Configuring Security Threat Response Manager (CSTRM) — A 2 day course

contact usEnquire about this course
Retired Course; no longer available


This two-day course discusses the configuration of Juniper Networks Security Threat Response Manager (STRM) in a typical network environment.

Key topics include deploying an STRM device in the network, configuring flows, running reports, and troubleshooting.

This course is based on STRM software 2008.3.

Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting the STRM device.


After successfully completing this course, you should be able to:

Suitable For

This course is intended for network engineers, support personnel, reseller support, and anyone responsible for implementing STRM.


This course assumes that students have basic networking knowledge and experience in the following areas:


This course has been retired and is no longer available.


Course Introduction

Product Overview

Initial Configuration


Dashboard, Event Viewer, and Flow Viewer

Network Surveillance

Assets and Vulnerability Assessment

Offense Manager

STRM Device Reports

Basic Tuning and Troubleshooting