Logo
Register   |   Login
Wednesday 28th of June 2017 05:01:01 AM








 »  News
 Course Details

Configuring Security Threat Response Manager
CSTRM
Configuring Security Threat Response Manager
Juniper
Introductory
Download
Call
This course assumes that students have basic networking knowledge and experience in the following areas:
- Understanding of TCP/IP operation.
- Understanding of network security concepts.
- Experience in network security administration.
Configuring Security Threat Response Manager:
This two-day course discusses the configuration of Juniper Networks Security Threat Response Manager (STRM) in a typical network environment. Key topics include deploying an STRM device in the network, configuring flows, running reports, and troubleshooting.


Course Schedules

Start Date End Date Duration Seat Availability Enroll
--- --- ---- --- ---

Sitemap  |  Feedback  |  Subscribe