SlideShare a Scribd company logo
1 of 3
Download to read offline
Cyberoam Certified Network & Security Professional
Course Outline
Email : training@cyberoam.com
Website : http://training.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
OVERVIEW
CCNSP is the certification for security professionals from Cyberoam. It is the only Identity-based Security
Certification available globally and given the rising criticality of insider threats in enterprises, it brings
recognition to the certified professionals’ expertise in Identity-based Security, adding immense value to their
career.
The CCNSP certification prepares individuals to recognize insider threats and user-targeted external threats
while giving them expertise in networking and security fundamentals in addition to the deployment and
configuration of Cyberoam Identity-based UTM. The certification is comprehensive and easy to follow with real
world scenarios, delivering practical value to security professionals.
The CCNSP training is divided into the following modules.
Module 1: Cyberoam Product Overview
 Cyberoam UTM overview
 Cyberoam Central Console Overview
 Cyberoam on-cloud management overview
 Cyberoam iView Overview
Module 2: Deploying Cyberoam
 Prerequisites for deployment
 Network Diagrams & Scenarios
 Deployment Scenarios (Transparent/Gateway/Mixed) Mode
 Failure of Security Device & it's Consequences
 Proxy Scenarios
 Managing connectivity with multiple ISP’s
 Manage 3G and Wi-Max connections
 Labs
Module 3: Firewall
 What is a Firewall?
 Types of Firewall
 How to Control Access
 Identifying Each Machine on the network
 Managing the Firewall
 NAT
 DoS (Denial of Service)
 Fusion Technology based Unified Control
 Firewall - as a single solution to identity, security, connectivity, productivity, and logging Labs
Module 4: User Authentication
 What is Authentication?
 Requirement to Authenticate
 How can Authentication be done?
 Types of Authentication (Single Sign On, Local, and External)
 Group Authentication
 Traffic Discovery
 Authenticating from Servers (AD, LDAP, or RADIUS)
 Labs
Cyberoam Certified Network & Security Professional
Course Outline
Email : training@cyberoam.com
Website : http://training.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Module 5: Web Filter
 Need for Web Filtering
 Web 2.0 Filtering
 Filtering with Keywords
 Filtering with URL
 Filtering by Categories
 Filtering Web Traffic
 Labs
Module 6: Application Firewall
 Evolution of Application Firewall
 File Filtering
 Application & P2P Filtering
 Instant Messaging Filters
 Custom Filters
 Compliance based filtering
 Labs
Module 7: Network Threat Protection
 Functioning of Anti-Virus & Anti-Spam
 Basics of Virus, Spyware, Malware, Phising, and Pharming.
 Web/Mail/FTP Anti-Virus
 Gateway level Anti-Virus/Anti-Spam
 Instant Messaging Anti-Virus
 Virus Outbreak Detection
 Recurrent Pattern Detection
 RBL (Realtime Black List), IP Reputation
 Understanding of Intrusion
 Signature based detection
 Statistical anomaly based detection
 Stateful protocol analysis detection
 Network Based IPS (NIPS) & Wireless Based IPS (WIPS)
 Network Behaviour Analysis (NBA)
 Host Based IPS (HIPS)
 WAF
 Labs
Module 8: VPN
 What is VPN?
 Why use VPN?
 Advantages of VPN
 Types of VPN based on protocols
 Types of VPN Based on Tunnels
 Need of firewall in VPN
 Threat Free Tunneling
 VPN Bandwidth Management
 VPN Failover
 Identity based authentication in VPN
 Labs
Cyberoam Certified Network & Security Professional
Course Outline
Email : training@cyberoam.com
Website : http://training.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Module 9: QoS
 What is QoS?
 Why QoS?
 Traffic Queuing
 Traffic Prioritization
 Bandwidth Allocation
 Scheduling, and sharing bandwidth
 Guaranteed bandwidth
 QoS implementation on user, group, firewall, application, web category.
 Labs
Module 10: Network High Availability
 High Availability, LAN Failsafe?
 Clustering of devices
 What is link load balancing?
 Why undertake balancing?
 link fails scenario
 Why failover?
 Multilink Manager
 Load balancing
 Active – Active load balancing and gateway failover
 Active – Passive configuration and gateway failover
 MPLS failover to VPN
 Automatic ISP failover detection
 Labs
Module 11: General Administration
 Setup Logging
 DNS Management
 DHCP Management
 Upgrading Device Firmware
 Backing Up
 Restoring
 Diagnostic Tools
 Troubleshooting Tools
 Labs to provide hands on to deal with maintenance
Module 12: Logging & Reporting
 Cyberoam iView Introduction
 Types of Reports
 Data Management
 Report Management
 Compliance reports
 Searching within reports
 Identity based reporting

