Cyberoam Administration Training
Introduction to Cyberoam
Get an overview of Cyberoam, including its purpose and key features. Understand its role in network security and how it integrates with other security solutions.
Cyberoam Architecture
Explore the architecture of Cyberoam appliances. Learn about its components such as the Firewall, VPN, and Intrusion Prevention System (IPS), and how they work together to secure the network.
Installation and Setup
Learn the procedures for installing and setting up Cyberoam appliances. Study system requirements, initial configuration, and best practices for deployment.
Policy Configuration
Understand how to configure security policies in Cyberoam. Learn how to create and manage firewall rules, VPN policies, and access control lists to enforce security measures.
Network Security Management
Study network security management features in Cyberoam. Learn how to configure and manage network security settings, including traffic filtering, intrusion prevention, and application control.
VPN Configuration
Learn how to configure and manage Virtual Private Network (VPN) settings in Cyberoam. Understand how to set up site-to-site and remote access VPNs to secure remote connections.
Intrusion Prevention System (IPS)
Explore Cyberoam's Intrusion Prevention System (IPS). Learn how to configure and manage IPS settings to detect and block malicious activities and threats.
Monitoring and Reporting
Study Cyberoam’s monitoring and reporting tools. Learn how to use these tools to track network activity, generate reports, and analyze security incidents.
Backup and Recovery
Understand the procedures for backing up and recovering Cyberoam configurations. Learn how to create backup schedules and restore configurations in case of hardware failure or other issues.
Security Best Practices
Study best practices for securing Cyberoam appliances. Learn about configuration hardening, regular updates, and proactive security measures to maintain a secure environment.
Advanced Features and Troubleshooting
Explore advanced features of Cyberoam and how to troubleshoot common issues. Learn techniques for optimizing performance and resolving configuration or connectivity problems.
Case Studies and Practical Exercises
Engage in case studies and practical exercises to apply Cyberoam concepts. Practice configuring and managing Cyberoam appliances and solving real-world network security scenarios.
Cyberoam Administration Syllabus
Introduction to Cyberoam
- Overview of Cyberoam/Sophos XG Firewall
- Features and Capabilities
- Deployment Scenarios
Basic Configuration
- Initial Setup and Configuration
- System Settings and Management
- Interface Configuration (LAN, WAN, DMZ)
User Authentication
- User Authentication Methods (Local, AD, LDAP, RADIUS)
- Authentication Policies and Configurations
- Single Sign-On (SSO) Integration
Firewall Configuration
- Firewall Rules and Policies
- NAT (Network Address Translation)
- Port Forwarding and DMZ Host Configuration
VPN Configuration
- Site-to-Site VPN Configuration
- Remote Access VPN (SSL VPN, IPsec VPN)
- VPN Failover and Redundancy
Intrusion Prevention System (IPS)
- IPS Configurations and Policies
- Detection and Prevention Techniques
- Custom IPS Signatures
Web Filtering
- Web Filtering Policies
- URL Filtering and Categories
- Content Filtering Policies
Application Control
- Application Visibility and Control
- Application Firewall Policies
- Custom Application Definitions
Gateway Anti-Virus
- Anti-Virus Configurations
- Virus and Malware Scanning Policies
- Quarantine and Notification Settings
Traffic Management
- Bandwidth Management and QoS
- Traffic Shaping and Prioritization
- Traffic Policies and Rules
Logging and Reporting
- Logging Configurations
- Real-Time and Historical Reports
- Alerts and Notifications
High Availability and Redundancy
- HA Configurations
- Active-Active and Active-Passive Setups
- Failover and Synchronization
Troubleshooting and Maintenance
- Monitoring Tools and Diagnostics
- Backup and Restore Procedures
- Firmware Upgrades and Maintenance
Advanced Features (Optional)
- IPv6 Configuration
- Wireless Network Integration
- Virtualization and Multiple Instances
Training
Basic Level Training
Duration : 1 Month
Advanced Level Training
Duration : 1 Month
Project Level Training
Duration : 1 Month
Total Training Period
Duration : 3 Months
Course Mode :
Available Online / Offline
Course Fees :
Please contact the office for details