Configuring Security Threat Response Manager (CSTRM) — A 2 day course

contact usEnquire about this course
Retired Course; no longer available

Synopsis

This two-day course discusses the configuration of Juniper Networks Security Threat Response Manager (STRM) in a typical network environment.

Key topics include deploying an STRM device in the network, configuring flows, running reports, and troubleshooting.

This course is based on STRM software 2008.3.

Through demonstrations and hands-on labs, students will gain experience in configuring, testing, and troubleshooting the STRM device.

Objectives

After successfully completing this course, you should be able to:

Suitable For

This course is intended for network engineers, support personnel, reseller support, and anyone responsible for implementing STRM.

Prerequisites

This course assumes that students have basic networking knowledge and experience in the following areas:

Schedule

This course has been retired and is no longer available.


Contents

Course Introduction

Product Overview

Initial Configuration

Architecture

Dashboard, Event Viewer, and Flow Viewer

Network Surveillance

Assets and Vulnerability Assessment

Offense Manager

STRM Device Reports

Basic Tuning and Troubleshooting