Gigamon Certified Professional Bootcamp (GCPB) – Outline

Detailed Course Outline

Module 1: Networking Technology

A review of how the network affects packet characteristics and packet-level access.

  • OSI Model and Visibility
  • Traffic Access
  • Applying OSI Model Knowledge

Module 2: Security Essentials

The challenges faced by SecOps cannot be met without good physical and cloud visibility.

  • OSI Model and Security
  • Visibility Supports Good Cyber-Security
  • Perimeter Defense
  • Cloud Operation and Security
  • Zero Trust
  • Threats & Risk Mitigation
  • Migrating to the Cloud
  • Security Protocols

Module 3: Implementing Security

Security tools depend on receiving the right traffic at a consumable rate. Unreliable traffic or too much traffic puts security at risk.

  • Security Tools
  • Traffic Sources
  • Inline Bypass
  • Inline Decryption

Module 4: Visibility Architectures

Implementing good visibility provides all tools access to the right traffic, and optimizes that traffic to reduce tool processing requirements.

  • Visibility Supports Good Cyber-Security Architecture
  • Installation and Configuration
  • Power Management
  • Port Types
  • Map Rules
  • Traffic Intelligence
  • Solution Sizing

Module 5: Cloud Technology

Evolving cloud functionality continues to present challenges for a good observability solution to overcome.

  • Evolution of Virtualization
  • Cloud Traffic Visibility
  • OSI Model and the Cloud
  • Virtual Traffic Access
  • Virtual Traffic Access Concerns

Module 6: Visibility in the Cloud

Cloud visibility demands a dynamically scalable solution that is consistent across multiple cloud providers.

  • Cloud Visibility
  • GigaVUE Cloud Suite™
    • Monitoring Domain
    • Monitoring Session
    • Automatic Target Selection
  • Accessing Cloud Traffic
    • VMware ESXi
    • VMware NSX-T
    • OpenStack
    • Azure
    • AWS

Module 7: Maintenance and Operations

Gigamon Deep Observability Pipeline administration.

  • Backup and Restore
  • GigaVUE-FM
  • Role Based Access Control (RBAC)
  • Moving or Replacing Modules
  • Clustering