<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="18634" language="fr" source="https://portal.flane.ch/swisscom/fr/xml-course/gigamon-gcpb" lastchanged="2025-11-10T16:47:14+01:00" parent="https://portal.flane.ch/swisscom/fr/xml-courses"><title>Gigamon Professional Bootcamp</title><productcode>GCPB</productcode><vendorcode>GG</vendorcode><vendorname>Gigamon</vendorname><fullproductcode>GG-GCPB</fullproductcode><version>6.9</version><objective>&lt;ul&gt;
&lt;li&gt;How to select a valid traffic source&lt;/li&gt;&lt;li&gt;Connectivity requirements for inline and out-of-band tools&lt;/li&gt;&lt;li&gt;Data requirements for inline security and network analysis tools&lt;/li&gt;&lt;li&gt;Approaches and considerations for packet access for inline tools&lt;/li&gt;&lt;li&gt;Traffic sizing for inline security and network analysis tools&lt;/li&gt;&lt;li&gt;Approaches and considerations for out-of-band packet access&lt;/li&gt;&lt;li&gt;How to implement a packet access solution in a physical network infrastructure&lt;/li&gt;&lt;li&gt;How to reliably access packets for security analysis&lt;/li&gt;&lt;li&gt;How to filter traffic to meet the needs of security tools&lt;/li&gt;&lt;li&gt;Load sharing between inline security and network analysis tools&lt;/li&gt;&lt;li&gt;How to implement packet optimization for analysis&lt;/li&gt;&lt;li&gt;How to implement tool groupings for inline processing&lt;/li&gt;&lt;li&gt;Traffic management for inline processing&lt;/li&gt;&lt;li&gt;How to replicate traffic to out-of-band tools for augmenting inline security&lt;/li&gt;&lt;li&gt;Approaches and considerations for packet access in the cloud&lt;/li&gt;&lt;li&gt;How to implement a packet access solution in a cloud or hybrid network infrastructure&lt;/li&gt;&lt;li&gt;How to extract virtualized traffic for use with virtualized and physical tools&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;&lt;strong&gt;IMPORTANT:&lt;/strong&gt; This course is designed to assist participants in preparing for the Gigamon Certified Professional certification test, but we
recommend that you have the following pre-requisites prior to taking the GCP certification test:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/fr/course/gigamon-gfd1&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Gigamon Foundations I: Insight into Network Data Across Your Network &lt;span class=&quot;fl-prod-pcode&quot;&gt;(GFD1)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;attentionbbcode&quot; title=&quot;course: gg-gfd2&quot;&gt;!&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;attentionbbcode&quot; title=&quot;course: gg-SSL&quot;&gt;!&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;attentionbbcode&quot; title=&quot;course: gg-ILB&quot;&gt;!&lt;/span&gt;&lt;/li&gt;&lt;li&gt;Basic working knowledge of Gigamon products &amp;amp; flow mapping configuration&lt;/li&gt;&lt;li&gt;Cisco Certified Network Associate Routing &amp;amp; Switching (CCNA) or equivalent working knowledge&lt;/li&gt;&lt;li&gt;courselink=CO-CLOUD+][/courselink]  or equivalent working knowledge&lt;/li&gt;&lt;li&gt;&lt;span class=&quot;attentionbbcode&quot; title=&quot;course: CO-SEC+&quot;&gt;!&lt;/span&gt; or Cisco Certified Network Associate Security  or equivalent working knowledge&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;The primary target audiences for the course are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All end users of Gigamon products&lt;/li&gt;&lt;li&gt;Security operations professionals and architects&lt;/li&gt;&lt;li&gt;Network operations professionals and architects&lt;/li&gt;&lt;li&gt;Professional service and system integrations specialists&lt;/li&gt;&lt;li&gt;Network and security administrators and architects&lt;/li&gt;&lt;li&gt;Participants of the Gigamon Partner Program and Gigamon Support Partner Program (GSPP) or Gigamon Professional Services
Program (GPSP)&lt;/li&gt;&lt;/ul&gt;</audience><contents>&lt;p&gt;The Gigamon Certified Professional (GCP) Boot Camp is a 5 day, instructor-led course that teaches security, network, cloud and sales engineers security fundamentals for implementing Gigamon technologies to monitor data in motion as part of a comprehensive security strategy.&lt;/p&gt;
&lt;p&gt;The course illustrates these concepts, as well as provides hands-on experience in implementing the GigaSECURE&amp;reg; Security Delivery Platform. It also provides instruction to the knowledge, skills and attitudes needed for implementing GigaSECURE&amp;reg; into enterprise networks.&lt;/p&gt;
&lt;p&gt;
This course is also intended to help students prepare for the &lt;a href=&quot;https://www.flane.co.uk/certification/GCP&quot;&gt;GCP certification exam&lt;/a&gt;.&lt;/p&gt;</contents><outline>&lt;p&gt;&lt;strong&gt;Module 1: Security and Tool Essentials&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Tools and Traffic Sources&lt;/li&gt;&lt;li&gt;Tool Types &amp;ndash; Inline/Out-of-Band&lt;/li&gt;&lt;li&gt;Choosing a Traffic Source&lt;/li&gt;&lt;li&gt;Tap Selection and Placement&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Module 2: Addressing Common Threats&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Review of Security Challenges&lt;ul&gt;
&lt;li&gt;Traffic Source Selection&lt;/li&gt;&lt;li&gt;Threat Vectors&lt;/li&gt;&lt;li&gt;Common Security Vulnerabilities&lt;/li&gt;&lt;li&gt;Review of common threats&lt;/li&gt;&lt;li&gt;Basic Data Taxonomy&lt;/li&gt;&lt;li&gt;Democratization of Malware&lt;/li&gt;&lt;li&gt;Example of an Advanced Persistent Threat (APT)&lt;/li&gt;&lt;li&gt;What Can Be Done&lt;/li&gt;&lt;li&gt;Courses of Action&lt;/li&gt;&lt;li&gt;Ways to break a kill chain&lt;/li&gt;&lt;li&gt;The new security model&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Module 3: Security and Monitoring Tools &amp;amp; Types&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Tools, Tool Groupings and What Traffic They Need&lt;ul&gt;
&lt;li&gt;Security and Monitoring Tools&lt;/li&gt;&lt;li&gt;Security Tools&lt;/li&gt;&lt;li&gt;Supporting Security Tools&lt;/li&gt;&lt;li&gt;Deploying Security Tools&lt;/li&gt;&lt;li&gt;Out-of-Band Monitoring&lt;/li&gt;&lt;li&gt;Inline Monitoring&lt;/li&gt;&lt;li&gt;Inline/Out-of-Band Tool Impact&lt;/li&gt;&lt;li&gt;Company Philosophy&lt;/li&gt;&lt;li&gt;Tool Groupings and Arrangements&lt;/li&gt;&lt;li&gt;Tool Redundancy Schemes&lt;/li&gt;&lt;li&gt;Tool/group redundancy schemes&lt;/li&gt;&lt;li&gt;Inline Tool Failover Schemes&lt;/li&gt;&lt;li&gt;NAT/PAT Gateways&lt;/li&gt;&lt;li&gt;Passive or Explicit&lt;/li&gt;&lt;li&gt;Redundancy and Failover Schemes&lt;/li&gt;&lt;li&gt;Networking Infrastructure Devices&lt;/li&gt;&lt;li&gt;Traffic Forwarding&lt;/li&gt;&lt;li&gt;Traffic Types&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Module 4:  Traffic Filtering &lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Networking protocol usage&lt;/li&gt;&lt;li&gt;Filtering Traffic&lt;/li&gt;&lt;li&gt;Traffic sizing considerations&lt;/li&gt;&lt;li&gt;Filtering Fundamentals&lt;/li&gt;&lt;li&gt;Packet Sizes and uses&lt;/li&gt;&lt;li&gt;Firewall Concepts&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Module 5: Tool Sizing and Visibility Sizing&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Traffic Requirements/minimum # tool nodes/sizing&lt;/li&gt;&lt;li&gt;Knowing When the Packet Access is Over-Subscribed&lt;/li&gt;&lt;li&gt;Packet access Sizing &amp;ndash; Traffic Volume&lt;/li&gt;&lt;li&gt;Load sharing&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Module 6: Gigamon Platform Architecture&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Installation and Setup (GigaVUE)&lt;/li&gt;&lt;li&gt;Box Setup&lt;/li&gt;&lt;li&gt;Port behaviors&lt;/li&gt;&lt;li&gt;Basic Flow Mapping&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Module 7: Traffic Intelligence - GigaSMART&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;GigaSMART Application usage&lt;/li&gt;&lt;li&gt;Highlighted GigaSMART Features &amp;ndash; GigaSECURE&lt;/li&gt;&lt;li&gt;GigaSMART Performance and Capacity&lt;/li&gt;&lt;li&gt;GigaSMART sizing and restrictions&lt;/li&gt;&lt;li&gt;GigaSMART processing dependencies&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Module 8: Classic Inline Bypass&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Classic Inline Bypass data processing&lt;/li&gt;&lt;li&gt;Configuration specifics and examples&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Module 9: Flexible Inline Bypass&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Flexible Inline Bypass data processing&lt;/li&gt;&lt;li&gt;GigaSMART involvement / configuration&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Module 10: SSL Essentials&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Inline SSL decryption solution&lt;/li&gt;&lt;li&gt;URL categorization and whitelisting&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Module 11: Implementing Inline SSL Decryption&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Inline SSL configuration&lt;/li&gt;&lt;li&gt;Gigamon specific support features&lt;/li&gt;&lt;li&gt;Whitelisting support &amp;amp; configuration&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Module 12:  Virtualization and Cloud Technologies&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Virtual Machines Concepts&lt;/li&gt;&lt;li&gt;Virtual Networking Concepts&lt;/li&gt;&lt;li&gt;Cloud Architectures&lt;/li&gt;&lt;li&gt;Cloud Visibility Challenges&lt;/li&gt;&lt;li&gt;Solutions for Cloud Visibility&lt;/li&gt;&lt;li&gt;OpenStack Multi-Tenant&lt;/li&gt;&lt;li&gt;Amazon