More Related Content

What's hot

Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionAndy Ellis
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine Erin Banks
 
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013Akamai Technologies
 
Barracuda company and product presentation
Barracuda company and product presentationBarracuda company and product presentation
Barracuda company and product presentationSoftechms
 
Barracuda ng firewall
Barracuda ng firewallBarracuda ng firewall
Barracuda ng firewallKappa Data
 
Microservices Security
Microservices SecurityMicroservices Security
Microservices SecurityAditi Anand
 
Best Practices Guide: Introducing Web Application Firewalls
Best Practices Guide: Introducing Web Application FirewallsBest Practices Guide: Introducing Web Application Firewalls
Best Practices Guide: Introducing Web Application Firewallsalexmeisel
 
Barracuda Networks Overview
Barracuda Networks OverviewBarracuda Networks Overview
Barracuda Networks OverviewAEC Networks
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureMaliha Ali
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web SystemsInnoTech
 
Security Operations
Security OperationsSecurity Operations
Security Operationsankitmehta21
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec TrainingMike Spaulding
 
Backup2013 - Barracuda Networks
Backup2013 - Barracuda NetworksBackup2013 - Barracuda Networks
Backup2013 - Barracuda NetworksKappa Data
 

What's hot (17)

Web Application Firewall
Web Application FirewallWeb Application Firewall
Web Application Firewall
 
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
 
My Final Year Project
My Final Year ProjectMy Final Year Project
My Final Year Project
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine
 
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
 
Barracuda company and product presentation
Barracuda company and product presentationBarracuda company and product presentation
Barracuda company and product presentation
 
Barracuda ng firewall
Barracuda ng firewallBarracuda ng firewall
Barracuda ng firewall
 
Microservices Security
Microservices SecurityMicroservices Security
Microservices Security
 
Best Practices Guide: Introducing Web Application Firewalls
Best Practices Guide: Introducing Web Application FirewallsBest Practices Guide: Introducing Web Application Firewalls
Best Practices Guide: Introducing Web Application Firewalls
 
Barracuda Networks Overview
Barracuda Networks OverviewBarracuda Networks Overview
Barracuda Networks Overview
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
 
Security Operations
Security OperationsSecurity Operations
Security Operations
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec Training
 
Backup2013 - Barracuda Networks
Backup2013 - Barracuda NetworksBackup2013 - Barracuda Networks
Backup2013 - Barracuda Networks
 

Viewers also liked

Ccnsp course outline
Ccnsp course outlineCcnsp course outline
Ccnsp course outlineRalbary
 
Χριστουγεννιάτικο φιλανθρωπικό bazaar BSB
Χριστουγεννιάτικο φιλανθρωπικό bazaar BSBΧριστουγεννιάτικο φιλανθρωπικό bazaar BSB
Χριστουγεννιάτικο φιλανθρωπικό bazaar BSBCHRISPAP7
 
Opening Ceremony Project
Opening Ceremony ProjectOpening Ceremony Project
Opening Ceremony Projectmegangodfrey
 
Progetto SCUOLA+15 progetti di diattica integrata
Progetto SCUOLA+15 progetti di diattica integrataProgetto SCUOLA+15 progetti di diattica integrata
Progetto SCUOLA+15 progetti di diattica integrataStefania Farsagli
 
Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01Ralbary
 
Operational Research
Operational ResearchOperational Research
Operational ResearchRoy Thomas
 
Dynamic programming 2
Dynamic programming 2Dynamic programming 2
Dynamic programming 2Roy Thomas
 
Screen print day
Screen print dayScreen print day
Screen print dayetekeurope
 
Email and groupware
Email and groupwareEmail and groupware
Email and groupwareRoy Thomas
 
La Prospettiva delle Scienze Sociali
La Prospettiva delle Scienze SocialiLa Prospettiva delle Scienze Sociali
La Prospettiva delle Scienze Socialiasvsa
 

Viewers also liked (16)

Ccnsp course outline
Ccnsp course outlineCcnsp course outline
Ccnsp course outline
 
Χριστουγεννιάτικο φιλανθρωπικό bazaar BSB
Χριστουγεννιάτικο φιλανθρωπικό bazaar BSBΧριστουγεννιάτικο φιλανθρωπικό bazaar BSB
Χριστουγεννιάτικο φιλανθρωπικό bazaar BSB
 
Opening Ceremony Project
Opening Ceremony ProjectOpening Ceremony Project
Opening Ceremony Project
 
Progetto SCUOLA+15 progetti di diattica integrata
Progetto SCUOLA+15 progetti di diattica integrataProgetto SCUOLA+15 progetti di diattica integrata
Progetto SCUOLA+15 progetti di diattica integrata
 
Tipologia proyecto
Tipologia proyectoTipologia proyecto
Tipologia proyecto
 
SAP Landscape
SAP Landscape SAP Landscape
SAP Landscape
 
Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01
 
Dan Slee, Walsall Council | #DigiLead
Dan Slee, Walsall Council | #DigiLeadDan Slee, Walsall Council | #DigiLead
Dan Slee, Walsall Council | #DigiLead
 
Operational Research
Operational ResearchOperational Research
Operational Research
 
Dynamic programming 2
Dynamic programming 2Dynamic programming 2
Dynamic programming 2
 
Screen print day
Screen print dayScreen print day
Screen print day
 
Home express
Home expressHome express
Home express
 
Email and groupware
Email and groupwareEmail and groupware
Email and groupware
 
KISP
KISPKISP
KISP
 
La Prospettiva delle Scienze Sociali
La Prospettiva delle Scienze SocialiLa Prospettiva delle Scienze Sociali
La Prospettiva delle Scienze Sociali
 
Каталог
КаталогКаталог
Каталог
 

Similar to Ccnsp course outline

Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsAnthony Daniel
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceMSAdvAnalytics
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseGlobal Online Trainings
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud CrossoverArmor
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing CeleraNetworks
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallAli Kapucu
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security OverviewAllen Brokken
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduseIDG Romania
 
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfazure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfBenAissaTaher1
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Moshe Ferber
 
Building Up Network Security: An Introduction
Building Up Network Security: An Introduction Building Up Network Security: An Introduction
Building Up Network Security: An Introduction Global Knowledge Training
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochurebakar kazmi
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureBaqar kazmi
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureBaqar Kazmi
 
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDUBest CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDUNs3Edu
 

Similar to Ccnsp course outline (20)

Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and Benefits
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
Cr vs fortinet
Cr vs fortinetCr vs fortinet
Cr vs fortinet
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfazure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdf
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
 
Building Up Network Security: An Introduction
Building Up Network Security: An Introduction Building Up Network Security: An Introduction
Building Up Network Security: An Introduction
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDUBest CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 

