Scanning news feeds from virtually any international news source reveals a never ending stream of sophisticated outsider attacks on corporate networks. While these attacks dominate the headlines, there is another form of network attack that is just as sinister: The insider attack on the enterprise LAN. In this video series, enterprise network security expert Martin Brown shows you how to recognize insider attacks and how to protect …
Securing Enterprise LANs Using the Junos OS
Video description
Scanning news feeds from virtually any international news source reveals a never ending stream of sophisticated outsider attacks on corporate networks. While these attacks dominate the headlines, there is another form of network attack that is just as sinister: The insider attack on the enterprise LAN. In this video series, enterprise network security expert Martin Brown shows you how to recognize insider attacks and how to protect against them within a Juniper Network EX Series switch environment.
In addition to receiving the benefit of Brown's vast experience in identifying and counteracting Level 2 and Level 3 insider attacks, the course offers the unique opportunity to gain command-line Junos OS security configuration experience using real life Juniper EX Series hardware.
Become aware of the sophisticated techniques insiders use to attack corporate LANs
Master the methods used in Juniper switched networks to mitigate internal security threats
Gain command-line Junos OS security configuration experience using real Juniper EX Series hardware
Understand Layer 2 (Data Link) and Layer 3 (Network) attack types and mitigation methods
Learn about security concepts such as storm control and directed broadcasts
Explore the ways to secure the control plane to protect device management
Juniper Networks Ambassador Martin Brown (CCNP, CCNA, JNCIS-ENT, JNCDA) is a 17+ year network security engineering professional working at a Tier 1 service provider. Martin is in constant contact with Juniper: Attending meetings, viewing presentations on their latest technologies, and going to NXTWORK summits. He is author of the O'Reilly title, Building Small Office Networks Using the Junos OS - Design and Build a VPN Connected Office Network using Juniper Devices.
Protecting The Spanning Tree Domain Part - 1
00:06:44
Protecting The Spanning Tree Domain Part - 2
00:05:02
Static Mac Address Secure Ports
00:03:32
Troubleshooting Layer 2 Security
00:04:15
Layer 3
Types Of Layer 3 Attack
00:09:11
Dynamic ARP Inspection Part - 1
00:07:04
Dynamic ARP Inspection Part - 2
00:06:27
Dynamic ARP Inspection Part - 3 And IP Source Guard
00:06:26
Trusted DHCP Servers Part - 1
00:08:39
Trusted DHCP Servers Part - 2
00:04:31
Directed Broadcasts
00:06:37
Proxy ARP
00:07:56
Securing Routing Protocols Part - 1
00:08:23
Securing Routing Protocols Part - 2
00:05:01
Securing The Control Plane
Control Plane Attacks
00:08:10
Limiting Login Attempts
00:08:57
Encrypting Session Data
00:07:10
Firewall Filters Part - 1
00:09:18
Firewall Filters Part - 2
00:08:13
Firewall Filters Part - 3
00:05:34
Policers And Rate Limiting Part - 1
00:08:04
Policers And Rate Limiting Part - 2
00:04:09
Wrap-Up
Where To Find More
00:02:25
Conclusion
00:05:59
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept