Esquema Detallado del Curso
Module 1: Security and Tool Essentials
- Tools and Traffic Sources
- Tool Types – Inline/Out-of-Band
- Choosing a Traffic Source
- Tap Selection and Placement
Module 2: Addressing Common Threats
- Review of Security Challenges
- Traffic Source Selection
- Threat Vectors
- Common Security Vulnerabilities
- Review of common threats
- Basic Data Taxonomy
- Democratization of Malware
- Example of an Advanced Persistent Threat (APT)
- What Can Be Done
- Courses of Action
- Ways to break a kill chain
- The new security model
Module 3: Security and Monitoring Tools & Types
- Tools, Tool Groupings and What Traffic They Need
- Security and Monitoring Tools
- Security Tools
- Supporting Security Tools
- Deploying Security Tools
- Out-of-Band Monitoring
- Inline Monitoring
- Inline/Out-of-Band Tool Impact
- Company Philosophy
- Tool Groupings and Arrangements
- Tool Redundancy Schemes
- Tool/group redundancy schemes
- Inline Tool Failover Schemes
- NAT/PAT Gateways
- Passive or Explicit
- Redundancy and Failover Schemes
- Networking Infrastructure Devices
- Traffic Forwarding
- Traffic Types
Module 4: Network Traffic Filtering and Triggers
- Networking protocol usage
- Filtering Traffic
- Traffic sizing considerations
- Filtering Fundamentals
- Packet Sizes and uses
- Firewall Concepts
Module 5: Tool Sizing and Visibility Sizing
- Traffic Requirements/minimum # tool nodes/sizing
- Knowing When the Packet Access is Over-Subscribed
- Packet access Sizing – Traffic Volume
- Load sharing
Module 6: Gigamon Platform Essentials
- Installation and Setup
- Box Setup
- Port behaviors
- Basic Flow Mapping
Module 7: GigaSMART Implementation
- GigaSMART Application usage
- Highlighted GigaSMART Features – GigaSECURE
- GigaSMART Performance and Capacity
- GigaSMART sizing and restrictions
- GigaSMART processing dependencies
Module 8: Classic Inline Bypass
- Classic Inline Bypass data processing
- Configuration specifics and examples
Module 9: Flexible Inline Bypass
- Flexible Inline Bypass data processing
- GigaSMART involvement / configuration
Module 10: SSL Essentials
- Inline SSL decryption solution
- URL categorization and whitelisting
Module 11: Implementing Inline SSL Decryption
- Inline SSL configuration
- Gigamon specific support features
- Whitelisting support & configuration
Module 12: Gigamon Virtualization and Cloud Technologies
- Gigamon Cloud Solutions Configurations
- GigaVUE-VM and VMware Deployments
- Installation and Configuration
- GigaVUE-VM Configuration Elements
- GigaVUE-VM with VMware ESXi Deployment Sequence
- Network Virtualization: VMware NSX
- Multi-Tenant Networks
- V Series appliance and Visibility Tier Deployments – OpenStack
- Gigamon Public Cloud Solutions
Module 13: Virtualization and Cloud Technologies
- Cloud Sizing & design considerations
- Basic Virtualization of Networking
- Cloud Architectures
- Full Public Cloud Deployment
- Private Cloud Deployments in VMware
- Visibility in Multi-tenant Deployments
- Solutions for Cloud Visibility
Module 14: Packet Access Scoping for Virtual Environments
- Gaining Visibility into Cloud Traffic
- Visibility Elements for VMware NSX
- Visibility Elements for Public Cloud & OpenStack
- OpenStack Overview
- Public Cloud AWS
Module 15: Gigamon Maintenance and Operations
- User management
- Product Upgrading and Updating
- System requirements & process details
- Clustering benefits
- Configuration of Clustering
Labs:
- Traffic forwarding
- GigaSMART NetFlow sizing
- De-Duplication
- NetFlow
- Passive SSL Decryption (Optional)
- APF (Optional)
- ASF (Optional)
- Inline Bypass
- Flexible Inline Bypass
- Inline SSL
- GigaVUE-VM
- Amazon Test drive
- Case Study Labs from GigaPRO Professional
- Configuration Backup & Restore (Optional)
- Configuration of Clustering (Optional)