cyberoam administration from HKR Training

Posted By : User Ref No: WURUR67409 0
  • Image
  • TypeTraining or Development Class
  • Image
  • Location Hyderabad, Telangana, India
  • Price
  • Date 23-09-2020 - 30-09-2020
cyberoam administration from HKR Training, Hyderabad, Telangana, India
Training or Development Class Title
cyberoam administration from HKR Training
Event Type
Training or Development Class
Training or Development Class Date
23-09-2020 to 30-09-2020
Last Date for Applying
30-09-2020
Location
Hyderabad, Telangana, India
Organization Name / Organize By
HKR Trainings
Organizing/Related Departments
HKR Software Trainings
Organization Type
Engineering and Technology
Training or Development ClassCategory
Both (Technical & Non Technical)
Training or Development ClassLevel
All (State/Province/Region, National & International)
Related Industries

Education/Teaching/Training/Development

Computer Science

Information Technology

Computer/Technology

Internet/Ecommerce

Location
Hyderabad, Telangana, India

 

Cyberoam Administration Training from HKR Trainings

 

Cyberoam training at HKR trainings is meant for CCNSP professionals to advance their careers. It provides them with the expertise to deploy Cyberoam security in enterprises in times of complex scenarios. We offer comprehensive yet easy to follow sessions with complete course material and real-world situations, thus delivering the best value to aspiring security professionals. Our industry-led trainers help you gain expertise in networking and security fundamentals along with the knowledge of configuring and deploying Cyberoam identity-based UTM

Few of the clients we have served across industries are:

DHL | PWC | ATOS | TCS | KPMG | Momentive | Tech Mahindra | Kellogg's | Bestseller | ESSAR | Ashok Leyland | NTT Data | HP | SABIC | Lamprell | TSPL | Neovia | NISUM and many more.

HKR Trainings has successfully conducted 1000+ corporate training in India and USA. 

Cyberoam Training Method:  Online/Classroom Training

Cyberoam Study Material:  Soft Copy

Course Content

Cyberoam Certified Network & Security Professional

  1. Basics of Networking & Security 
  2. Cyberoam Identity-based UTM 
  3. Cyberoam Products 
  4. Firewall 
  5. User Authentication 
  6. Content Filter 
  7. Gateway Anti-Virus/Anti-Spam 
  8. Intrusion Prevention System 
  9. Virtual Private Network (VPN) 
  10. Multilink Manager 
  11. Routing 
  12. General Administration

Cyberoam Certified Network & Security Expert

  1. Cyberoam Architecture 
  2. Advanced and complex product deployment scenarios
  3. Advanced authentication and Identity Based Policies
  4. Advanced concepts and configuration of various modules
  5. Advanced VPN configuration for complex deployments 
  6. High Availability 
  7. Troubleshooting & Debugging

Cyberoam Training

This Cyberoam training is for security professionals who recognize insider threats and user-targeted external threats while giving them expertise in networking and security fundamentals. You will also gain a good knowledge and understanding of how to deploy and configure Cyberoam UTM appliance into their environment and the operational maintenance involved to ensure optimal performance and protection of their corporate assets.

There are 2 types of Cyberoam Certiication Training:

  1. Cyberoam Certified Network & Security Expert – CCNSE Training
  2. CCNSPCyberoam Certified Network & Security Professional – CCNSP Training

Cyberoam Course Curriculum

 Cyberoam Product Overview

  1. Cyberoam UTM overview
  2. Cyberoam Central Console Overview
  3. Cyberoam on-cloud management overview
  4. Cyberoam iView Overview

Deploying Cyberoam

• Prerequisites for deployment

• Network Diagrams & Scenarios

• Deployment Scenarios (Transparent/Gateway/Mixed) Mode

• Failure of Security Device & its Consequences

• Proxy Scenarios

• Managing connectivity with multiple ISP’s

• Manage 3G and Wimax connections

 Firewall

• What is a Firewall?

• Types of Firewall

• How to Control Access

• Identifying Each Machine on the network

• Managing the Firewall

• NAT

• DoS (Denial of Service)

• Fusion Technology based Unified Control

• Firewall – as a single solution to identity, security, connectivity, and productivity

User Authentication

• What is Authentication?

