Description
Course info
Level
Intermediate
Updated
Jan 20, 2017
Duration
3h 6m
Description

Attacks on a corporate network can have devastating consequences which can be attributed to not only the loss of potentially sensitive or valuable data, but also the damage to an organizations reputation. It is true that the edge where the enterprise network meets the public Internet needs to be protected against such attacks. However, some organizations neglect to spend as much time securing the inside of the network. This course, Layer 2 Security in Junos OS, is designed to help network engineers recognize how attacks can originate from within the network and more importantly, what can be done to defend against such attacks when your network is running Juniper EX Series switches. This course, along with the other courses in the JNCIS-ENT series, is designed to educate and prepare network engineers for working in and securing enterprise environments. First, you'll learn about how attackers can utilize vulnerabilities in your network. Next you'll explore what you can do to prevent such attacks. Finally, you'll learn how you can control access to network resources from internal clients. By the end of this course, you'll be able to understand some of the security threats that can be used against your Juniper EX Series switches and be confident that the solution you implement is the best solution in order to defeat that security threat.

About the author
About the author

Martin is a network security engineer with several years experience in various markets including retail and aerospace in many different countries and at the moment works for a UK based tier 1 service provider working with technology from Cisco, F5, Checkpoint, Infoblox, and, of course, Juniper.

More from the author
Junos OS and High Availability
Intermediate
2h 27m
Sep 4, 2018
Networking Tunnels in Junos OS
Intermediate
59m
May 31, 2018
Junos OS and the Border Gateway Protocol
Intermediate
3h 9m
Jan 10, 2018
More courses by Martin Brown
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Martin Brown, and welcome to my course, Layer 2 Security in Junos OS. I am a network security engineer for a tier one service provider. Most engineers love to have the opportunity to build brand new network devices, and they love it even more when they start to see traffic flowing through these same devices due to the time and effort they've spent building them. Some engineers, however, become so focused on traffic flow that they neglect to protect their networks from internal attacks, and that is exactly what this course discusses, network security at layer 2. Some of the topics that we will cover include how attackers can utilize vulnerabilities in your network, what you can do to prevent such attacks, and how you can control access to network resources from internal clients. By the end of this course you'll be able to understand some of the security threats that can be used against your Juniper EX series, --- and be confident that the solution you implement is the best solution in order to defeat that security threat, although before beginning this course you really should be familiar with the concept of switching and the spanning tree protocol, and know the basics of the Junos operating system. I hope you will join me on this journey to learn all about internal network security with the Layer 2 Security in Junos OS course at Pluralsight.