Gigamon Certified Professional Bootcamp (GCPB)


Course Overview

The Gigamon Certified Professional (GCP) Boot Camp is a 5-day, instructor-led course that teaches security, network, cloud and sales engineers security fundamentals for implementing Gigamon technologies to feed the right network traffic to the right security tools to monitor data-in-motion as part of a comprehensive security strategy.

The course illustrates the concepts needed by a network visibility specialist, as well as provides hands-on experience in implementing the Gigamon Deep Observability Pipeline to harnesses actionable network derived intelligence and insights to amplify the power of your cloud, security, and observability tools. This course also provides instruction into the knowledge, skills and attitudes needed for implementing deep observability into physical, hybrid, and cloud networks.

Who should attend

The primary target audiences for the course are:

  • All end users of Gigamon products
  • Security operations professionals and architects
  • Network operations professionals and architects
  • Professional service and system integrations specialists
  • Network and security administrators and architects
  • Participants of the Gigamon Partner Program and Gigamon Support Partner Program (GSPP) or Gigamon Professional Services Program (GPSP)


IMPORTANT: This course is designed to assist participants in preparing for the Gigamon Certified Professional certification test, but we recommend that you have the following pre-requisites prior to taking the GCP certification test:

  • Basic working knowledge of Gigamon products and configuration
    • Gigamon Foundations I course
    • Gigamon Foundations II course
    • Gigamon Inline Bypass course
    • Gigamon Inline SSL/TLS Decryption course
  • Cisco Certified Network Associate Routing & Switching (CCNA), Interconnecting Cisco Network Devices: Accelerated (CCNAX) or equivalent working knowledge
  • CompTIA Cloud+ or equivalent working knowledge
  • CompTIA Security+ or Cisco Certified Network Associate Security or equivalent working knowledge

Course Objectives

A specialist providing network visibility must have a basic level of knowledge in four major categories in order to assist and advise management and the various network and security tool operators in how to provide complete and trustworthy network traffic and flow summary data to meet the organization’s monitoring and security needs. This course focuses on Gigamon products, basic networking, security, and cloud as they relate to network visibility solutions. The course provides instruction in support of the following:

  • Understand approaches and considerations for out-of-band packet access
  • How to select a trustworthy traffic source
  • How to implement a packet access solution in a physical network infrastructure
  • Methods and options for matching traffic volume with tool capacity
  • How to implement packet optimization for analysis
  • Connectivity requirements for inline and out-of-band tools
  • Approaches and considerations for packet access for inline tools
  • How to replicate traffic to out-of-band tools for augmenting inline security
  • How to implement tool groupings and load sharing for inline processing
  • Traffic sizing for inline security and network analysis tools
  • Approaches and considerations for packet access in the cloud
  • How to implement a packet access solution in a cloud or hybrid network infrastructure
  • How to extract virtualized traffic for use with virtualized and physical tools
  • How to perform visibility solution maintenance and operations

Outline: Gigamon Certified Professional Bootcamp (GCPB)

Module 1: Networking Technology

A review of how the network affects packet characteristics and packet-level access.

  • OSI Model and Visibility
  • Traffic Access
  • Applying OSI Model Knowledge

Module 2: Security Essentials

The challenges faced by SecOps cannot be met without good physical and cloud visibility.

  • OSI Model and Security
  • Visibility Supports Good Cyber-Security
  • Perimeter Defense
  • Cloud Operation and Security
  • Zero Trust
  • Threats & Risk Mitigation
  • Migrating to the Cloud
  • Security Protocols

Module 3: Implementing Security

Security tools depend on receiving the right traffic at a consumable rate. Unreliable traffic or too much traffic puts security at risk.

  • Security Tools
  • Traffic Sources
  • Inline Bypass
  • Inline Decryption

Module 4: Visibility Architectures

Implementing good visibility provides all tools access to the right traffic, and optimizes that traffic to reduce tool processing requirements.

  • Visibility Supports Good Cyber-Security Architecture
  • Installation and Configuration
  • Power Management
  • Port Types
  • Map Rules
  • Traffic Intelligence
  • Solution Sizing

Module 5: Cloud Technology

Evolving cloud functionality continues to present challenges for a good observability solution to overcome.

  • Evolution of Virtualization
  • Cloud Traffic Visibility
  • OSI Model and the Cloud
  • Virtual Traffic Access
  • Virtual Traffic Access Concerns

Module 6: Visibility in the Cloud

Cloud visibility demands a dynamically scalable solution that is consistent across multiple cloud providers.

  • Cloud Visibility
  • GigaVUE Cloud Suite™
    • Monitoring Domain
    • Monitoring Session
    • Automatic Target Selection
  • Accessing Cloud Traffic
    • VMware ESXi
    • VMware NSX-T
    • OpenStack
    • Azure
    • AWS

Module 7: Maintenance and Operations

Gigamon Deep Observability Pipeline administration.

  • Backup and Restore
  • GigaVUE-FM
  • Role Based Access Control (RBAC)
  • Moving or Replacing Modules
  • Clustering

Prices & Delivery methods

Online Training

5 days

  • Online Training: CAD 5,450
  • Online Training: US$ 3,995
Classroom Training

5 days

  • Canada: CAD 5,450

Click on town name or "Online Training" to book Schedule

This is an Instructor-Led Classroom course
Guaranteed date:   We will carry out all guaranteed training regardless of the number of attendees, exempt from force majeure or other unexpected events, like e.g. accidents or illness of the trainer, which prevent the course from being conducted.
Instructor-led Online Training:   This computer icon in the schedule indicates that this date/time will be conducted as Instructor-Led Online Training.

United States

Online Training Time zone: US/Eastern Enroll
Online Training 09:00 US/Central Enroll
Online Training 09:00 US/Pacific Enroll
Online Training 09:00 US/Eastern Enroll
Online Training 09:00 US/Central Enroll


Online Training Time zone: Canada/Eastern Enroll
Online Training 09:00 Canada/Central Enroll
Online Training 09:00 Canada/Pacific Enroll
Online Training 09:00 Canada/Eastern Enroll
Online Training 09:00 Canada/Central Enroll