Designing and Implementing the Gigamon Inline Bypass Threat Prevention Solution Training (GILB)

Designing and Implementing the Gigamon Inline Bypass Threat Prevention Solution Training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

Designing and Implementing the Gigamon Inline Bypass Threat Prevention Solution Training Course with Hands-on Labs

The Gigamon® Inline Bypass Threat Prevention Solution is purpose-built to simultaneously maximize inline security tool performance and reliability, network resiliency and operational efficiency.

The two-day Designing and Implementing the Gigamon Inline Bypass Threat Prevention Solution Training course will teach you how to best design and implement the Gigamon Inline Bypass Threat Prevention Solution to reduce costs, maximize security effectiveness and improve network resiliency. You’ll learn how to deliver the right data to the right tool at the right time, and learn how integrating advanced inline bypass functions helps redistribute traffic when a tool fails and maximizes the effectiveness of the remaining security tools.

After completing the Designing and Implementing the Gigamon Inline Bypass Threat Prevention Solution Training course, you will be able to:

• Simplify architectures and enable security tools to do more, enabling faster onboarding of patches and new technology
• Help improve security posture and reduce network downtime when changing threat prevention tools
• Demonstrate competency in deploying solutions to maximize the effectiveness of your security stack

Related Courses:

Gigamon Certified Professional Bootcamp Training (GCPB)
Gigamon Foundation: Learn the Essentials to Start on the Road to Success Training (GFND)
Designing and Implementing the Gigamon Inline Bypass Threat Prevention Solution Training (GILB)

Customize It:

• We can adapt this Designing and Implementing the Gigamon Inline Bypass Threat Prevention Solution Training course to your group’s background and work requirements at little to no added cost.
• If you are familiar with some aspects of this Designing and Implementing the Gigamon Inline Bypass Threat Prevention Solution Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Designing and Implementing the Gigamon Inline Bypass Threat Prevention Solution Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Designing and Implementing the Gigamon Inline Bypass Threat Prevention Solution Training course in manner understandable to lay audiences.

Audience / Target Group:

The primary target audiences for the Gigamon Foundation: Learn the Essentials to Start on the Road to Success Training course are:

• Security, networking and cloud architects, administrators and operations staff who are Gigamon customers but new to Gigamon products
• Gigamon partners who focus on security and networking and who are using Gigamon products for the first time

Before attending this Designing and Implementing the Gigamon Inline Bypass Threat Prevention Solution Training course, you should have an understanding of the following:

• Gigamon solution fundamentals around network visibility
• Inline tools like ATP, IPS and WAF
• GigaSMART® software features, uses and configuration
• OR take the Gigamon Foundation: Learn the Essentials to Start on the Road to Success (GFND) course

Designing and Implementing the Gigamon Inline Bypass Threat Prevention Solution Training – Objectives:

Upon completing this Designing and Implementing the Gigamon Inline Bypass Threat Prevention Solution Training course, learners will be able to meet these objectives:

• Data requirements for inline security and network analysis tools
• Approaches and considerations for packet access for inline tools
• Traffic sizing for inline security and network analysis tools
• How to filter traffic to meet the needs of security tools
• Load sharing between inline security and network analysis tools
• How to implement tool groupings for inline processing
• Traffic management for inline processing
• How to replicate traffic to out-of-band tools for augmenting inline security

Designing and Implementing the Gigamon Inline Bypass Threat Prevention Solution Training – Course Syllabus:

This Designing and Implementing the Gigamon Inline Bypass Threat Prevention Solution Training course includes approximately 12 hours of instruction time, including hands-on labs and several discrete, sequential modules that walk you through the materials covered:

• Module 1: GigaSECURE® Security Delivery Platform Overview
• Module 2: Inline Bypass Foundations
• Module 3: Design Considerations for the Inline Bypass Threat Prevention Solution
• Module 4: Flexible Inline Arrangements
• Module 5: Provisioning High Availability
• Module 6: Gigamon Inline SSL Decryption Design and Implementation

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email