Gigamon Certified Professional Bootcamp Training (GCPB)

Commitment 5 Days, 7-8 hours a day.
Language English
User Ratings Average User Rating 4.8 See what learners said
Price REQUEST
Delivery Options Instructor-Led Onsite, Online, and Classroom Live

COURSE OVERVIEW

Gigamon Certified Professional Bootcamp Training (GCPB) is a 5 day, instructor-led course that teaches security, network, cloud, and sales engineers security fundamentals for implementing Gigamon technologies to monitor data in motion as part of a comprehensive security strategy.

The Gigamon Certified Professional Bootcamp (GCPB) course illustrates these concepts, as well as provides hands-on experience in implementing the GigaSECURE® Security Delivery Platform. It also provides instruction on the knowledge, skills, and attitudes needed for implementing GigaSECURE® into enterprise networks.

This Gigamon Certified Professional Bootcamp (GCPB)course is also intended to help students prepare for the GCP certification exam.

WHAT'S INCLUDED?
  • 5 Days of Gigamon Certified Professional Bootcamp Training (GCPB) from an Authorized Gigamon Instructor
  • Official Gigamon Certified Professional Electronic Courseware
  • Certificate of Completion
  • 100% Satisfaction Guaranteed
RESOURCES
RELATED COURSES

ADDITIONAL INFORMATION

COURSE OBJECTIVES

Upon completing this Gigamon Certified Professional Bootcamp Training (GCPB) course, learners will be able to meet these objectives:

  • How to select a valid traffic source
  • Connectivity requirements for inline and out-of-band tools
  • Data requirements for inline security and network analysis tools
  • Approaches and considerations for packet access for inline tools
  • Traffic sizing for inline security and network analysis tools
  • Approaches and considerations for out-of-band packet access
  • How to implement a packet access solution in a physical network infrastructure
  • How to reliably access packets for security analysis
  • How to filter traffic to meet the needs of security tools
  • Load sharing between inline security and network analysis tools
  • How to implement packet optimization for analysis
  • How to implement tool groupings for inline processing
  • Traffic management for inline processing
  • How to replicate traffic to out-of-band tools for augmenting inline security
  • Approaches and considerations for packet access in the cloud
  • How to implement a packet access solution in a cloud or hybrid network infrastructure
  • How to extract virtualized traffic for use with virtualized and physical tools
CUSTOMIZE IT
  • We can adapt this Gigamon Certified Professional Bootcamp Training course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this Gigamon Certified Professional Bootcamp Training course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Gigamon Certified Professional Bootcamp Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Gigamon Certified Professional Bootcamp Training course in a manner understandable to lay audiences.
AUDIENCE/TARGET GROUP

The target audience for this Gigamon Certified Professional Bootcamp Training (GCPB) course:

  • All end users of Gigamon products
  • Security operations professionals and architects
  • Network operations professionals and architects
  • Professional service and system integrations specialists
  • Network and security administrators and architects
  • Participants of the Gigamon Partner Program and Gigamon Support Partner Program (GSPP) or Gigamon Professional Services Program (GPSP)
CLASS PREREQUISITES

The knowledge and skills that a learner must have before attending this Gigamon Certified Professional Bootcamp Training (GCPB) course are:

IMPORTANT: This course is designed to assist participants in preparing for the Gigamon Certified Professional certification test, but we recommend that you have the following pre-requisites prior to taking the GCP certification test:

  • Basic working knowledge of Gigamon products & flow mapping configuration
  • Cisco Certified Network Associate Routing & Switching (CCNA), Interconnecting Cisco Network Devices: Accelerated (CCNAX) or equivalent working knowledge
  • CompTIA Cloud+ or equivalent working knowledge
  • CompTIA Security+ or Cisco Certified Network Associate Security or equivalent working knowledge

