Course outline

Sale!

Implementing Gigamon Packet Access Solutions

Topics: , ,

US$490.00 US$10.00

This video course is a combination of practical topics to introduce you not only to the Gigamon® platform but also to the concepts of ‘Packet Access’ technology.

Share it:

FacebookTwitterGoogle PlusLinkedinEmail

Access Duration: Unlimited

Share it:

FacebookTwitterGoogle PlusLinkedinEmail

What’s in it for me?

Taking a look at the description of this course, you may be asking yourself – What’s in this course that I would be interested in?

This is Susanne Haas, I am a network architect and engineer as well as an instructor. I am also the person who has developed this course.

And here is a sampling of what we’ll be covering:

This video course is a combination of practical topics to introduce you not only to the Gigamon® platform but also to the concepts of ‘Packet Access’ technology.

This course is for anyone implementing a packet access solution in their network.  It is especially for those of you who have decided to implement a Gigamon Visibility Platform packet access solution.

You do not need to have any in-depth knowledge of packet access solutions, just a good basic background in networking and possibly security since these are the environments into which the packet access solutions fit.

Through this course, you will learn the key requirements for sharing packets between your network and security tools. You will also learn about key features and the configuration of Gigamon® devices as well as the value of properly incorporating a packet access Visibility Fabric™ into your network monitoring system. The material covered has been recently updated to include the latest capabilities and features released from Gigamon.

With increasing demands for agility and automation in the IT infrastructure and with ever-changing threat patterns in the network traffic, there is a critical need to automatically detect, react, and respond to these threats while also integrating visibility into IT operations management.

This course will teach you how to use Gigamon’s packet access technology to gain visibility into your network traffic to prevent these threats.

You will learn how to leverage the advanced processing capabilities of the GigaSMART® engine to process incoming traffic streams in a variety of ways to augment security analysis. You will also learn how to configure popular GigaSMART features such as De-Duplication, Adaptive Packet Filtering and NetFlow with Metadata.

We will walk through extensive configuration demonstrations that will show you how to use most of the capabilities and features available from any H Series node, as well as nodes configured with advanced features such as GigaSMART capability.

Because some of you may be more comfortable working with a Command Line Interface and others more comfortable with a GUI, we will be demonstrating the configuration of these features from both the CLI and GUI interfaces. These modules also walk you through the considerations for implementing a packet access solution in both physical and virtualized environments.

In addition, I have tried to make this course very visually interactive to help you remember the concepts covered.

So, with all of that said, I hope you will enjoy this course as well as others we have put together here at Digital Revolver.  Thank you!

Overview

  • Gigamon Solution Overview Part 1 Free Trial
  • Gigamon Solution Overview Part 2
  • Gigamon High Density Solution Part 1
  • Gigamon High Density Solution Part 2
  • Gigamon High Density Solution Part 3
  • Gigamon Active Visibility beyond tap and aggregation

2

  • Gigamon Selecting a Traffic Source
  • Gigamon Initial Setup of H-Series Nodes

GigaVUE-FM

  • Gigamon GigaVUE-FM part 1
  • Gigamon GigaVUE-FM part 2

4

  • Gigamon Port Types Part 1
  • Gigamon Port Types part 2
  • Gigamon Basic Flow Mapping part 1
  • Gigamon Basic Flow Mapping part 2
  • Gigamon Additional Filter Types

GigaSMART

  • Gigamon GigaSMART Overview
  • Gigamon GigaSMART Deduplication Part 1
  • DR Gigamon GigaSMART Deduplication Part 2
  • Gigamon GigaSMART Packet Slicing Part 1
  • Gigamon GigaSMART Packet Slicing Part 2
  • Gigamon GigaSMART Packet Masking Part 1
  • Gigamon GigaSMART Packet Masking Part 2
  • Gigamon GigaSMART Tunneling Part 1
  • Gigamon GigaSMART Tunneling Part 2
  • Gigamon GigaSMART Adaptive Packet Filtering Charateristics and Use Cases
  • Gigamon GigaSMART Adaptive Packet Filtering Configuration part 1
  • Gigamon GigaSMART Adaptive Packet Filtering Configuration part 2
  • Gigamon GigaSMART NetFlow Generation and Use Cases part 1
  • Gigamon GigaSMART NetFlow Generation and Use Cases part 2
  • Gigamon GigaSMART NetFlow Configuration part 1
  • Gigamon GigaSMART NetFlow Configuration part 2
  • Gigamon GigaSMART NetFlow Configuration part 3
  • Gigamon GigaSMART SSL Decryption Overview and Use Cases
  • Gigamon GigaSMART SSL Decryption Configuration part 1
  • Gigamon GigaSMART SSL Decryption Configuration part 2

6

  • Gigamon Private Cloud Solutions GigaVUE-VM part 1
  • Gigamon Private Cloud Solutions GigaVUE-VM part 2
  • DR Gigamon for OpenStack
  • Gigamon Public Cloud Solutions Gigamon for AWS
Privacy and Cookies

This website stores cookies on your computer which help us make the website work better for you.

Learn moreAccept and Close
Social media & sharing icons powered by UltimatelySocial