Web Services and Microsoft Azure&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Module 13: GigaSECURE Cloud&lt;/strong&gt;  &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;GigaSECURE Cloud Visibility Elements&lt;/li&gt;&lt;li&gt;GigaSECURE for OpenStack, AWS, and Azure Deployments&lt;/li&gt;&lt;li&gt;Identify the Requirements; Size the Solution&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Module 14: Gigamon SECURE Cloud: Solution Configurations  &lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;GigaSECURE Virtual Deployments&lt;/li&gt;&lt;li&gt;GigaSECURE Cloud Deployments&lt;/li&gt;&lt;li&gt;GigaSECURE Cloud: VSeries Appliance and Visibility Tier Deployments&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Module 15: Gigamon Maintenance and Operations&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;User management&lt;/li&gt;&lt;li&gt;Product Upgrading and Updating&lt;/li&gt;&lt;li&gt;System requirements &amp;amp; process details&lt;/li&gt;&lt;li&gt;Clustering benefits&lt;/li&gt;&lt;li&gt;Configuration of Clustering&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Labs:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Lab 1:	Understanding Protocol Behaviors&lt;/li&gt;&lt;li&gt;Lab 2:	Wireshark Trace File Activity&lt;/li&gt;&lt;li&gt;Lab 3:	Trace File &amp;ndash; HC2 Activity&lt;/li&gt;&lt;li&gt;Lab 4:	Chassis Port Setup and Prep&lt;/li&gt;&lt;li&gt;Lab 5:	GigaSMART Application: De-duplication&lt;/li&gt;&lt;li&gt;Lab 6:	GigaSMART Application: NetFlow Generation&lt;/li&gt;&lt;li&gt;Lab 7:	GigaSMART Application: Adaptive Packet Filtering&lt;/li&gt;&lt;li&gt;Lab 8:	GigaSMART Application: Application Session Filtering&lt;/li&gt;&lt;li&gt;Lab 9:	Trace File &amp;ndash; SSL Activity&lt;/li&gt;&lt;li&gt;Lab 10:	GigaSMART Application:  Passive SSL Decryption&lt;/li&gt;&lt;li&gt;Lab 11:	Classic Inline Bypass Configuration&lt;/li&gt;&lt;li&gt;Lab 12:	Email Flexible Inline Bypass Configuration&lt;/li&gt;&lt;li&gt;Lab 13:	GigaSMART Application: Inline SSL Decryption&lt;/li&gt;&lt;li&gt;Lab 14:	GigaVUE-VM&lt;/li&gt;&lt;li&gt;Lab 15:	Introduction to the Visibility Platform for AWS&lt;/li&gt;&lt;li&gt;Lab 16:	Design a Basic Architecture for Private Cloud&lt;/li&gt;&lt;li&gt;Case Study: Design a Basic Architecture for VMware Private Cloud&lt;/li&gt;&lt;li&gt;Case Study:  Design a Basic Architecture for OpenStack Private Cloud&lt;/li&gt;&lt;li&gt;Lab 17:	Design a Basic Architecture for Public Cloud&lt;/li&gt;&lt;li&gt;Case Study: Visibility Tools Located in the Enterprise Data Center&lt;/li&gt;&lt;li&gt;Lab 18:	Configuration Back Up and Restore&lt;/li&gt;&lt;li&gt;Lab 19:	Removing  All Configurations&lt;/li&gt;&lt;li&gt;Lab 20:	H Series Clustering&lt;/li&gt;&lt;li&gt;Lab 21:	Port Behavior Setup&lt;/li&gt;&lt;li&gt;Lab 22: Passall Configuration&lt;/li&gt;&lt;li&gt;Lab 23: Simple Flow Map Configuration&lt;/li&gt;&lt;li&gt;Lab 24: More Complex Flow Map Configuration with Rule Prioritization&lt;/li&gt;&lt;li&gt;Lab 25: Shared Collector Configuration&lt;/li&gt;&lt;li&gt;Lab 26: User-Defined Attribute Filter&lt;/li&gt;&lt;li&gt;Lab 27: Tool Mirror&lt;/li&gt;&lt;li&gt;Lab 28: Replication and Egress Filtering&lt;/li&gt;&lt;li&gt;Lab 29: Hybrid Ports&lt;/li&gt;&lt;li&gt;Lab 30: Tool GigaStream&lt;/li&gt;&lt;li&gt;Lab 31: Port-Pair&lt;/li&gt;&lt;li&gt;Lab 32: Snooping LLDP/CDP&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>- How to select a valid traffic source
- Connectivity requirements for inline and out-of-band tools
- Data requirements for inline security and network analysis tools
- Approaches and considerations for packet access for inline tools
- Traffic sizing for inline security and network analysis tools
- Approaches and considerations for out-of-band packet access
- How to implement a packet access solution in a physical network infrastructure
- How to reliably access packets for security analysis
- How to filter traffic to meet the needs of security tools
- Load sharing between inline security and network analysis tools
- How to implement packet optimization for analysis
- How to implement tool groupings for inline processing
- Traffic management for inline processing
- How to replicate traffic to out-of-band tools for augmenting inline security
- Approaches and considerations for packet access in the cloud
- How to implement a packet access solution in a cloud or hybrid network infrastructure
- How to extract virtualized traffic for use with virtualized and physical tools</objective_plain><essentials_plain>IMPORTANT: This course is designed to assist participants in preparing for the Gigamon Certified Professional certification test, but we
recommend that you have the following pre-requisites prior to taking the GCP certification test:


