JNCIS – SEC

Exam: JN0-332: JNCIS – SEC

The JNCIS – SEC list provides a general view of the skill set required to successfully complete the specified certification exam.

Junos Security Overview
  • Identify concepts, general features and functionality of Junos OS security
    • Junos security architecture
    • Branch vs. high-end platforms
    • Additionally, Major hardware components of SRX Series services gateways
    • Packet flow
    • Packet-based vs. session-based forwarding
Zones
  • Identify concepts, benefits and operation of zones
    • Zone types
    • Dependencies
    • Also, Host inbound packet behaviour
    • Additionally, Transit packet behaviour
  • Demonstrate knowledge of how to configure, monitor and troubleshoot zones
    • Zone configuration steps
    • Also, Hierarchy priority (Inheritance)
    • Monitoring and troubleshooting
Security Policies
  • Identify the concepts, benefits and operation of security policies
    • Policy types (default policy)
    • Also, Policy components
    • Policy ordering
    • Also, Host inbound traffic examination
    • Transit traffic examination
    • Also, Scheduling
    • Rematching
    • Also, ALGs
    • Address books
    • Also, Applications
  • Demonstrate knowledge of how to configure, monitor and troubleshoot security policies
    • Policies
    • ALGs
    • Also, Address books
    • Custom applications
    • Also, Monitoring and troubleshooting
Firewall User Authentication
  • Describe the concepts, benefits and operation of firewall user authentication
    • User Firewall
    • Also, User authentication types
    • Also, Authentication server support
    • Additionally, Client groups
Screens
  • Identify the concepts, benefits and operation of Screens
    • Attack types and phases
    • Screen options
  • Demonstrate knowledge of how to configure, monitor and troubleshoot Screens
    • Screen configuration steps
    • Also, Monitoring and troubleshooting
NAT
  • Identify the concepts, benefits and operation of NAT
    • NAT types
    • Also, NAT/PAT processing
    • Address persistence
    • Also, NAT proxy ARP
    • Additionally, Configuration guidelines
  • Demonstrate knowledge of how to configure, monitor and troubleshoot NAT
    • NAT configuration steps
    • Also, Monitoring and troubleshooting
IPSec VPNs
  • Identify the concepts, benefits and operation of IPSec VPNs
    • Secure VPN characteristics and components
    • IPSec tunnel establishment
    • Also, IPSec traffic processing
    • Junos OS IPSec implementation options
  • Demonstrate knowledge of how to configure, monitor and troubleshoot IPSec VPNs
    • IPSec VPN configuration steps
    • Also, Monitoring and troubleshooting
High Availability (HA) Clustering
  • Identify the concepts, benefits and operation of HA
    • HA features and characteristics
    • Additionally, Deployment requirements and considerations
    • Chassis cluster characteristics and operation
    • Cluster modes
    • Also, Cluster and node IDs
    • Redundancy groups
    • Cluster interfaces
    • Also, Real-time objects
    • State synchronization
    • Also, Ethernet switching considerations
    • IPSec considerations
    • Manual failover
  • Demonstrate knowledge of how to configure, monitor and troubleshoot clustering
    • Cluster preparation
    • Also, Cluster configuration steps
    • Additionally, Monitoring and troubleshooting
Unified Threat Management (UTM)
  • Identify concepts, general features and functionality of UTM
    • Packet flow and processing
    • Also, Design considerations
    • Also, Policy flow
    • Platform support
    • Additionally, Licensing
  • Describe the purpose, configuration and operation of antispam filtering
    • Methods
    • Whitelists vs. blacklists
    • Also, Order of operations
    • Traffic examination
    • Also, Configuration steps using the CLI
    • Additionally, Monitoring and troubleshooting
  • Describe the purpose, configuration and operation of antivirus protection
    • Scanning methods
    • Also, Antivirus flow process
    • Scanning options and actions
    • Also, Configuration steps using the CLI
    • Additionally, Monitoring and troubleshooting
  • Describe the concepts, benefits and operation of content and Web filtering
    • Additionally, Filtering features and solutions
    • Also, Configuration steps using the CLI
    • Finally, Monitoring and troubleshooting