COURSE SYLLABUS

Module 1: Security and Tool Essentials
  • Tools and Traffic Sources
  • Tool Types – Inline/Out-of-Band
  • Choosing a Traffic Source
  • Tap Selection and Placement
Module 2: Addressing Common Threats
  • Review of Security Challenges
    • Traffic Source Selection
    • Threat Vectors
    • Common Security Vulnerabilities
    • Review of common threats
    • Basic Data Taxonomy
    • Democratization of Malware
    • Example of an Advanced Persistent Threat (APT)
    • What Can Be Done
    • Courses of Action
    • Ways to break a kill chain
    • The new security model
Module 3: Security and Monitoring Tools & Types
  • Tools, Tool Groupings, and What Traffic They Need
    • Security and Monitoring Tools
    • Security Tools
    • Supporting Security Tools
    • Deploying Security Tools
    • Out-of-Band Monitoring
    • Inline Monitoring
    • Inline/Out-of-Band Tool Impact
    • Company Philosophy
    • Tool Groupings and Arrangements
    • Tool Redundancy Schemes
    • Tool/group redundancy schemes
    • Inline Tool Failover Schemes
    • NAT/PAT Gateways
    • Passive or Explicit
    • Redundancy and Failover Schemes
    • Networking Infrastructure Devices
    • Traffic Forwarding
    • Traffic Types
Module 4: Gigamon Certified Professional Bootcamp Training (GCPB) –  Traffic Filtering
  • Networking protocol usage
  • Filtering Traffic
  • Traffic sizing considerations
  • Filtering Fundamentals
  • Packet Sizes and uses
  • Firewall Concepts
Module 5: Tool Sizing and Visibility Sizing
  • Traffic Requirements/minimum # tool nodes/sizing
  • Knowing When the Packet Access is Over-Subscribed
  • Packet access Sizing – Traffic Volume
  • Load sharing
Module 6: Gigamon Platform Architecture
  • Installation and Setup (GigaVUE)
  • Box Setup
  • Port behaviors
  • Basic Flow Mapping
Module 7: Traffic Intelligence – GigaSMART
  • GigaSMART Application usage
  • Highlighted GigaSMART Features – GigaSECURE
  • GigaSMART Performance and Capacity
  • GigaSMART sizing and restrictions
  • GigaSMART processing dependencies
Module 8: Classic Inline Bypass
  • Classic Inline Bypass data processing
  • Configuration specifics and examples
Module 9: Flexible Inline Bypass
  • Flexible Inline Bypass data processing
  • GigaSMART involvement/configuration
Module 10: Gigamon Certified Professional Bootcamp Training (GCPB) – SSL Essentials
  • Inline SSL decryption solution
  • URL categorization and whitelisting
Module 11: Implementing Inline SSL Decryption
  • Inline SSL configuration
  • Gigamon-specific support features
  • Whitelisting support & configuration
Module 12: Virtualization and Cloud Technologies
  • Virtual Machines Concepts
  • Virtual Networking Concepts
  • Cloud Architectures
  • Cloud Visibility Challenges
  • Solutions for Cloud Visibility
  • OpenStack Multi-Tenant
  • Amazon Web Services and Microsoft Azure
Module 13: GigaSECURE Cloud
  • GigaSECURE Cloud Visibility Elements
  • GigaSECURE for OpenStack, AWS, and Azure Deployments
  • Identify the Requirements; Size the Solution
Module 14: Gigamon SECURE Cloud: Solution Configurations
  • GigaSECURE Virtual Deployments
  • GigaSECURE Cloud Deployments
  • GigaSECURE Cloud: VSeries Appliance and Visibility Tier Deployments
Module 15: Gigamon Maintenance and Operations
  • User management
  • Product Upgrading and Updating
  • System requirements & process details
  • Clustering benefits
  • Configuration of Clustering

Gigamon Certified Professional Bootcamp Training (GCPB) – Labs:

  • Lab 1: Understanding Protocol Behaviors
  • Lab 2: Wireshark Trace File Activity
  • Lab 3: Trace File – HC2 Activity
  • Lab 4: Chassis Port Setup and Prep
  • Lab 5: GigaSMART Application: De-duplication
  • Lab 6: GigaSMART Application: NetFlow Generation
  • Lab 7: GigaSMART Application: Adaptive Packet Filtering
  • Lab 8: GigaSMART Application: Application Session Filtering
  • Lab 9: Trace File – SSL Activity
  • Lab 10: GigaSMART Application: Passive SSL Decryption
  • Lab 11: Classic Inline Bypass Configuration
  • Lab 12: Email Flexible Inline Bypass Configuration
  • Lab 13: GigaSMART Application: Inline SSL Decryption
  • Lab 14: GigaVUE-VM
  • Lab 15: Introduction to the Visibility Platform for AWS
  • Lab 16: Design a Basic Architecture for Private Cloud
  • Case Study: Design a Basic Architecture for VMware Private Cloud
  • Case Study: Design a Basic Architecture for OpenStack Private Cloud
  • Lab 17: Design a Basic Architecture for Public Cloud
  • Case Study: Visibility Tools Located in the Enterprise Data Center
  • Lab 18: Configuration Back Up and Restore
  • Lab 19: Removing All Configurations
  • Lab 20: H Series Clustering
  • Lab 21: Port Behavior Setup
  • Lab 22: Passall Configuration
  • Lab 23: Simple Flow Map Configuration
  • Lab 24: More Complex Flow Map Configuration with Rule Prioritization
  • Lab 25: Shared Collector Configuration
  • Lab 26: User-Defined Attribute Filter
  • Lab 27: Tool Mirror
  • Lab 28: Replication and Egress Filtering
  • Lab 29: Hybrid Ports
  • Lab 30: Tool GigaStream
  • Lab 31: Port-Pair
  • Lab 32: Snooping LLDP/CDP
Gigamon Certified Professional Bootcamp Training (GCPB)Gigamon Certified Professional Bootcamp Training (GCPB) Course Wrap-Up

REQUEST MORE INFORMATION