Cyberoam Training

Introduction to Cyberoam

Gain an understanding of Cyberoam, including its objectives and key features. Learn about its role in network security and its integration with other security tools.

Cyberoam Architecture and Components

Explore the architecture of Cyberoam appliances and their components. Learn about the Firewall, VPN, Intrusion Prevention System (IPS), and their functions.

Installation and Configuration

Study the procedures for installing and configuring Cyberoam appliances. Understand system requirements, initial setup, and deployment best practices.

Policy Management

Learn how to configure and manage security policies in Cyberoam. Create and enforce firewall rules, VPN policies, and access control lists to protect network resources.

VPN Configuration

Study how to set up and manage Virtual Private Networks (VPNs) using Cyberoam. Configure site-to-site and remote access VPNs to ensure secure communications.

Intrusion Prevention System (IPS)

Understand the Intrusion Prevention System (IPS) features of Cyberoam. Learn how to configure and manage IPS settings to detect and prevent potential threats.

Monitoring and Reporting

Utilize Cyberoam’s monitoring and reporting tools. Learn to track network activity, generate reports, and analyze security incidents for effective management.

Backup and Recovery

Learn about backup and recovery procedures for Cyberoam configurations. Understand how to create backup schedules and restore configurations when needed.

Security Best Practices

Explore best practices for securing Cyberoam deployments. Learn about configuration hardening, regular updates, and maintaining a secure network environment.

Advanced Features and Troubleshooting

Delve into advanced features of Cyberoam and troubleshoot common issues. Study techniques for optimizing performance and resolving configuration problems.

Practical Exercises and Case Studies

Engage in practical exercises and case studies to apply Cyberoam concepts. Gain hands-on experience with real-world scenarios and configuration challenges.

Cyberoam syllabus

Cyberoam Product Overview

  • Cyberoam UTM Overview
  • Cyberoam Central Console Overview
  • Cyberoam On-Cloud Management Overview
  • Cyberoam iView Overview

Deploying Cyberoam

  • Prerequisites for Deployment
  • Network Diagrams Scenarios
  • Deployment Scenarios (Transparent/Gateway/Mixed Mode)
  • Failure of Security Device and Its Consequences
  • Proxy Scenarios
  • Managing Connectivity with Multiple ISPs
  • Managing 3G and WiMAX Connections

Firewall

  • What is a Firewall?
  • Types of Firewall
  • How to Control Access
  • Identifying Each Machine on the Network
  • Managing the Firewall
  • NAT (Network Address Translation)
  • DoS (Denial of Service)
  • Fusion Technology-Based Unified Control
  • Firewall as a Single Solution to Identity, Security, Connectivity, and Productivity

User Authentication

  • What is Authentication?
  • Requirement to Authenticate
  • How Authentication Can Be Done?
  • Types of Authentication (Single Sign-On, Local, and External)
  • Group Authentication
  • Traffic Discovery
  • Authenticating from Servers (AD, LDAP, or RADIUS)

Web Filter

  • Need for Web Filtering
  • Web 2.0 Filtering
  • Filtering with Keywords
  • Filtering with URL
  • Filtering by Categories
  • Filtering Web Traffic

Application Firewall

  • Evolution of Application Firewall
  • File Filtering
  • Application P2P Filtering
  • Instant Messaging Filters
  • Custom Filters
  • Compliance-Based Filtering

Network Threat Protection

  • Functioning of Anti-Virus and Anti-Spam
  • Basics of Virus, Spyware, Malware, Phishing, and Pharming
  • Web/Mail/FTP Anti-Virus
  • Gateway-Level Antivirus/Anti-Spam
  • Instant Messaging Anti-Virus
  • Virus Outbreak Detection
  • Recurrent Pattern Detection
  • RBL (Real-Time Black List), IP Reputation
  • Understanding of Intrusion
  • Signature-Based Detection
  • Statistical Anomaly-Based Detection
  • Stateful Protocol Analysis Detection
  • Network-Based IPS (NIPS)
  • Wireless-Based IPS (WIPS)
  • Network Behavior Analysis (NBA)
  • Host-Based IPS (HIPS)
  • WAF (Web Application Firewall)

VPN

  • What is a VPN?
  • Why Use a VPN?
  • Advantages of VPN
  • Types of VPN Based on Protocols
  • Types of VPN Based on Tunnels
  • The Need for Firewall in VPN
  • Threat-Free Tunneling
  • VPN Bandwidth Management
  • VPN Failover
  • Identity-Based Authentication in VPN

QoS (Quality of Service)

  • What is QoS?
  • Why QoS?
  • Traffic Queuing
  • Traffic Prioritization
  • Bandwidth Allocation
  • Scheduling and Sharing Bandwidth
  • Guaranteed Bandwidth
  • QoS Implementation on User, Group, Firewall, Application, Web Category

Network High Availability

  • High Availability Overview & Concept
  • LAN Failsafe
  • Clustering of Devices
  • Link Load Balancing
  • Reasons for Load Balancing
  • Link Failure Scenario
  • Reasons for Failover
  • Multilink Manager
  • Load Balancing
  • Active-Active Load Balancing and Gateway Failover
  • Active-Passive Configuration and Gateway Failover
  • MPLS Failover to VPN
  • Automatic ISP Failover Detection

General Administration

  • Setup Logging
  • DNS Management
  • DHCP Management
  • Upgrading Device Firmware
  • Backing Up
  • Restoring
  • Diagnostic Tools
  • Troubleshooting Tools
  • Hands-On Labs for Maintenance

Logging & Reporting

  • Cyberoam iView Introduction
  • Types of Reports
  • Data Management
  • Report Management
  • Compliance Reports
  • Searching Within Reports
  • Identity-Based Reporting

Training

Basic Level Training

Duration : 1 Month

Advanced Level Training

Duration : 1 Month

Project Level Training

Duration : 1 Month

Total Training Period

Duration : 3 Months

Course Mode :

Available Online / Offline

Course Fees :

Please contact the office for details

Placement Benefit Services

Provide 100% job-oriented training
Develop multiple skill sets
Assist in project completion
Build ATS-friendly resumes
Add relevant experience to profiles
Build and enhance online profiles
Supply manpower to consultants
Supply manpower to companies
Prepare candidates for interviews
Add candidates to job groups
Send candidates to interviews
Provide job references
Assign candidates to contract jobs
Select candidates for internal projects

Note

100% Job Assurance Only
Daily online batches for employees
New course batches start every Monday