Detailed Course Outline
Module 1: Networking Technology
A review of how the network affects packet characteristics and packet-level access.
- OSI Model and Visibility
- Traffic Access
- Tap Selection
- Applying OSI Model Knowledge
Module 2: Visibility Architectures
Implementing good visibility provides all tools access to the right traffic, and optimizes that traffic to reduce tool processing requirements.
- Visibility Supports Good Cybersecurity Architecture
- Installation and Configuration
- Port Types
- Map Rules
- Traffic Intelligence
- Solution Sizing
Module 3: Security Essentials
The challenges faced by SecOps cannot be met without good physical and cloud visibility.
- OSI Model and Security
- Visibility Supports Good Cyber-Security
- Perimeter Defense
- Zero Trust
- Threats and Risk Mitigation
- Migrating to the Cloud
- Deep Packet Inspection
- Security Tools
- Traffic Fidelity
- Stakeholders
Module 4: Implementing Security
Security tools depend on receiving the right traffic at a consumable rate. Unreliable traffic or too much traffic puts security at risk.
- Inline Bypass
- Security Protocols
- Inline Decryption
- Redundant Networking Arrangements
- Traffic Sources
Module 5: Cloud Technology
Evolving cloud functionality continues to present challenges for a good observability solution to overcome.
- Evolution of Virtualization
- Cloud Traffic Visibility
- OSI Model and the Cloud
- Virtual Traffic Access
- Virtual Traffic Access Concerns
- Cloud Security
Module 6: Visibility in the Cloud
Cloud visibility demands a dynamically scalable solution that is consistent across multiple cloud providers.
- Cloud Visibility
- GigaVUE Cloud Suite™
- Monitoring Domain
- Monitoring Session
- Automatic Target Selection
- Traffic Delivery Review
- Accessing Cloud Traffic
- VMware ESXi
- VMware NSX-T
- OpenStack
- Azure
- AWS
Module 7: Maintenance and Operations
Gigamon Deep Observability Pipeline administration.
- Installation and Configuration
- Power Management
- Backup and Restore
- GigaVUE-FM
- Role Based Access Control (RBAC)
- Clustering
- Licensing
- Moving or Replacing Modules
- Software Upgrade