- Gigamon Foundations I: Insight into Network Data Across Your Network (GFD1)
- (!)
- (!)
- (!)
- Basic working knowledge of Gigamon products &amp; flow mapping configuration
- Cisco Certified Network Associate Routing &amp; Switching (CCNA) or equivalent working knowledge
- courselink=CO-CLOUD+][/courselink]  or equivalent working knowledge
- (!)  or Cisco Certified Network Associate Security  or equivalent working knowledge</essentials_plain><audience_plain>The primary target audiences for the course are:


- All end users of Gigamon products
- Security operations professionals and architects
- Network operations professionals and architects
- Professional service and system integrations specialists
- Network and security administrators and architects
- Participants of the Gigamon Partner Program and Gigamon Support Partner Program (GSPP) or Gigamon Professional Services
Program (GPSP)</audience_plain><contents_plain>The Gigamon Certified Professional (GCP) Boot Camp is a 5 day, instructor-led course that teaches security, network, cloud and sales engineers security fundamentals for implementing Gigamon technologies to monitor data in motion as part of a comprehensive security strategy.

The course illustrates these concepts, as well as provides hands-on experience in implementing the GigaSECURE® Security Delivery Platform. It also provides instruction to the knowledge, skills and attitudes needed for implementing GigaSECURE® into enterprise networks.