Recently uploaded (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

Ccnsp course outline

  • 1. Cyberoam Certified Network & Security Professional Course Outline Email : training@cyberoam.com Website : http://training.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. OVERVIEW CCNSP is the certification for security professionals from Cyberoam. It is the only Identity-based Security Certification available globally and given the rising criticality of insider threats in enterprises, it brings recognition to the certified professionals’ expertise in Identity-based Security, adding immense value to their career. The CCNSP certification prepares individuals to recognize insider threats and user-targeted external threats while giving them expertise in networking and security fundamentals in addition to the deployment and configuration of Cyberoam Identity-based UTM. The certification is comprehensive and easy to follow with real world scenarios, delivering practical value to security professionals. The CCNSP training is divided into the following modules. Module 1: Cyberoam Product Overview  Cyberoam UTM overview  Cyberoam Central Console Overview  Cyberoam on-cloud management overview  Cyberoam iView Overview Module 2: Deploying Cyberoam  Prerequisites for deployment  Network Diagrams & Scenarios  Deployment Scenarios (Transparent/Gateway/Mixed) Mode  Failure of Security Device & it's Consequences  Proxy Scenarios  Managing connectivity with multiple ISP’s  Manage 3G and Wi-Max connections  Labs Module 3: Firewall  What is a Firewall?  Types of Firewall  How to Control Access  Identifying Each Machine on the network  Managing the Firewall  NAT  DoS (Denial of Service)  Fusion Technology based Unified Control  Firewall - as a single solution to identity, security, connectivity, productivity, and logging Labs Module 4: User Authentication  What is Authentication?  Requirement to Authenticate  How can Authentication be done?  Types of Authentication (Single Sign On, Local, and External)  Group Authentication  Traffic Discovery  Authenticating from Servers (AD, LDAP, or RADIUS)  Labs
  • 2. Cyberoam Certified Network & Security Professional Course Outline Email : training@cyberoam.com Website : http://training.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Module 5: Web Filter  Need for Web Filtering  Web 2.0 Filtering  Filtering with Keywords  Filtering with URL  Filtering by Categories  Filtering Web Traffic  Labs Module 6: Application Firewall  Evolution of Application Firewall  File Filtering  Application & P2P Filtering  Instant Messaging Filters  Custom Filters  Compliance based filtering  Labs Module 7: Network Threat Protection  Functioning of Anti-Virus & Anti-Spam  Basics of Virus, Spyware, Malware, Phising, and Pharming.  Web/Mail/FTP Anti-Virus  Gateway level Anti-Virus/Anti-Spam  Instant Messaging Anti-Virus  Virus Outbreak Detection  Recurrent Pattern Detection  RBL (Realtime Black List), IP Reputation  Understanding of Intrusion  Signature based detection  Statistical anomaly based detection  Stateful protocol analysis detection  Network Based IPS (NIPS) & Wireless Based IPS (WIPS)  Network Behaviour Analysis (NBA)  Host Based IPS (HIPS)  WAF  Labs Module 8: VPN  What is VPN?  Why use VPN?  Advantages of VPN  Types of VPN based on protocols  Types of VPN Based on Tunnels  Need of firewall in VPN  Threat Free Tunneling  VPN Bandwidth Management  VPN Failover  Identity based authentication in VPN  Labs
  • 3. Cyberoam Certified Network & Security Professional Course Outline Email : training@cyberoam.com Website : http://training.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Module 9: QoS  What is QoS?  Why QoS?  Traffic Queuing  Traffic Prioritization  Bandwidth Allocation  Scheduling, and sharing bandwidth  Guaranteed bandwidth  QoS implementation on user, group, firewall, application, web category.  Labs Module 10: Network High Availability  High Availability, LAN Failsafe?  Clustering of devices  What is link load balancing?  Why undertake balancing?  link fails scenario  Why failover?  Multilink Manager  Load balancing  Active – Active load balancing and gateway failover  Active – Passive configuration and gateway failover  MPLS failover to VPN  Automatic ISP failover detection  Labs Module 11: General Administration  Setup Logging  DNS Management  DHCP Management  Upgrading Device Firmware  Backing Up  Restoring  Diagnostic Tools  Troubleshooting Tools  Labs to provide hands on to deal with maintenance Module 12: Logging & Reporting  Cyberoam iView Introduction  Types of Reports  Data Management  Report Management  Compliance reports  Searching within reports  Identity based reporting