Course Overview
The Gigamon Professional Bootcamp (GPB) is a 5-day, instructor-led course that teaches security, network, cloud and sales engineers security fundamentals for implementing Gigamon technologies to feed the right network traffic to the right security tools to monitor data-in-motion as part of a comprehensive security strategy.
The course illustrates the concepts needed by a network visibility specialist, as well as provides hands-on experience in implementing the Gigamon Deep Observability Pipeline to harnesses actionable network derived intelligence and insights to amplify the power of your cloud, security, and observability tools. This course also provides instruction into the knowledge, skills and attitudes needed for implementing deep observability into physical, hybrid, and cloud networks.
Who should attend
The primary target audiences for the course are:
- All end users of Gigamon products
- Security operations professionals and architects
- Network operations professionals and architects
- Professional service and system integrations specialists
- Network and security administrators and architects
- Participants of the Gigamon Partner Program and Gigamon Support Partner Program (GSPP) or Gigamon Professional Services Program (GPSP)
Prerequisites
IMPORTANT: It is recommended that you have the following pre-requisites prior to taking the GPB course:
- Basic working knowledge of Gigamon products and configuration
- Gigamon Foundations I: Insight into Network Data Across Your Network (GFD1)
- Gigamon Foundations II: GigaSMART Traffic Intelligence Services (GFD2)
- Gigamon Inline Bypass: Designing and Implementing Inline Bypass (ILB SOLUTIONS)
- Gigamon Inline SSL/TLS Decryption: Designing and Implementing Inline SSL/TLS Solutions (SSL SOLUTIONS)
Course Objectives
A specialist providing network visibility must have a basic level of knowledge in four major categories in order to assist and advise management and the various network and security tool operators in how to provide complete and trustworthy network traffic and flow summary data to meet the organization’s monitoring and security needs. This course focuses on Gigamon products, basic networking, security, and cloud as they relate to network visibility solutions. The course provides instruction in support of the following:
- Understand approaches and considerations for out-of-band packet access
- How to select a trustworthy traffic source
- How to implement a packet access solution in a physical network infrastructure
- Methods and options for matching traffic volume with tool capacity
- How to implement packet optimization for analysis
- Connectivity requirements for inline and out-of-band tools
- Approaches and considerations for packet access for inline tools
- How to replicate traffic to out-of-band tools for augmenting inline security
- How to implement tool groupings and load sharing for inline processing
- Traffic sizing for inline security and network analysis tools
- Approaches and considerations for packet access in the cloud
- How to implement a packet access solution in a cloud or hybrid network infrastructure
- How to extract virtualized traffic for use with virtualized and physical tools
- How to perform visibility solution maintenance and operations
Outline: Gigamon Professional Bootcamp (GCPB)
Module 1: Networking Technology
A review of how the network affects packet characteristics and packet-level access.
- OSI Model and Visibility
- Traffic Access
- Tap Selection
- Applying OSI Model Knowledge
Module 2: Visibility Architectures
Implementing good visibility provides all tools access to the right traffic, and optimizes that traffic to reduce tool processing requirements.
- Visibility Supports Good Cybersecurity Architecture
- Installation and Configuration
- Port Types
- Map Rules
- Traffic Intelligence
- Solution Sizing
Module 3: Security Essentials
The challenges faced by SecOps cannot be met without good physical and cloud visibility.
- OSI Model and Security
- Visibility Supports Good Cyber-Security
- Perimeter Defense
- Zero Trust
- Threats and Risk Mitigation
- Migrating to the Cloud
- Deep Packet Inspection
- Security Tools
- Traffic Fidelity
- Stakeholders
Module 4: Implementing Security
Security tools depend on receiving the right traffic at a consumable rate. Unreliable traffic or too much traffic puts security at risk.
- Inline Bypass
- Security Protocols
- Inline Decryption
- Redundant Networking Arrangements
- Traffic Sources
Module 5: Cloud Technology
Evolving cloud functionality continues to present challenges for a good observability solution to overcome.
- Evolution of Virtualization
- Cloud Traffic Visibility
- OSI Model and the Cloud
- Virtual Traffic Access
- Virtual Traffic Access Concerns
- Cloud Security
Module 6: Visibility in the Cloud
Cloud visibility demands a dynamically scalable solution that is consistent across multiple cloud providers.
- Cloud Visibility
- GigaVUE Cloud Suite™
- Monitoring Domain
- Monitoring Session
- Automatic Target Selection
- Traffic Delivery Review
- Accessing Cloud Traffic
- VMware ESXi
- VMware NSX-T
- OpenStack
- Azure
- AWS
Module 7: Maintenance and Operations
Gigamon Deep Observability Pipeline administration.
- Installation and Configuration
- Power Management
- Backup and Restore
- GigaVUE-FM
- Role Based Access Control (RBAC)
- Clustering
- Licensing
- Moving or Replacing Modules
- Software Upgrade