Prerequisites
To apply for the Cyberoam Training, you need to either:
- You should have a basic understanding of computer networking concepts like TCP/IP, DNS and firewalls
- You should have a basic understanding of Operating systems like Windows & Linux
- You should have a basic understanding of security concepts like access control, encryption and authentication
- You should also be familiar with at least one programming language like Java, Ruby or Python.
Course Curriculum
Module 1: Introduction to Cyberoam product
- Cyberoam UTM overview
- Cyberoam Central Console Overview
- Cyberoam on-cloud management overview
- Cyberoam iView Overview
Module 2: Cyberoam Deployment
- Exploring requisites for deployment
- Understanding the Network Diagrams & Scenarios
- Learn about various deployment scenarios in Transparent, Gateway and Mixed Mode
- Learn about the Failure of Security Device & its Consequences
- Understanding about the Proxy Scenarios
- Learn to manage the connectivity with multiple ISP’s
- Managing 3G and Wimax connections securely
Module 3: Firewall
- Firewall and its types
- Learn how to control access to firewalls.
- Understanding on how to identify each component on the network
- Learn to manage the firewall, NAT and DoS
- Explore about the Fusion Technology based Unified Control
- Exploring how Firewall ,as a single solution to identity, security, connectivity, and productivity
Module 4: User authentication
- Authentication overview and requirement to Authenticate
- How can Authentication be done?
- Different Types of Authentication Such as Single Sign-On, Local, and External
- Group Authentication and Traffic Discovery
- Learn to perform Authenticating from Servers such as AD, LDAP, or RADIUS.
Module 5: Web filtering
- Explore the reasons for Web Filtering
- Understanding Web 2.0 Filtering
- Learn how to filter with Keywords, URL, by categories and web traffic.
Module 6: Network threat protection
- Explore the functioning of Anti-Virus & Anti-Spam
- Basics of Virus, Spyware, Malware, Phishing, and Pharming.
- Web/Mail/FTP Anti-Virus,Gateway level Antivirus/Anti-Spam,Instant Messaging Anti-Virus
- Virus Outbreak Detection and Recurrent Pattern Detection
- Real-time Black List, IP Reputation
- Understanding of Intrusion,Signature-based detection
- Statistical anomaly-based detection and Stateful protocol analysis detection
- Exploring the Network-Based IPS (NIPS) & Wireless Based IPS (WIPS)
- Understanding the Network Behaviour Analysis (NBA) and Host-Based IPS (HIPS)
Module 7: VPN
- VPN Overview
- Reasons for using VPN, benefits of using VPN
- Exploring the types of VPN based on protocols and types of VPN Based on Tunnels
- Understanding the need for firewall in VPN
- Threat Free Tunneling and VPN Bandwidth Management
- Learning about the VPN Failover and Identity-based authentication in VPN
Module 8: Application firewall
- Introduction of Application Firewall and file filtering
- Application & P2P Filtering
- Instant Messaging Filters, Custom Filters and Compliance based filtering
Module 9: QoS
- QoS Briefing
- Reasons for QoS
- Traffic Queuing and Traffic Prioritisation
- Bandwidth Allocation, Scheduling, and sharing bandwidth
- Guaranteed bandwidth
- Exploring the QoS implementation on the user, group, firewall, application, web category.
Module 10: Network HA
- Understanding the High Availability, LAN Failsafe
- Learning on how to do Clustering of devices
- Exploring the link load balancing and Why undertake to balance?
- Link fails scenario and Why failover
- Multilink Manager and Load balancing
- Understanding about the Active-Active load balancing and gateway failover
- Learn about the Active-Passive configuration and gateway failover
- MPLS failover to VPN and Automatic ISP failover detection
Module 11: General Administration
- Exploring on how to Setup Logging
- Understanding about the DNS Management, DHCP Management
- Learn about the Upgrading Device Firmware, Backing Up,Restoring
- Exploring about the Diagnostic Tools and troubleshooting Tools
Module 12: Logging and reporting
- Cyberoam iView Introduction
- Types of Reports
- Explore the Data Management and Report Management
- Understanding about the Compliance reports, Searching within reports and Identity-based reporting
Module 13: Conclusion
- Summarizing the discussed modules in detail