{"course":{"productid":19316,"modality":1,"active":true,"language":"de","title":"Designing and Implementing the Gigamon Inline Bypass Threat Prevention Solution","productcode":"GILB","vendorcode":"GG","vendorname":"Gigamon","fullproductcode":"GG-GILB","courseware":{"has_ekit":true,"has_printkit":false,"language":""},"url":"https:\/\/portal.flane.ch\/course\/gigamon-gilb","objective":"<p>After completing this course, you will be able to:<\/p>\n<ul>\n<li>Data requirements for inline security and network analysis tools<\/li><li>Approaches and considerations for packet access for inline tools<\/li><li>Traffic sizing for inline security and network analysis tools<\/li><li>How to filter traffic to meet the needs of security tools<\/li><li>Load sharing between inline security and network analysis tools<\/li><li>How to implement tool groupings for inline processing<\/li><li>Traffic management for inline processing<\/li><li>How to replicate traffic to out-of-band tools for augmenting inline security<\/li><\/ul>","essentials":"<p>Before taking the course, you should have a good understanding of:<\/p>\n<ul>\n<li>Gigamon solution fundamentals around network visibility<\/li><li>Inline tools like ATP, IPS and WAF<\/li><li>GigaSMART&reg; software features, uses and configuration<\/li><li>OR take the <span class=\"cms-link-marked\"><a class=\"fl-href-prod\" href=\"\/swisscom\/course\/gigamon-gfnd\"><svg role=\"img\" aria-hidden=\"true\" focusable=\"false\" data-nosnippet class=\"cms-linkmark\"><use xlink:href=\"\/css\/img\/icnset-linkmarks.svg#linkmark\"><\/use><\/svg>Gigamon Foundation: Learn the Essentials to Start on the Road to Success <span class=\"fl-prod-pcode\">(GFND)<\/span><\/a><\/span> course<\/li><\/ul>","audience":"<ul>\n<li>Professionals tasked with the implementation and support of network visibility for security, including administrators, security engineers\nand network engineers<\/li><li>Security operations (SecOps) staff, whose priority is the security of the network<\/li><li>Network operations (NetOps) staff, whose priority is network uptime<\/li><\/ul>","contents":"<p>The Gigamon&reg; Inline Bypass Threat Prevention Solution is purpose-built to simultaneously maximize inline security tool performance and\nreliability, network resiliency and operational efficiency.<\/p>\n<p>The two-day Designing and Implementing Gigamon Inline Bypass Security Solution course will teach you how to best design and\nimplement the Gigamon Inline Bypass Threat Prevention Solution to reduce costs, maximize security effectiveness and improve network\nresiliency. You&rsquo;ll learn how to deliver the right data to the right tool at the right time, and learn how integrating advanced inline bypass functions\nhelps redistribute traffic when a tool fails and maximizes the effectiveness of the remaining security tools.<\/p>\n<p>After completing the course, you will be able to:<\/p>\n<ul>\n<li>Simplify architectures and enable security tools to do more, enabling faster onboarding of patches and new technology<\/li><li>Help improve security posture and reduce network downtime when changing threat prevention tools<\/li><li>Demonstrate competency in deploying solutions to maximize the effectiveness of your security stack<\/li><\/ul>","outline":"<p><strong> Module 1: GigaSECURE&reg; Security Delivery Platform Overview<\/strong><\/p>\n<ul>\n<li>The need for a Security Delivery Platform<\/li><li>Gigamon Products that support inline solutions<\/li><\/ul><p>\n<strong>Module 2: Inline Bypass Foundations<\/strong><\/p>\n<ul>\n<li>Benefits of using Gigamon&rsquo;s inline capabilities<\/li><li>Tool Challenges<\/li><li>Deployment Requirements<\/li><\/ul><p>\n<strong> Module 3: Design Considerations for the Inline Bypass Threat Prevention Solution<\/strong><\/p>\n<ul>\n<li>Critical Links<\/li><li>Explicit vs. Transparent tools<\/li><li>Asymmetrical Traffic Flows<\/li><\/ul><p>\n<strong>Module 4: Classic Inline Bypass Solutions<\/strong><\/p>\n<ul>\n<li>Inline or Out of band<\/li><li>Multiple Classic Inline Options<\/li><li>Heart beat monitoring<\/li><li>Decision trees<\/li><li>Classic Inline Bypass Lab<\/li><\/ul><p>\n <strong>Module 5: Flexible Inline configuration<\/strong><\/p>\n<ul>\n<li>Differences vs. Classic<\/li><li>Flexible functionality: Maps and VLAN Tags<\/li><li>Benefits<\/li><li>Rethinking Inline tools<\/li><li>Design Challenge<\/li><li>Flexible Inline Arrangements Lab<\/li><\/ul><p>\n<strong> Module 6: High availability for Inline Bypass Solutions<\/strong><\/p>\n<ul>\n<li>Single Path or Multi Path<\/li><li>Redundant architectures<\/li><li>Tool resiliency work flow<\/li><li>Configuring GRIP Lab<\/li><\/ul><p>\n<strong>Module 7: Inline SSL Decryption Design and Implementation<\/strong><\/p>\n<ul>\n<li>How inline