Gigamon Certified Professional Bootcamp Training (GCPB)
Gigamon Certified Professional Bootcamp Training (GCPB) is a 5 day, instructor-led course that teaches security, network, cloud and sales engineers security fundamentals for implementing Gigamon technologies to monitor data in motion as part of a comprehensive security strategy.
The Gigamon Certified Professional Bootcamp (GCPB) course illustrates these concepts, as well as provides hands-on experience in implementing the GigaSECURE® Security Delivery Platform. It also provides instruction to the knowledge, skills and attitudes needed for implementing GigaSECURE® into enterprise networks.
This Gigamon Certified Professional Bootcamp (GCPB)course is also intended to help students prepare for the GCP certification exam.
Duration: 5 days
RESOURCES
- Gigamon Certified Professional Bootcamp Training (GCPB) – https://www.wiley.com/
- Gigamon Certified Professional Bootcamp Training (GCPB) – https://www.packtpub.com/
- Gigamon Certified Professional Bootcamp Training (GCPB) – https://store.logicaloperations.com/
- Gigamon Certified Professional Bootcamp Training (GCPB) – https://us.artechhouse.com/
- Gigamon Certified Professional Bootcamp Training (GCPB) – https://www.amazon.com/
RELATED COURSES
- Gigamon Foundation: Learn the Essentials to Start on the Road to Success Training (GFND)
- Gigamon Designing and Implementing Inline Bypass Solutions Training (ILB SOLUTIONS)
- Gigamon Designing and Implementing SSL Solutions Training (SSL SOLUTIONS)
CUSTOMIZE It
- We can adapt this Gigamon Certified Professional Bootcamp Training (GCPB) course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Gigamon Certified Professional Bootcamp Training (GCPB) course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Gigamon Certified Professional Bootcamp Training (GCPB) Course around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Gigamon Certified Professional Bootcamp Training (GCPB) course in manner understandable to lay audiences.
AUDIENCE/TARGET GROUP
The target audience for this Gigamon Certified Professional Bootcamp (GCPB) course:
- All end users of Gigamon products
- Security operations professionals and architects
- Network operations professionals and architects
- Professional service and system integrations specialists
- Network and security administrators and architects
- Participants of the Gigamon Partner Program and Gigamon Support Partner Program (GSPP) or Gigamon Professional Services Program (GPSP)
CLASS PREREQUISITES
The knowledge and skills that a learner must have before attending this Gigamon Certified Professional Bootcamp (GCPB) course are:
- Gigamon Foundation: Learn the Essentials to Start on the Road to Success (GFND)
- Basic working knowledge of Gigamon products & flow mapping configuration
- Cisco Certified Network Associate Routing & Switching (CCNA) CI-CCNAX or equivalent working knowledge
- CompTIA Cloud+ or equivalent working knowledge
- CompTIA Security+ (SEC+) or Cisco Certified Network Associate Security or equivalent working knowledge
Gigamon Certified Professional Bootcamp Training (GCPB) - OBJECTIVES
Upon completing this Gigamon Certified Professional Bootcamp (GCPB) course, learners will be able to meet these objectives:
- How to select a valid traffic source
- Connectivity requirements for inline and out-of-band tools
- Data requirements for inline security and network analysis tools
- Approaches and considerations for packet access for inline tools
- Traffic sizing for inline security and network analysis tools
- Approaches and considerations for out-of-band packet access
- How to implement a packet access solution in a physical network infrastructure
- How to reliably access packets for security analysis
- How to filter traffic to meet the needs of security tools
- Load sharing between inline security and network analysis tools
- How to implement packet optimization for analysis
- How to implement tool groupings for inline processing
- Traffic management for inline processing
- How to replicate traffic to out-of-band tools for augmenting inline security
- Approaches and considerations for packet access in the cloud
- How to implement a packet access solution in a cloud or hybrid network infrastructure
- How to extract virtualized traffic for use with virtualized and physical tools
Gigamon Certified Professional Bootcamp Training (GCPB) - COURSE SYLLABUS
Module 1: Security and Tool Essentials
- Tools and Traffic Sources
- Tool Types – Inline/Out-of-Band
- Choosing a Traffic Source
- Tap Selection and Placement
Module 2: Addressing Common Threats
- Review of Security Challenges
