1­-855­-778­-7246

Gigamon Certified Professional Bootcamp (GCPB)

 

Course Content

The Gigamon Certified Professional (GCP) Boot Camp is a 5 day, instructor-led course that teaches security, network, cloud and sales engineers security fundamentals for implementing Gigamon technologies to monitor data in motion as part of a comprehensive security strategy.

The course illustrates these concepts, as well as provides hands-on experience in implementing the GigaSECURE® Security Delivery Platform. It also provides instruction to the knowledge, skills and attitudes needed for implementing GigaSECURE® into enterprise networks.

This course is also intended to help students prepare for the GCP certification exam.

Who should attend

The primary target audiences for the course are:

  • All end users of Gigamon products
  • Security operations professionals and architects
  • Network operations professionals and architects
  • Professional service and system integrations specialists
  • Network and security administrators and architects
  • Participants of the Gigamon Partner Program and Gigamon Support Partner Program (GSPP) or Gigamon Professional Services Program (GPSP)

Prerequisites

IMPORTANT: This course is designed to assist participants in preparing for the Gigamon Certified Professional certification test, but we recommend that you have the following pre-requisites prior to taking the GCP certification test:

  • Basic working knowledge of Gigamon products & flow mapping configuration
  • Cisco Certified Network Associate Routing & Switching (CCNA) !CI-CCNAX or equivalent working knowledge
  • CompTIA Cloud+ or equivalent working knowledge
  • !CO-SEC+ or Cisco Certified Network Associate Security or equivalent working knowledge

Course Objectives

  • How to select a valid traffic source
  • Connectivity requirements for inline and out-of-band tools
  • Data requirements for inline security and network analysis tools
  • Approaches and considerations for packet access for inline tools
  • Traffic sizing for inline security and network analysis tools
  • Approaches and considerations for out-of-band packet access
  • How to implement a packet access solution in a physical network infrastructure
  • How to reliably access packets for security analysis
  • How to filter traffic to meet the needs of security tools
  • Load sharing between inline security and network analysis tools
  • How to implement packet optimization for analysis
  • How to implement tool groupings for inline processing
  • Traffic management for inline processing
  • How to replicate traffic to out-of-band tools for augmenting inline security
  • Approaches and considerations for packet access in the cloud
  • How to implement a packet access solution in a cloud or hybrid network infrastructure
  • How to extract virtualized traffic for use with virtualized and physical tools

Outline: Gigamon Certified Professional Bootcamp (GCPB)

Module 1: Security and Tool Essentials

  • Tools and Traffic Sources
  • Tool Types – Inline/Out-of-Band
  • Choosing a Traffic Source
  • Tap Selection and Placement

Module 2: Addressing Common Threats

  • Review of Security Challenges
    • Traffic Source Selection
    • Threat Vectors
    • Common Security Vulnerabilities
    • Review of common threats
    • Basic Data Taxonomy
    • Democratization of Malware
    • Example of an Advanced Persistent Threat (APT)
    • What Can Be Done
    • Courses of Action
    • Ways to break a kill chain
    • The new security model

Module 3: Security and Monitoring Tools & Types

  • Tools, Tool Groupings and What Traffic They Need
    • Security and Monitoring Tools
    • Security Tools
    • Supporting Security Tools
    • Deploying Security Tools
    • Out-of-Band Monitoring
    • Inline Monitoring
    • Inline/Out-of-Band Tool Impact
    • Company Philosophy
    • Tool Groupings and Arrangements
    • Tool Redundancy Schemes
    • Tool/group redundancy schemes
    • Inline Tool Failover Schemes
    • NAT/PAT Gateways
    • Passive or Explicit
    • Redundancy and Failover Schemes
    • Networking Infrastructure Devices
    • Traffic Forwarding
    • Traffic Types

Module 4: Traffic Filtering

  • Networking protocol usage
  • Filtering Traffic
  • Traffic sizing considerations
  • Filtering Fundamentals
  • Packet Sizes and uses
  • Firewall Concepts

Module 5: Tool Sizing and Visibility Sizing

  • Traffic Requirements/minimum # tool nodes/sizing
  • Knowing When the Packet Access is Over-Subscribed
  • Packet access Sizing – Traffic Volume
  • Load sharing

Module 6: Gigamon Platform Architecture

  • Installation and Setup (GigaVUE)
  • Box Setup
  • Port behaviors
  • Basic Flow Mapping

Module 7: Traffic Intelligence - GigaSMART

  • GigaSMART Application usage
  • Highlighted GigaSMART Features – GigaSECURE
  • GigaSMART Performance and Capacity
  • GigaSMART sizing and restrictions
  • GigaSMART processing dependencies