This course is also intended to help students prepare for the GCP certification exam (https://www.flane.co.uk/certification/GCP).</contents_plain><outline_plain>Module 1: Security and Tool Essentials


- Tools and Traffic Sources
- Tool Types – Inline/Out-of-Band
- Choosing a Traffic Source
- Tap Selection and Placement

Module 2: Addressing Common Threats


- Review of Security Challenges
- Traffic Source Selection
- Threat Vectors
- Common Security Vulnerabilities
- Review of common threats
- Basic Data Taxonomy
- Democratization of Malware
- Example of an Advanced Persistent Threat (APT)
- What Can Be Done
- Courses of Action
- Ways to break a kill chain
- The new security model

Module 3: Security and Monitoring Tools &amp; Types


- Tools, Tool Groupings and What Traffic They Need
- Security and Monitoring Tools
- Security Tools
- Supporting Security Tools
- Deploying Security Tools
- Out-of-Band Monitoring
- Inline Monitoring
- Inline/Out-of-Band Tool Impact
- Company Philosophy
- Tool Groupings and Arrangements
- Tool Redundancy Schemes
- Tool/group redundancy schemes
- Inline Tool Failover Schemes
- NAT/PAT Gateways
- Passive or Explicit
- Redundancy and Failover Schemes
- Networking Infrastructure Devices
- Traffic Forwarding
- Traffic Types

Module 4:  Traffic Filtering 


- Networking protocol usage
- Filtering Traffic
- Traffic sizing considerations
- Filtering Fundamentals
- Packet Sizes and uses
- Firewall Concepts

Module 5: Tool Sizing and Visibility Sizing


- Traffic Requirements/minimum # tool nodes/sizing
- Knowing When the Packet Access is Over-Subscribed
- Packet access Sizing – Traffic Volume
- Load sharing

Module 6: Gigamon Platform Architecture


- Installation and Setup (GigaVUE)
- Box Setup
- Port behaviors
- Basic Flow Mapping

Module 7: Traffic Intelligence - GigaSMART


- GigaSMART Application usage
- Highlighted GigaSMART Features – GigaSECURE
- GigaSMART Performance and Capacity
- GigaSMART sizing and restrictions
- GigaSMART processing dependencies

Module 8: Classic Inline Bypass


- Classic Inline Bypass data processing
- Configuration specifics and examples

Module 9: Flexible Inline Bypass


- Flexible Inline Bypass data processing
- GigaSMART involvement / configuration

Module 10: SSL Essentials


- Inline SSL decryption solution
- URL categorization and whitelisting

Module 11: Implementing Inline SSL Decryption


- Inline SSL configuration
- Gigamon specific support features
- Whitelisting support &amp; configuration