- Traffic Source Selection
- Threat Vectors
- Common Security Vulnerabilities
- Review of common threats
- Basic Data Taxonomy
- Democratization of Malware
- Example of an Advanced Persistent Threat (APT)
- What Can Be Done
- Courses of Action
- Ways to break a kill chain
- The new security model
Module 3: Security and Monitoring Tools & Types
- Tools, Tool Groupings and What Traffic They Need
- Security and Monitoring Tools
- Security Tools
- Supporting Security Tools
- Deploying Security Tools
- Out-of-Band Monitoring
- Inline Monitoring
- Inline/Out-of-Band Tool Impact
- Company Philosophy
- Tool Groupings and Arrangements
- Tool Redundancy Schemes
- Tool/group redundancy schemes
- Inline Tool Failover Schemes
- NAT/PAT Gateways
- Passive or Explicit
- Redundancy and Failover Schemes
- Networking Infrastructure Devices
- Traffic Forwarding
- Traffic Types
Module 4: Traffic Filtering
- Networking protocol usage
- Filtering Traffic
- Traffic sizing considerations
- Filtering Fundamentals
- Packet Sizes and uses
- Firewall Concepts
Module 5: Tool Sizing and Visibility Sizing
- Traffic Requirements/minimum # tool nodes/sizing
- Knowing When the Packet Access is Over-Subscribed
- Packet access Sizing – Traffic Volume
- Load sharing
Module 6: Gigamon Platform Architecture
- Installation and Setup (GigaVUE)
- Box Setup
- Port behaviors
- Basic Flow Mapping
Module 7: Traffic Intelligence - GigaSMART
- GigaSMART Application usage
- Highlighted GigaSMART Features – GigaSECURE
- GigaSMART Performance and Capacity
- GigaSMART sizing and restrictions
- GigaSMART processing dependencies
Module 8: Classic Inline Bypass
- Classic Inline Bypass data processing
- Configuration specifics and examples
Module 9: Flexible Inline Bypass
- Flexible Inline Bypass data processing
- GigaSMART involvement / configuration
Module 10: SSL Essentials
- Inline SSL decryption solution
- URL categorization and whitelisting
Module 11: Implementing Inline SSL Decryption
- Inline SSL configuration
- Gigamon specific support features
- Whitelisting support & configuration
Module 12: Virtualization and Cloud Technologies
- Virtual Machines Concepts
- Virtual Networking Concepts
- Cloud Architectures
- Cloud Visibility Challenges
- Solutions for Cloud Visibility
- OpenStack Multi-Tenant
- Amazon Web Services and Microsoft Azure
Module 13: GigaSECURE Cloud
- GigaSECURE Cloud Visibility Elements
- GigaSECURE for OpenStack, AWS, and Azure Deployments
- Identify the Requirements; Size the Solution
Module 14: Gigamon SECURE Cloud: Solution Configurations
- GigaSECURE Virtual Deployments
- GigaSECURE Cloud Deployments
- GigaSECURE Cloud: VSeries Appliance and Visibility Tier Deployments
Module 15: Gigamon Maintenance and Operations
- User management
- Product Upgrading and Updating
- System requirements & process details
- Clustering benefits
- Configuration of Clustering
Labs:
- Lab 1: Understanding Protocol Behaviors
- Lab 2: Wireshark Trace File Activity
- Lab 3: Trace File – HC2 Activity
- Lab 4: Chassis Port Setup and Prep
- Lab 5: GigaSMART Application: De-duplication
- Lab 6: GigaSMART Application: NetFlow Generation
- Lab 7: GigaSMART Application: Adaptive Packet Filtering
- Lab 8: GigaSMART Application: Application Session Filtering
- Lab 9: Trace File – SSL Activity
- Lab 10: GigaSMART Application: Passive SSL Decryption
- Lab 11: Classic Inline Bypass Configuration
- Lab 12: Email Flexible Inline Bypass Configuration
- Lab 13: GigaSMART Application: Inline SSL Decryption
- Lab 14: GigaVUE-VM
- Lab 15: Introduction to the Visibility Platform for AWS
- Lab 16: Design a Basic Architecture for Private Cloud
- Case Study: Design a Basic Architecture for VMware Private Cloud
- Case Study: Design a Basic Architecture for OpenStack Private Cloud
- Lab 17: Design a Basic Architecture for Public Cloud
- Case Study: Visibility Tools Located in the Enterprise Data Center
- Lab 18: Configuration Back Up and Restore
- Lab 19: Removing All Configurations
- Lab 20: H Series Clustering
- Lab 21: Port Behavior Setup
- Lab 22: Passall Configuration
- Lab 23: Simple Flow Map Configuration
- Lab 24: More Complex Flow Map Configuration with Rule Prioritization
- Lab 25: Shared Collector Configuration
- Lab 26: User-Defined Attribute Filter
- Lab 27: Tool Mirror
- Lab 28: Replication and Egress Filtering
- Lab 29: Hybrid Ports
- Lab 30: Tool GigaStream
- Lab 31: Port-Pair
- Lab 32: Snooping LLDP/CDP
Gigamon Certified Professional Bootcamp Training (GCPB) Course Wrap-Up
Whether you are looking for general information or have a specific question, we want to help.
Request More Information