Configuring Security Threat Response Manager

2 Day Course
Hands On
Official Juniper Curriculum
Code JUN-CSTR

Book Now - 1 Delivery Method Available:

Scheduled Online Onsite

Overview

This two-day course discusses the configuration of Juniper Networks Security Threat Response Manager (STRM) in a typical Network environment. Key topics include deploying an STRM device in the network, configuring flows, running reports, and troubleshooting. This course is based on STRM software 2008.3.

After successfully completing this course, you should be able to:

  • Define STRM and its basic functionality
  • Define the STRM functional architecture
  • Interpret the correlation of flow and event data
  • Configure STRM by reviewing and editing global views and sentries
  • Navigate the STRM Dashboard and Event Viewer.
  • Access the Network Surveillance interface
  • Access the Flow Viewer interface
  • Access the Offsense Manager interface
  • Specify STRM's asset management and vulnerability assessment functionality
  • Use STRM's reporting functionality
  • Explain the purpose and structure of STRM rules
  • List basic tuning methodology
  • Identify the basic information for maintaining and troubleshooting STRM

Training Partners

We work with the following best of breed training partners using our bulk buying power to bring you a wider range of dates, locations and prices.

Modules

Hide all

Course Topics (5 topics)

  • Product Overview
  • STRM Overview
  • Hardware
  • Collection
  • Operational Flow

Initial Configuration (5 topics)

  • A New Installation
  • Administration Console
  • Platform Configuration
  • Deployment Editor
  • Lab 1: Initial Configuration

Dashboard, Event Viewer, and Flow Viewer (5 topics)

  • The Dashboard
  • Event Viewer
  • Rules
  • Flow Viewer
  • Lab 2: Configure the STRM Dashboard, Event Viewer, and Flow Viewer

Network Surveillance (4 topics)

  • Network Surveillance
  • Views Configuration
  • Sentries
  • Lab 3: Network Surveillance

Assets and Vulnerability Assessment (3 topics)

  • Assets Interface
  • Vulnerability Assessment
  • Vulnerability Scanners

Offense Manager (3 topics)

  • Offense Manager
  • Network Anomaly
  • Lab 4: Offense Manager

STRM Device Reports (3 topics)

  • Reporting Functionality
  • Reporting Interface
  • Lab 5: Reports

Basic Tuning and Troubleshooting (2 topics)

  • Basic Tuning
  • Troubleshooting

Prerequisites

This course assumes that students have basic networking knowledge and experience in the following areas:
  • TCP/IP operation
  • Network security concepts
  • Network security administration

or call:408-759-5074

Course PDF

Print

Share this Course

+1
Share

Recommend this Course

Sections