• Requirement to Authenticate

• How can Authentication be done?

• Types of Authentication (Single Sign-On, Local, and External)

• Group Authentication

• Traffic Discovery

• Authenticating from Servers (AD, LDAP, or RADIUS)

Web Filter

• Need for Web Filtering

• Web 2.0 Filtering

• Filtering with Keywords

• Filtering with URL

• Filtering by Categories

• Filtering Web Traffic

Application Firewall

• Evolution of Application Firewall

• File Filtering

• Application & P2P Filtering

• Instant Messaging Filters

• Custom Filters

• Compliance based filtering

 Network Threat Protection

• Functioning of Anti-Virus & Anti-Spam

• Basics of Virus, Spyware, Malware, Phishing, and Pharming.

• Web/Mail/FTP Anti-Virus

• Gateway level Antivirus/Anti-Spam

• Instant Messaging Anti-Virus

• Virus Outbreak Detection

• Recurrent Pattern Detection

• RBL (Real-time Black List), IP Reputation

• Understanding of Intrusion

• Signature-based detection

• Statistical anomaly-based detection

• Stateful protocol analysis detection

• Network-Based IPS (NIPS) & Wireless Based IPS (WIPS)

• Network Behaviour Analysis (NBA)

• Host-Based IPS (HIPS)

• WAF

VPN

• What is a VPN?

• Why use a VPN?

• Advantages of VPN

• Types of VPN based on protocols

• Types of VPN Based on Tunnels

• The need for firewall in VPN

• Threat Free Tunneling

• VPN Bandwidth Management

• VPN Failover

• Identity-based authentication in VPN

QoS

• What is QoS?

• Why QoS?

• Traffic Queuing

• Traffic Prioritisation

• Bandwidth Allocation

• Scheduling, and sharing bandwidth

• Guaranteed bandwidth

• QoS implementation on the user, group, firewall, application, web category.

Network High Availability

• High Availability, LAN Failsafe?

• Clustering of devices

• What is link load balancing?

• Why undertake to balance?

• Link fails scenario

• Why failover?

• Multilink Manager

• Load balancing

• Active-Active load balancing and gateway failover

• Active-Passive configuration and gateway failover

• MPLS failover to VPN

• Automatic ISP failover detection

 General Administration

• Setup Logging

• DNS Management

• DHCP Management

• Upgrading Device Firmware

• Backing Up

• Restoring

• Diagnostic Tools

• Troubleshooting Tools

• Labs to provide hands-on to deal with maintenance

Logging & Reporting

• Cyberoam iView Introduction

• Types of Reports

• Data Management

• Report Management

• Compliance reports

• Searching within reports

• Identity-based reporting

 

To know more about it. Click the link

https://hkrtrainings.com/cyberoam-administration-training

 

For Career Assistance:  +91 70365 87777,     +1 (872) 231 0447 Email: [email protected]

India

  1.  Address : Mehdipatnam, Hyderabad, India.
  2.  Phone : +91 7036587777

USA

  1.  Address : 40640 High Street Fremont,
    Illinois, Chicago.
  2.  Phone : +1 (872) 231 0447
  3.  Mail : [email protected]
    1.  Website : www.hkrtrainings.com

Others Details

India  Address : Mehdipatnam, Hyderabad, India.  Phone : +91 7036587777

Registration Fees
Free
Registration Ways
Email
Phone
Website
Post Box
Address/Venue
  near bus stop, Gouri Shankar Nagar Colony, Mehdipatnam, Hyderabad, Telangana 500034  Pin/Zip Code : 500034
Landmark
Andhra Pradesh > Other areas
Official Email ID
Contact
michel peck

near bus stop, Gouri Shankar Nagar Colony, Mehdipatnam, Hyderabad, Telangana 500034

[email protected]

   8143444236    Fax No: 500034
michel peck

near bus stop, Gouri Shankar Nagar Colony, Mehdipatnam, Hyderabad, Telangana 500034

[email protected]

   8143444236
SI NO Filename Download
1 Document Download
2 Document Download