Cyberoam Training
Introduction to Cyberoam
Gain an understanding of Cyberoam, including its objectives and key features. Learn about its role in network security and its integration with other security tools.
Cyberoam Architecture and Components
Explore the architecture of Cyberoam appliances and their components. Learn about the Firewall, VPN, Intrusion Prevention System (IPS), and their functions.
Installation and Configuration
Study the procedures for installing and configuring Cyberoam appliances. Understand system requirements, initial setup, and deployment best practices.
Policy Management
Learn how to configure and manage security policies in Cyberoam. Create and enforce firewall rules, VPN policies, and access control lists to protect network resources.
VPN Configuration
Study how to set up and manage Virtual Private Networks (VPNs) using Cyberoam. Configure site-to-site and remote access VPNs to ensure secure communications.
Intrusion Prevention System (IPS)
Understand the Intrusion Prevention System (IPS) features of Cyberoam. Learn how to configure and manage IPS settings to detect and prevent potential threats.
Monitoring and Reporting
Utilize Cyberoam’s monitoring and reporting tools. Learn to track network activity, generate reports, and analyze security incidents for effective management.
Backup and Recovery
Learn about backup and recovery procedures for Cyberoam configurations. Understand how to create backup schedules and restore configurations when needed.
Security Best Practices
Explore best practices for securing Cyberoam deployments. Learn about configuration hardening, regular updates, and maintaining a secure network environment.
Advanced Features and Troubleshooting
Delve into advanced features of Cyberoam and troubleshoot common issues. Study techniques for optimizing performance and resolving configuration problems.
Practical Exercises and Case Studies
Engage in practical exercises and case studies to apply Cyberoam concepts. Gain hands-on experience with real-world scenarios and configuration challenges.
Cyberoam syllabus
Cyberoam Product Overview
- Cyberoam UTM Overview
- Cyberoam Central Console Overview
- Cyberoam On-Cloud Management Overview
- Cyberoam iView Overview
Deploying Cyberoam
- Prerequisites for Deployment
- Network Diagrams Scenarios
- Deployment Scenarios (Transparent/Gateway/Mixed Mode)
- Failure of Security Device and Its Consequences
- Proxy Scenarios
- Managing Connectivity with Multiple ISPs
- Managing 3G and WiMAX Connections
Firewall
- What is a Firewall?
- Types of Firewall
- How to Control Access
- Identifying Each Machine on the Network
- Managing the Firewall
- NAT (Network Address Translation)
- DoS (Denial of Service)
- Fusion Technology-Based Unified Control
- Firewall as a Single Solution to Identity, Security, Connectivity, and Productivity
User Authentication
- What is Authentication?
- Requirement to Authenticate
- How Authentication Can Be Done?
- Types of Authentication (Single Sign-On, Local, and External)
- Group Authentication
- Traffic Discovery
- Authenticating from Servers (AD, LDAP, or RADIUS)
Web Filter
- Need for Web Filtering
- Web 2.0 Filtering
- Filtering with Keywords
- Filtering with URL
- Filtering by Categories
- Filtering Web Traffic
Application Firewall
- Evolution of Application Firewall
- File Filtering
- Application P2P Filtering
- Instant Messaging Filters
- Custom Filters
- Compliance-Based Filtering
Network Threat Protection
- Functioning of Anti-Virus and Anti-Spam
- Basics of Virus, Spyware, Malware, Phishing, and Pharming
- Web/Mail/FTP Anti-Virus
- Gateway-Level Antivirus/Anti-Spam
- Instant Messaging Anti-Virus
- Virus Outbreak Detection
- Recurrent Pattern Detection
- RBL (Real-Time Black List), IP Reputation
- Understanding of Intrusion
- Signature-Based Detection
- Statistical Anomaly-Based Detection
- Stateful Protocol Analysis Detection
- Network-Based IPS (NIPS)
- Wireless-Based IPS (WIPS)
- Network Behavior Analysis (NBA)
- Host-Based IPS (HIPS)
- WAF (Web Application Firewall)
VPN
- What is a VPN?
- Why Use a VPN?
- Advantages of VPN
- Types of VPN Based on Protocols
- Types of VPN Based on Tunnels
- The Need for Firewall in VPN
- Threat-Free Tunneling
- VPN Bandwidth Management
- VPN Failover
- Identity-Based Authentication in VPN
QoS (Quality of Service)
- What is QoS?
- Why QoS?
- Traffic Queuing
- Traffic Prioritization
- Bandwidth Allocation
- Scheduling and Sharing Bandwidth
- Guaranteed Bandwidth
- QoS Implementation on User, Group, Firewall, Application, Web Category
Network High Availability
- High Availability Overview & Concept
- LAN Failsafe
- Clustering of Devices
- Link Load Balancing
- Reasons for Load Balancing
- Link Failure Scenario
- Reasons for Failover
- Multilink Manager
- Load Balancing
- Active-Active Load Balancing and Gateway Failover
- Active-Passive Configuration and Gateway Failover
- MPLS Failover to VPN
- Automatic ISP Failover Detection
General Administration
- Setup Logging
- DNS Management
- DHCP Management
- Upgrading Device Firmware
- Backing Up
- Restoring
- Diagnostic Tools
- Troubleshooting Tools
- Hands-On Labs for Maintenance
Logging & Reporting
- Cyberoam iView Introduction
- Types of Reports
- Data Management
- Report Management
- Compliance Reports
- Searching Within Reports
- Identity-Based Reporting
Training
Basic Level Training
Duration : 1 Month
Advanced Level Training
Duration : 1 Month
Project Level Training
Duration : 1 Month
Total Training Period
Duration : 3 Months
Course Mode :
Available Online / Offline
Course Fees :
Please contact the office for details