8(499)653-5670
edu@poplar.ru

 

       Juniper  

IJSA

Implementing Juniper Networks Secure Analytics (IJSA)

:
: Adobe Acrobat PDF
: Juniper Networks
: 3

:
This three-day course discusses the configuration of Juniper Networks JSA Series Secure Analytics (formerly known as Security Threat Response Manager [STRM]) in a typical network environment. Key topics include deploying a JSA Series device in the network, configuring flows, running reports, and troubleshooting. Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting the JSA Series device.
This course uses the Juniper Networks Secure Analytics (JSA) VM virtual appliance for the hands-on component. This course is based on JSA software 2014.2R4  >>>


 

© 2001—2020, Poplar Systems

 
– Juniper Networks 2006