Gigamon Professional Bootcamp (GCPB) – Outline

Detailed Course Outline

Module 1: Security and Tool Essentials

  • Tools and Traffic Sources
  • Tool Types – Inline/Out-of-Band
  • Choosing a Traffic Source
  • Tap Selection and Placement

Module 2: Addressing Common Threats

  • Review of Security Challenges
    • Traffic Source Selection
    • Threat Vectors
    • Common Security Vulnerabilities
    • Review of common threats
    • Basic Data Taxonomy
    • Democratization of Malware
    • Example of an Advanced Persistent Threat (APT)
    • What Can Be Done
    • Courses of Action
    • Ways to break a kill chain
    • The new security model

Module 3: Security and Monitoring Tools & Types

  • Tools, Tool Groupings and What Traffic They Need
    • Security and Monitoring Tools
    • Security Tools
    • Supporting Security Tools
    • Deploying Security Tools
    • Out-of-Band Monitoring
    • Inline Monitoring
    • Inline/Out-of-Band Tool Impact
    • Company Philosophy
    • Tool Groupings and Arrangements
    • Tool Redundancy Schemes
    • Tool/group redundancy schemes
    • Inline Tool Failover Schemes
    • NAT/PAT Gateways
    • Passive or Explicit
    • Redundancy and Failover Schemes
    • Networking Infrastructure Devices
    • Traffic Forwarding
    • Traffic Types

Module 4: Network Traffic Filtering and Triggers

  • Networking protocol usage
  • Filtering Traffic
  • Traffic sizing considerations
  • Filtering Fundamentals
  • Packet Sizes and uses
  • Firewall Concepts

Module 5: Tool Sizing and Visibility Sizing

  • Traffic Requirements/minimum # tool nodes/sizing
  • Knowing When the Packet Access is Over-Subscribed
  • Packet access Sizing – Traffic Volume
  • Load sharing

Module 6: Gigamon Platform Essentials

  • Installation and Setup
  • Box Setup
  • Port behaviors
  • Basic Flow Mapping

Module 7: GigaSMART Implementation

  • GigaSMART Application usage
  • Highlighted GigaSMART Features – GigaSECURE
  • GigaSMART Performance and Capacity
  • GigaSMART sizing and restrictions
  • GigaSMART processing dependencies

Module 8: Classic Inline Bypass

  • Classic Inline Bypass data processing
  • Configuration specifics and examples

Module 9: Flexible Inline Bypass

  • Flexible Inline Bypass data processing
  • GigaSMART involvement / configuration

Module 10: SSL Essentials

  • Inline SSL decryption solution
  • URL categorization and whitelisting

Module 11: Implementing Inline SSL Decryption

  • Inline SSL configuration
  • Gigamon specific support features
  • Whitelisting support & configuration

Module 12: Gigamon Virtualization and Cloud Technologies

  • Gigamon Cloud Solutions Configurations
    • GigaVUE-VM and VMware Deployments
    • Installation and Configuration
    • GigaVUE-VM Configuration Elements
    • GigaVUE-VM with VMware ESXi Deployment Sequence
    • Network Virtualization: VMware NSX
  • Multi-Tenant Networks
  • V Series appliance and Visibility Tier Deployments – OpenStack
  • Gigamon Public Cloud Solutions

Module 13: Virtualization and Cloud Technologies

  • Cloud Sizing & design considerations
  • Basic Virtualization of Networking
  • Cloud Architectures
  • Full Public Cloud Deployment
  • Private Cloud Deployments in VMware
  • Visibility in Multi-tenant Deployments
  • Solutions for Cloud Visibility

Module 14: Packet Access Scoping for Virtual Environments

  • Gaining Visibility into Cloud Traffic
  • Visibility Elements for VMware NSX
  • Visibility Elements for Public Cloud & OpenStack
  • OpenStack Overview
  • Public Cloud AWS

Module 15: Gigamon Maintenance and Operations

  • User management
  • Product Upgrading and Updating
  • System requirements & process details
  • Clustering benefits
  • Configuration of Clustering

Labs:

  • Traffic forwarding
  • GigaSMART NetFlow sizing
  • De-Duplication
  • NetFlow
  • Passive SSL Decryption (Optional)
  • APF (Optional)
  • ASF (Optional)
  • Inline Bypass
  • Flexible Inline Bypass
  • Inline SSL
  • GigaVUE-VM
  • Amazon Test drive
  • Case Study Labs from GigaPRO Professional
  • Configuration Backup & Restore (Optional)
  • Configuration of Clustering (Optional)