Advanced Juniper Networks Secure Access

Level

Advanced Juniper Networks Secure Access

Aikona
Logo Aikona

Need more information? Get more details on the site of the provider.

Starting dates and places

This product does not have fixed starting dates and/or places.

Description

Overview

Network engineers, support personnel, reseller support, and anyone responsible for implementing the advanced SA product features covered in this course.

This two-day course discusses the advanced configuration of Secure Access (SA) products. Key topics include; PKI support, additional authentication/authorisation servers, complex policies, customisation, virtual systems, high availability, and Secure Meeting. Through demonstrations and hands on-labs, students will gain experience in configuring, testing, and troubleshooting advanced features of the SA products.

Prerequisites

This course assumes that students have successfully attended the Configuring Juniper Networks Secure A…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Overview

Network engineers, support personnel, reseller support, and anyone responsible for implementing the advanced SA product features covered in this course.

This two-day course discusses the advanced configuration of Secure Access (SA) products. Key topics include; PKI support, additional authentication/authorisation servers, complex policies, customisation, virtual systems, high availability, and Secure Meeting. Through demonstrations and hands on-labs, students will gain experience in configuring, testing, and troubleshooting advanced features of the SA products.

Prerequisites

This course assumes that students have successfully attended the Configuring Juniper Networks Secure Access (CJSA) course or have equivalent experience with the Juniper Networks Secure Access products. Specifically, students need to be familiar with the configuration of:

  • Roles
  • Realms
  • Resource Policies
  • Authentication Servers

Course Outline.

Objectives

By the end of this course, students will be able to deploy the SA products to support common environments.

Topics Covered

  • Advanced Access Management
  • Public Key Infrastructure support (PKI)
  • Certificate Revocation Lists (CRL)
  • Virtual Hosting
  • Single Sign On (SSO)
  • Advanced Authentication
  • Certificate
  • Anonymous
  • Netegrity
  • SAML
  • Advanced Policies
  • Rewriting Policies
  • Authentication Policies
  • Role Mapping
  • Resource Policies
  • Password Management
  • Administrative Delegation
  • Custom User Interface (UI)
  • Clustering
  • Instant Virtual System (IVS)
  • Secure Meeting

Certification

A separate examination (not part of the course) is available for those wishing to obtain formal certification.

There are no reviews yet.
    Share your review
    Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

    There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.