Detailed Course Outline
Course Introduction
Introducing SASE
- Describe the security challenges of the modern enterprise
- Describe the network challenges of the modern enterprise
- Describe the cloud-delivered approach to securing the enterprise
- Describe the SD-WAN approach to connecting the enterprise
- Explain Juniper Networks Secure Access Service Edge
Provisioning Service Locations and Sites
- Describe Secure Edge Service Locations and sites
- Explain the structure and function of Secure Edge policy
- Deploy a Service Location
- Deploy a Secure Edge site
Lab 1: Deploying Service Locations and Sites
SSL Proxy
- Describe how SSL proxy works
- Configure and apply SSL proxy profiles in Secure Edge
Lab 2: Configuring SSL Proxy
Connecting Remote Users with PAC Files
- Describe how PAC files work
- Create and deploy a PAC file using the PAC file builder
- Modify a PAC file manually using JavaScript
Lab 3: Enrolling Remote Users
User Identity and JIMS
- Explain the importance of user identity in securing the enterprise edge
- Describe the available options for authentication in Secure Edge
- Deploy JIMS on-premises user authentication
- Configure Secure Edge policies based on user identity
Lab 4: Implement User Identity Management for On-Premises Users
Managing Identity for Remote Users
- Review available options for user identity management
- Configure hosted database to authenticate remote users
- Deploy a third-party SAML identity provider for remote users
- Configure Secure Edge policies based on user identity for remote users
Lab 5: Identity Management for Remote Users
Web Filtering and Content Filtering
- Describe Web filtering and content filtering features
- Configure and deploy Secure Edge policy rules with Web filtering and content filtering profiles
Lab 6: Configure Content Filtering and Web Filtering Policies
ATP Cloud
- Explain Security Intelligence
- Describe Encrypted Traffic Insights
- Describe DNS filtering
ATP Cloud Features in Secure Edge
- Describe how ATP Cloud provides functionality to Secure Edge
- Configure ETI and DNS security
- Configure allowlists and blocklists
- Configure and apply SecIntel profiles
- Configure and apply anti-malware profiles
Lab 7: Implement ATP Cloud Security Features
IPS Policies
- Describe IPS
- Configure and apply IPS policies
Monitoring Secure Edge
- Navigate the logging workspace
- Configure alerts
- Monitor ATP functions
- Define and generate reports
- Monitor Service Location status
Lab 8: Monitoring Secure Edge
Capstone Case Study
- Explain the case study requirements
- Implement the case study requirements