SSL decryption works<\/li><li>Challenges<\/li><li>Traffic Steering<\/li><li>Configuration Concepts<\/li><li>Policy Profiles<\/li><li>Best Practices<\/li><li>Inline SSL Configuration Lab<\/li><\/ul>","objective_plain":"After completing this course, you will be able to:\n\n\n- Data requirements for inline security and network analysis tools\n- Approaches and considerations for packet access for inline tools\n- Traffic sizing for inline security and network analysis tools\n- How to filter traffic to meet the needs of security tools\n- Load sharing between inline security and network analysis tools\n- How to implement tool groupings for inline processing\n- Traffic management for inline processing\n- How to replicate traffic to out-of-band tools for augmenting inline security","essentials_plain":"Before taking the course, you should have a good understanding of:\n\n\n- Gigamon solution fundamentals around network visibility\n- Inline tools like ATP, IPS and WAF\n- GigaSMART\u00ae software features, uses and configuration\n- OR take the Gigamon Foundation: Learn the Essentials to Start on the Road to Success (GFND) course","audience_plain":"- Professionals tasked with the implementation and support of network visibility for security, including administrators, security engineers\nand network engineers\n- Security operations (SecOps) staff, whose priority is the security of the network\n- Network operations (NetOps) staff, whose priority is network uptime","contents_plain":"The Gigamon\u00ae Inline Bypass Threat Prevention Solution is purpose-built to simultaneously maximize inline security tool performance and\nreliability, network resiliency and operational efficiency.\n\nThe two-day Designing and Implementing Gigamon Inline Bypass Security Solution course will teach you how to best design and\nimplement the Gigamon Inline Bypass Threat Prevention Solution to reduce costs, maximize security effectiveness and improve network\nresiliency. You\u2019ll learn how to deliver the right data to the right tool at the right time, and learn how integrating advanced inline bypass functions\nhelps redistribute traffic when a tool fails and maximizes the effectiveness of the remaining security tools.\n\nAfter completing the course, you will be able to:\n\n\n- Simplify architectures and enable security tools to do more, enabling faster onboarding of patches and new technology\n- Help improve security posture and reduce network downtime when changing threat prevention tools\n- Demonstrate competency in deploying solutions to maximize the effectiveness of your security stack","outline_plain":" Module 1: GigaSECURE\u00ae Security Delivery Platform Overview\n\n\n- The need for a Security Delivery Platform\n- Gigamon Products that support inline solutions\n\nModule 2: Inline Bypass Foundations\n\n\n- Benefits of using Gigamon\u2019s inline capabilities\n- Tool Challenges\n- Deployment Requirements\n\n Module 3: Design Considerations for the Inline Bypass Threat Prevention Solution\n\n\n- Critical Links\n- Explicit vs. Transparent tools\n- Asymmetrical Traffic Flows\n\nModule 4: Classic Inline Bypass Solutions\n\n\n- Inline or Out of band\n- Multiple Classic Inline Options\n- Heart beat monitoring\n- Decision trees\n- Classic Inline Bypass Lab\n\n Module 5: Flexible Inline configuration\n\n\n- Differences vs. Classic\n- Flexible functionality: Maps and VLAN Tags\n- Benefits\n- Rethinking Inline tools\n- Design Challenge\n- Flexible Inline Arrangements Lab\n\n Module 6: High availability for Inline Bypass Solutions\n\n\n- Single Path or Multi Path\n- Redundant architectures\n- Tool resiliency work flow\n- Configuring GRIP Lab\n\nModule 7: Inline SSL Decryption Design and Implementation\n\n\n- How inline SSL decryption works\n- Challenges\n- Traffic Steering\n- Configuration Concepts\n- Policy Profiles\n- Best Practices\n- Inline SSL Configuration Lab","skill_level":"Expert","version":"1.0","duration":{"unit":"d","value":2,"formatted":"2 Tage"},"pricelist":{"List Price":{"GB":{"country":"GB","currency":"GBP","taxrate":20,"price":1535},"CR":{"country":"CR","currency":"USD","taxrate":13,"price":1995},"IT":{"country":"IT","currency":"EUR","taxrate":20,"price":1680},"DE":{"country":"DE","currency":"USD","taxrate":19,"price":1995},"IL":{"country":"IL","currency":"USD","taxrate":17,"price":1995},"NL":{"country":"NL","currency":"EUR","taxrate":21,"price":1995},"CH":{"country":"CH","currency":"CHF","taxrate":8.1,"price":1995}}},"lastchanged":"2025-10-24T17:11:18+02:00","parenturl":"https:\/\/portal.flane.ch\/swisscom\/json-courses","nexturl_course_schedule":"https:\/\/portal.flane.ch\/swisscom\/json-course-schedule\/19316","source_lang":"de","source":"https:\/\/portal.flane.ch\/swisscom\/json-course\/gigamon-gilb"}}