Course Overview
The Gigamon Professional Bootcamp (GPB) is a 5-day, instructor-led course that teaches security, network, cloud and sales engineers security fundamentals for implementing Gigamon technologies to feed the right network traffic to the right security tools to monitor data-in-motion as part of a comprehensive security strategy.
The course illustrates the concepts needed by a network visibility specialist, as well as provides hands-on experience in implementing the Gigamon Deep Observability Pipeline to harnesses actionable network derived intelligence and insights to amplify the power of your cloud, security, and observability tools. This course also provides instruction into the knowledge, skills and attitudes needed for implementing deep observability into physical, hybrid, and cloud networks.
Who should attend
The primary target audiences for the course are:
- All end users of Gigamon products
- Security operations professionals and architects
- Network operations professionals and architects
- Professional service and system integrations specialists
- Network and security administrators and architects
- Participants of the Gigamon Partner Program and Gigamon Support Partner Program (GSPP) or Gigamon Professional Services Program (GPSP)
Prerequisites
IMPORTANT: It is recommended that you have the following pre-requisites prior to taking the GPB course:
- Basic working knowledge of Gigamon products and configuration
- !
- !
- Gigamon Inline Bypass: Designing and Implementing Inline Bypass (ILB SOLUTIONS)
- Gigamon Inline SSL/TLS Decryption: Designing and Implementing Inline SSL/TLS Solutions (SSL SOLUTIONS)
Course Objectives
A specialist providing network visibility must have a basic level of knowledge in four major categories in order to assist and advise management and the various network and security tool operators in how to provide complete and trustworthy network traffic and flow summary data to meet the organization’s monitoring and security needs. This course focuses on Gigamon products, basic networking, security, and cloud as they relate to network visibility solutions. The course provides instruction in support of the following:
- Understand approaches and considerations for out-of-band packet access
- How to select a trustworthy traffic source
- How to implement a packet access solution in a physical network infrastructure
- Methods and options for matching traffic volume with tool capacity
- How to implement packet optimization for analysis
- Connectivity requirements for inline and out-of-band tools
- Approaches and considerations for packet access for inline tools
- How to replicate traffic to out-of-band tools for augmenting inline security
- How to implement tool groupings and load sharing for inline processing
- Traffic sizing for inline security and network analysis tools
- Approaches and considerations for packet access in the cloud
- How to implement a packet access solution in a cloud or hybrid network infrastructure
- How to extract virtualized traffic for use with virtualized and physical tools
- How to perform visibility solution maintenance and operations