Module 12:  Virtualization and Cloud Technologies


- Virtual Machines Concepts
- Virtual Networking Concepts
- Cloud Architectures
- Cloud Visibility Challenges
- Solutions for Cloud Visibility
- OpenStack Multi-Tenant
- Amazon Web Services and Microsoft Azure

Module 13: GigaSECURE Cloud  


- GigaSECURE Cloud Visibility Elements
- GigaSECURE for OpenStack, AWS, and Azure Deployments
- Identify the Requirements; Size the Solution

Module 14: Gigamon SECURE Cloud: Solution Configurations  


- GigaSECURE Virtual Deployments
- GigaSECURE Cloud Deployments
- GigaSECURE Cloud: VSeries Appliance and Visibility Tier Deployments

Module 15: Gigamon Maintenance and Operations


- User management
- Product Upgrading and Updating
- System requirements &amp; process details
- Clustering benefits
- Configuration of Clustering

Labs:


- Lab 1:	Understanding Protocol Behaviors
- Lab 2:	Wireshark Trace File Activity
- Lab 3:	Trace File – HC2 Activity
- Lab 4:	Chassis Port Setup and Prep
- Lab 5:	GigaSMART Application: De-duplication
- Lab 6:	GigaSMART Application: NetFlow Generation
- Lab 7:	GigaSMART Application: Adaptive Packet Filtering
- Lab 8:	GigaSMART Application: Application Session Filtering
- Lab 9:	Trace File – SSL Activity
- Lab 10:	GigaSMART Application:  Passive SSL Decryption
- Lab 11:	Classic Inline Bypass Configuration
- Lab 12:	Email Flexible Inline Bypass Configuration
- Lab 13:	GigaSMART Application: Inline SSL Decryption
- Lab 14:	GigaVUE-VM
- Lab 15:	Introduction to the Visibility Platform for AWS
- Lab 16:	Design a Basic Architecture for Private Cloud
- Case Study: Design a Basic Architecture for VMware Private Cloud
- Case Study:  Design a Basic Architecture for OpenStack Private Cloud
- Lab 17:	Design a Basic Architecture for Public Cloud
- Case Study: Visibility Tools Located in the Enterprise Data Center
- Lab 18:	Configuration Back Up and Restore
- Lab 19:	Removing  All Configurations
- Lab 20:	H Series Clustering
- Lab 21:	Port Behavior Setup
- Lab 22: Passall Configuration
- Lab 23: Simple Flow Map Configuration
- Lab 24: More Complex Flow Map Configuration with Rule Prioritization
- Lab 25: Shared Collector Configuration
- Lab 26: User-Defined Attribute Filter
- Lab 27: Tool Mirror
- Lab 28: Replication and Egress Filtering
- Lab 29: Hybrid Ports
- Lab 30: Tool GigaStream
- Lab 31: Port-Pair
- Lab 32: Snooping LLDP/CDP</outline_plain><duration unit="d" days="5">5 jours</duration><pricelist><price country="IT" currency="EUR">3540.00</price><price country="DE" currency="USD">4195.00</price><price country="US" currency="USD">3995.00</price><price country="PE" currency="USD">3995.00</price><price country="P3" currency="USD">3995.00</price><price country="CR" currency="USD">3995.00</price><price country="AR" currency="USD">3995.00</price><price country="BR" currency="USD">3995.00</price><price country="CL" currency="USD">3995.00</price><price country="CO" currency="USD">3995.00</price><price country="MX" currency="USD">3995.00</price><price country="PA" currency="USD">3995.00</price><price country="CH" currency="USD">4195.00</price><price country="GB" currency="GBP">3480.00</price><price country="IL" currency="USD">4195.00</price><price country="CA" currency="CAD">5515.00</price></pricelist><miles/></course>