Deploying Juniper Security Service Edge (SSE) – Outline

Detailed Course Outline

Course Introduction
Introducing SASE
  • Describe the security challenges of the modern enterprise
  • Describe the network challenges of the modern enterprise
  • Describe the cloud-delivered approach to securing the enterprise
  • Describe the SD-WAN approach to connecting the enterprise
  • Explain Juniper Networks Secure Access Service Edge
Provisioning Service Locations and Sites
  • Describe Secure Edge Service Locations and sites
  • Explain the structure and function of Secure Edge policy
  • Deploy a Service Location
  • Deploy a Secure Edge site

Lab 1: Deploying Service Locations and Sites

SSL Proxy
  • Describe how SSL proxy works
  • Configure and apply SSL proxy profiles in Secure Edge

Lab 2: Configuring SSL Proxy

Connecting Remote Users with PAC Files
  • Describe how PAC files work
  • Create and deploy a PAC file using the PAC file builder
  • Modify a PAC file manually using JavaScript

Lab 3: Enrolling Remote Users

User Identity and JIMS
  • Explain the importance of user identity in securing the enterprise edge
  • Describe the available options for authentication in Secure Edge
  • Deploy JIMS on-premises user authentication
  • Configure Secure Edge policies based on user identity

Lab 4: Implement User Identity Management for On-Premises Users

Managing Identity for Remote Users
  • Review available options for user identity management
  • Configure hosted database to authenticate remote users
  • Deploy a third-party SAML identity provider for remote users
  • Configure Secure Edge policies based on user identity for remote users

Lab 5: Identity Management for Remote Users

Web Filtering and Content Filtering
  • Describe Web filtering and content filtering features
  • Configure and deploy Secure Edge policy rules with Web filtering and content filtering profiles

Lab 6: Configure Content Filtering and Web Filtering Policies

ATP Cloud
  • Explain Security Intelligence
  • Describe Encrypted Traffic Insights
  • Describe DNS filtering
ATP Cloud Features in Secure Edge
  • Describe how ATP Cloud provides functionality to Secure Edge
  • Configure ETI and DNS security
  • Configure allowlists and blocklists
  • Configure and apply SecIntel profiles
  • Configure and apply anti-malware profiles

Lab 7: Implement ATP Cloud Security Features

IPS Policies
  • Describe IPS
  • Configure and apply IPS policies
Monitoring Secure Edge
  • Navigate the logging workspace
  • Configure alerts
  • Monitor ATP functions
  • Define and generate reports
  • Monitor Service Location status

Lab 8: Monitoring Secure Edge

Capstone Case Study
  • Explain the case study requirements
  • Implement the case study requirements