Detailed Course Outline
Module 1: Security Design Concepts
- Understanding Security Threats
- Attack Evolution
- Challenges in Detecting Threats
- Security Architecture Fundamentals
- Unified and Centralized Management
- Threat-Centric Security Model
- Multilayer Protection
Module 2: Gigamon Secure Delivery Platform
- Architecture and Components
- Deployment of inline Tools, Out-of-Band Tools, Redundancy, Asymmetric Routing
- Using SSL Decryption
- Deployment Case Studies
- Simple Inline Tool
- Inline and Out-of-Band Tool
- Redundancy
- Introducing GigaSECURE
Module 3: Gigamon Deployment Architectures
- Improving Network Security
- Inline Bypass Overview
- Inline Monitoring
- GigaSMART Overview
- GigaVUE-HC2 Product Overview
Module 4: Introducing BlueCoat
- BlueCoat Introduction
- Theory of Operation
- File Extraction
- Data Enrichment
- Threat BLADES
- Looking for Indicators of Compromise (IOCs)
- Integration
- The Virtual File System (VFS)
- File Extraction (Introduction)
- Management, Monitoring, and Maintenance
- BlueCoat Operation and Configuration
- Security Analytics Product Introduction
- Solution Design
- Installation and Setup
- Security Analytics User Interface
- Reports – What Do They Tell Me?
- Filters to Query Report Data
- Favorites
- BlueCoat Deployment
- Physical network deployment with appliances
- Security Analytics for incident-response
- Advanced Display Filters
- Applying Kill-chain Analysis
Module 5: BlueCoat with Gigamon Inline Deployment
- Solution Overview
- Use Cases
- Architectural Overview
- Components and Version Compatibility
- Network architecture
- BlueCoat Configuration
- GigaVUE-HC2 Configuration
- Testing and Verification
Labs
- Designing a security architecture with Gigamon solutions
- Designing a security architecture with BlueCoat physical appliances
- BlueCoat configuration for a joint inline deployment solution
- Gigamon configuration for a joint inline deployment solution
- Testing and verification of a joint inline deployment solution using BlueCoat and Gigamon