- TypeTraining or Development Class
- Location Hyderabad, Telangana, India
- Date 23-09-2020 - 30-09-2020
Education/Teaching/Training/Development
Computer Science
Information Technology
Computer/Technology
Internet/Ecommerce
Cyberoam Administration Training from HKR Trainings
Cyberoam training at HKR trainings is meant for CCNSP professionals to advance their careers. It provides them with the expertise to deploy Cyberoam security in enterprises in times of complex scenarios. We offer comprehensive yet easy to follow sessions with complete course material and real-world situations, thus delivering the best value to aspiring security professionals. Our industry-led trainers help you gain expertise in networking and security fundamentals along with the knowledge of configuring and deploying Cyberoam identity-based UTM
Few of the clients we have served across industries are:
DHL | PWC | ATOS | TCS | KPMG | Momentive | Tech Mahindra | Kellogg's | Bestseller | ESSAR | Ashok Leyland | NTT Data | HP | SABIC | Lamprell | TSPL | Neovia | NISUM and many more.
HKR Trainings has successfully conducted 1000+ corporate training in India and USA.
Cyberoam Training Method: Online/Classroom Training
Cyberoam Study Material: Soft Copy
Course Content
Cyberoam Certified Network & Security Professional
Cyberoam Certified Network & Security Expert
Cyberoam Training
This Cyberoam training is for security professionals who recognize insider threats and user-targeted external threats while giving them expertise in networking and security fundamentals. You will also gain a good knowledge and understanding of how to deploy and configure Cyberoam UTM appliance into their environment and the operational maintenance involved to ensure optimal performance and protection of their corporate assets.
There are 2 types of Cyberoam Certiication Training:
Cyberoam Course Curriculum
• Prerequisites for deployment
• Network Diagrams & Scenarios
• Deployment Scenarios (Transparent/Gateway/Mixed) Mode
• Failure of Security Device & its Consequences
• Proxy Scenarios
• Managing connectivity with multiple ISP’s
• Manage 3G and Wimax connections
• What is a Firewall?
• Types of Firewall
• How to Control Access
• Identifying Each Machine on the network
• Managing the Firewall
• NAT
• DoS (Denial of Service)
• Fusion Technology based Unified Control
• Firewall – as a single solution to identity, security, connectivity, and productivity
• What is Authentication?
• Requirement to Authenticate
• How can Authentication be done?
• Types of Authentication (Single Sign-On, Local, and External)
• Group Authentication
• Traffic Discovery
• Authenticating from Servers (AD, LDAP, or RADIUS)
• Need for Web Filtering
• Web 2.0 Filtering
• Filtering with Keywords
• Filtering with URL
• Filtering by Categories
• Filtering Web Traffic
• Evolution of Application Firewall
• File Filtering
• Application & P2P Filtering
• Instant Messaging Filters
• Custom Filters
• Compliance based filtering
• Functioning of Anti-Virus & Anti-Spam
• Basics of Virus, Spyware, Malware, Phishing, and Pharming.
• Web/Mail/FTP Anti-Virus
• Gateway level Antivirus/Anti-Spam
• Instant Messaging Anti-Virus
• Virus Outbreak Detection
• Recurrent Pattern Detection
• RBL (Real-time Black List), IP Reputation
• Understanding of Intrusion
• Signature-based detection
• Statistical anomaly-based detection
• Stateful protocol analysis detection
• Network-Based IPS (NIPS) & Wireless Based IPS (WIPS)
• Network Behaviour Analysis (NBA)
• Host-Based IPS (HIPS)
• WAF
• What is a VPN?
• Why use a VPN?
• Advantages of VPN
• Types of VPN based on protocols
• Types of VPN Based on Tunnels
• The need for firewall in VPN
• Threat Free Tunneling
• VPN Bandwidth Management
• VPN Failover
• Identity-based authentication in VPN
• What is QoS?
• Why QoS?
• Traffic Queuing
• Traffic Prioritisation
• Bandwidth Allocation
• Scheduling, and sharing bandwidth
• Guaranteed bandwidth
• QoS implementation on the user, group, firewall, application, web category.
• High Availability, LAN Failsafe?
• Clustering of devices
• What is link load balancing?
• Why undertake to balance?
• Link fails scenario
• Why failover?
• Multilink Manager
• Load balancing
• Active-Active load balancing and gateway failover
• Active-Passive configuration and gateway failover
• MPLS failover to VPN
• Automatic ISP failover detection
• Setup Logging
• DNS Management
• DHCP Management
• Upgrading Device Firmware
• Backing Up
• Restoring
• Diagnostic Tools
• Troubleshooting Tools
• Labs to provide hands-on to deal with maintenance
• Cyberoam iView Introduction
• Types of Reports
• Data Management
• Report Management
• Compliance reports
• Searching within reports
• Identity-based reporting
To know more about it. Click the link
https://hkrtrainings.com/cyberoam-administration-training
For Career Assistance: +91 70365 87777, +1 (872) 231 0447 Email: [email protected]
India
USA
India Address : Mehdipatnam, Hyderabad, India. Phone : +91 7036587777
near bus stop, Gouri Shankar Nagar Colony, Mehdipatnam, Hyderabad, Telangana 500034
8143444236 Fax No: 500034near bus stop, Gouri Shankar Nagar Colony, Mehdipatnam, Hyderabad, Telangana 500034
8143444236