JNCIE Security Bootcamp (JNCIE SEC BC)


This five-day course is designed to serve as the ultimate preparation for the Juniper Networks Certified Internet Expert—Security (JNCIE-SEC) exam. The course focuses on caveats and tips useful for potential test candidates and emphasizes hands-on practice through a series of timed lab simulations. On the final day of the course, students are given a six-hour lab simulation emulating the testing topics and environment from the real exam. This course is based on Junos OS Release 12.1X46-D10.2 for SRX Series devices.
This course benefits individuals who have already honed their skills on enterprise security technologies and could use some practice and tips in preparation for the JNCIE-SEC exam.
Students should have passed the Juniper Networks Certified Internet Professional-Security (JNCIP-SEC) written exam or achieved an equal of expertise through Education Services course ware and hands-on experience.

After successfully completing this course, you should:

  • Be better prepared for success in taking the actual JNCIE-SEC exam.
  • Be well-versed in exam topics, environment, and conditions.

Day 1 

Chapter 1: Course Introduction

Chapter 2: Exam Strategies

  • Prior to the Exam
  • Exam Day
  • After the Exam

Chapter 3: Infrastructure Concepts

  • Section Topics
  • System Tasks
  • Zones
  • Issues and Tips
  • Infrastructure and Zones Lab

Chapter 4: Building Clusters

  • Setting Up Clustering
  • Redundancy Groups and Reth Groups
  • Failovers
  • Issues and Tips
  • Creating Clusters Lab

Day 2

Chapter 5: Security Policies

  • Security Policies
  • ALGs
  • Schedulers
  • Bypass Flow Forwarding
  • Logging
  • Issues and Tips
  • Building Security Policies Lab

Chapter 6: IPsec VPNs

  • Overview of VPN Configuration
  • IKE Proposals, Policies, and Gateways
  • IPsec Proposals, Policies, and Gateways
  • Route-Based, Dynamic, and Certificate-Based VPNs
  • Identifying IPsec Issues
  • Issues and Tips
  • Building IPsec VPNs Lab

Day 3

Chapter 7: Network Address Translation

  • Implementation of NAT
  • Source NAT
  • Destination NAT
  • Static NAT
  • Overlapping IP Addresses
  • Verification Commands and Common Issues
  • Network Address Translation Lab

Chapter 8: Attack Prevention

  • Overview of Attack Prevention
  • IDP
  • AppSecure
  • Additional Prevention Capabilities
  • Issues and Tips
  • Attack Prevention Lab

Day 4

Chapter 9: Unified Threat Management and Screen Options

  • Overview of UTM
  • Web Filtering
  • Anti-Virus
  • Screen Options
  • UTM and Screen Options Lab

Chapter 10: Extended Implementation Concepts

  • Transparent Mode
  • Filter-Based Forwarding
  • Extended Implementations Lab

Day 5

  • JNCIE-SEC Full Lab Simulation
SLI Main Menu