Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

Configuring Juniper Security Threat Response Manager (CSTRM)

( Duration: 3 Days )

The Juniper Configuring Juniper Security Threat Response Manager (CSTRM) training course discusses the configuration of Juniper Networks Security Threat Response Manager (STRM) in a typical network environment. Key topics include deploying an STRM device in the network, configuring flows, running reports, and troubleshooting.

By attending Juniper Configuring Juniper Security Threat Response Manager (CSTRM) workshop, delegates will learn to:

  • Describe the STRM system and its basic functionality
  • Describe the hardware used with the STRM system
  • Identify the technology behind the STRM system
  • Identify the STRM system’s primary design divisions: display versus detection, and events versus traffic
  • Plan and prepare for a new installation
  • Access the administration console
  • Configure the network hierarchy
  • Configure the automatic update process
  • Access the Deployment Editor
  • Describe the STRM system’s internal processes
  • Describe event and flow source configuration
  • List key features of the STRM architecture
  • Describe the STRM system’s processing logic
  • Interpret the correlation of flow and event data
  • List the architectural component that provides each key function;
  • Describe Events and explain where they come from
  • Access the Log Activity interface
  • Execute Event searches
  • Describe flows and their origin
  • Configure the Network Activity interface
  • Execute Event searches
  • Describe flows and their origin
  • Configure the Network Activity interface
  • Execute Flow searches
  • Specify the STRM system’s Asset Management and Vulnerability Assessment functionality
  • Access the Assets interface
  • View Asset Profile data
  • View Server Discovery;
  • Access the Vulnerability Assessment Scan Manager to produce vulnerability assessments (VAs)
  • Access vulnerability scanner configuration
  • View vulnerability profiles
  • Describe rules
  • Configure rules
  • Configure Building Blocks (BBs)
  • Explain how rules and flows work together
  • Access the Offense Manager interface
  • Understand Offense types
  • Configure Offense actions
  • Navigate the Offense interface
  • Explain the Offense summary screen
  • Search Offenses
  • Use the STRM system’s Reporting functionality to produce graphs and reports
  • Navigate the Reporting interface
  • Configure Report Groups
  • Demonstrate Report Branding
  • View Report formats
  • Indentify the basic information on maintaining and troubleshooting the STRM system
  • Navigate the STRM dashboard
  • List flow and event troubleshooting steps
  • Access the Event Mapping tool
  • Configure Event Collection for Junos devices
  • Configure Flow Collection for Junos devices and
  • Explain High Availability (HA) functionality on an STRM device

Basic networking knowledge and experience of the Internet, networking concepts, TCP/IP, bridging, switching and routing.

This Juniper Configuring Juniper Security Threat Response Manager (CSTRM) workshop is intended for network engineers, support personnel, reseller support, and anyone implementing STRM.

COURSE AGENDA

1

Introduction

2

Product Overview

  • Overview of the STRM Series Device
  • Hardware
  • Collection
  • Operational Flow
3

Initial Configuration

  • A New Installation
  • Administration Console
  • Platform Configuration
  • Deployment Editor
4

Architecture

  • Processing Log Activity
  • Processing Network Activity
  • STRM Deployment Options
5

Log Activity

  • Log Activity Overview
  • Configuring Log Activity
6

Network Activity

  • Network Activity Overview
  • Configuring Network Activity
7

Assets and Vulnerability Assessment

  • Asset Interface
  • Vulnerability Assessment
  • Vulnerability Scanners
8

Rules

  • Rules
  • Configure Rules and Building Blocks
9

Offense Manager

  • Offense Manager
  • Offense Manager Configuration
  • Offense Investigation
10

Reporting

  • Reporting Functionality
  • Reporting Interface
11

Basic Tuning and Troubleshooting

  • Basic Tuning
  • Troubleshooting
12

Configuring Junos Devices for Use with STRM

  • Collecting Junos Events
  • Collecting Junos Flows

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X