure STRM by reviewing and editing global views and sentries
- Navigate the STRM Dashboard and Event Viewer
- Access the Network Surveillance interface
- Access the Flow Viewer interface
- Access the Offense Manager interface
- Specify STRM's asset management and vulnerability assessment functionality
- Use STRM's reporting functionality
- Explain the purpose and structure of STRM rules
- List basic tuning methodology
- Identify the basic information for maintaining and troubleshooting STRM
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.