Module 8: Classic Inline Bypass

  • Classic Inline Bypass data processing
  • Configuration specifics and examples

Module 9: Flexible Inline Bypass

  • Flexible Inline Bypass data processing
  • GigaSMART involvement / configuration

Module 10: SSL Essentials

  • Inline SSL decryption solution
  • URL categorization and whitelisting

Module 11: Implementing Inline SSL Decryption

  • Inline SSL configuration
  • Gigamon specific support features
  • Whitelisting support & configuration

Module 12: Virtualization and Cloud Technologies

  • Virtual Machines Concepts
  • Virtual Networking Concepts
  • Cloud Architectures
  • Cloud Visibility Challenges
  • Solutions for Cloud Visibility
  • OpenStack Multi-Tenant
  • Amazon Web Services and Microsoft Azure

Module 13: GigaSECURE Cloud

  • GigaSECURE Cloud Visibility Elements
  • GigaSECURE for OpenStack, AWS, and Azure Deployments
  • Identify the Requirements; Size the Solution

Module 14: Gigamon SECURE Cloud: Solution Configurations

  • GigaSECURE Virtual Deployments
  • GigaSECURE Cloud Deployments
  • GigaSECURE Cloud: VSeries Appliance and Visibility Tier Deployments

Module 15: Gigamon Maintenance and Operations

  • User management
  • Product Upgrading and Updating
  • System requirements & process details
  • Clustering benefits
  • Configuration of Clustering

Labs:

  • Lab 1: Understanding Protocol Behaviors
  • Lab 2: Wireshark Trace File Activity
  • Lab 3: Trace File – HC2 Activity
  • Lab 4: Chassis Port Setup and Prep
  • Lab 5: GigaSMART Application: De-duplication
  • Lab 6: GigaSMART Application: NetFlow Generation
  • Lab 7: GigaSMART Application: Adaptive Packet Filtering
  • Lab 8: GigaSMART Application: Application Session Filtering
  • Lab 9: Trace File – SSL Activity
  • Lab 10: GigaSMART Application: Passive SSL Decryption
  • Lab 11: Classic Inline Bypass Configuration
  • Lab 12: Email Flexible Inline Bypass Configuration
  • Lab 13: GigaSMART Application: Inline SSL Decryption
  • Lab 14: GigaVUE-VM
  • Lab 15: Introduction to the Visibility Platform for AWS
  • Lab 16: Design a Basic Architecture for Private Cloud
  • Case Study: Design a Basic Architecture for VMware Private Cloud
  • Case Study: Design a Basic Architecture for OpenStack Private Cloud
  • Lab 17: Design a Basic Architecture for Public Cloud
  • Case Study: Visibility Tools Located in the Enterprise Data Center
  • Lab 18: Configuration Back Up and Restore
  • Lab 19: Removing All Configurations
  • Lab 20: H Series Clustering
  • Lab 21: Port Behavior Setup
  • Lab 22: Passall Configuration
  • Lab 23: Simple Flow Map Configuration
  • Lab 24: More Complex Flow Map Configuration with Rule Prioritization
  • Lab 25: Shared Collector Configuration
  • Lab 26: User-Defined Attribute Filter
  • Lab 27: Tool Mirror
  • Lab 28: Replication and Egress Filtering
  • Lab 29: Hybrid Ports
  • Lab 30: Tool GigaStream
  • Lab 31: Port-Pair
  • Lab 32: Snooping LLDP/CDP
Online Training

Duration 5 days

Price
  • CAD 5,450
Classroom Training

Duration 5 days

Price
  • Canada: CAD 5,450
 
Click on town name to book Schedule
This is an Instructor-Led Classroom course
Guaranteed date:   Fast Lane will carry out all guaranteed training regardless of the number of attendees, exempt from force majeure or other unexpected events, like e.g. accidents or illness of the trainer, which prevent the course from being conducted.
Instructor-led Online Training:   This computer icon in the schedule indicates that this date/time will be conducted as Instructor-Led Online Training.
Canada
Guaranteed to Run Online Training 09:00 Canada/Central Enroll
Guaranteed to Run Online Training 09:00 Canada/Central Enroll
Guaranteed to Run Online Training 09:00 Canada/Eastern Enroll
Guaranteed to Run Online Training 09:00 Canada/Central Enroll
United States
Guaranteed to Run Online Training 09:00 US/Central Enroll
Guaranteed to Run Online Training 09:00 US/Eastern Enroll
Guaranteed to Run Online Training 09:00 US/Central Enroll
Guaranteed to Run Online Training 09:00 US/Central Enroll
Guaranteed to Run Online Training 09:00 US/Pacific Enroll
Guaranteed to Run Online Training 09:00 US/Eastern Enroll
Guaranteed to Run Online Training 09:00 US/Central Enroll
Guaranteed to Run Online Training 09:00 US/Central Enroll