SlideShare a Scribd company logo
Cyberoam Certified Network & Security Professional
Course Outline
Email : training@cyberoam.com
Website : http://training.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
OVERVIEW
CCNSP is the certification for security professionals from Cyberoam. It is the only Identity-based Security
Certification available globally and given the rising criticality of insider threats in enterprises, it brings
recognition to the certified professionals’ expertise in Identity-based Security, adding immense value to their
career.
The CCNSP certification prepares individuals to recognize insider threats and user-targeted external threats
while giving them expertise in networking and security fundamentals in addition to the deployment and
configuration of Cyberoam Identity-based UTM. The certification is comprehensive and easy to follow with real
world scenarios, delivering practical value to security professionals.
The CCNSP training is divided into the following modules.
Module 1: Cyberoam Product Overview
 Cyberoam UTM overview
 Cyberoam Central Console Overview
 Cyberoam on-cloud management overview
 Cyberoam iView Overview
Module 2: Deploying Cyberoam
 Prerequisites for deployment
 Network Diagrams & Scenarios
 Deployment Scenarios (Transparent/Gateway/Mixed) Mode
 Failure of Security Device & it's Consequences
 Proxy Scenarios
 Managing connectivity with multiple ISP’s
 Manage 3G and Wi-Max connections
 Labs
Module 3: Firewall
 What is a Firewall?
 Types of Firewall
 How to Control Access
 Identifying Each Machine on the network
 Managing the Firewall
 NAT
 DoS (Denial of Service)
 Fusion Technology based Unified Control
 Firewall - as a single solution to identity, security, connectivity, productivity, and logging Labs
Module 4: User Authentication
 What is Authentication?
 Requirement to Authenticate
 How can Authentication be done?
 Types of Authentication (Single Sign On, Local, and External)
 Group Authentication
 Traffic Discovery
 Authenticating from Servers (AD, LDAP, or RADIUS)
 Labs
Cyberoam Certified Network & Security Professional
Course Outline
Email : training@cyberoam.com
Website : http://training.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Module 5: Web Filter
 Need for Web Filtering
 Web 2.0 Filtering
 Filtering with Keywords
 Filtering with URL
 Filtering by Categories
 Filtering Web Traffic
 Labs
Module 6: Application Firewall
 Evolution of Application Firewall
 File Filtering
 Application & P2P Filtering
 Instant Messaging Filters
 Custom Filters
 Compliance based filtering
 Labs
Module 7: Network Threat Protection
 Functioning of Anti-Virus & Anti-Spam
 Basics of Virus, Spyware, Malware, Phising, and Pharming.
 Web/Mail/FTP Anti-Virus
 Gateway level Anti-Virus/Anti-Spam
 Instant Messaging Anti-Virus
 Virus Outbreak Detection
 Recurrent Pattern Detection
 RBL (Realtime Black List), IP Reputation
 Understanding of Intrusion
 Signature based detection
 Statistical anomaly based detection
 Stateful protocol analysis detection
 Network Based IPS (NIPS) & Wireless Based IPS (WIPS)
 Network Behaviour Analysis (NBA)
 Host Based IPS (HIPS)
 WAF
 Labs
Module 8: VPN
 What is VPN?
 Why use VPN?
 Advantages of VPN
 Types of VPN based on protocols
 Types of VPN Based on Tunnels
 Need of firewall in VPN
 Threat Free Tunneling
 VPN Bandwidth Management
 VPN Failover
 Identity based authentication in VPN
 Labs
Cyberoam Certified Network & Security Professional
Course Outline
Email : training@cyberoam.com
Website : http://training.cyberoam.com
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved.
Module 9: QoS
 What is QoS?
 Why QoS?
 Traffic Queuing
 Traffic Prioritization
 Bandwidth Allocation
 Scheduling, and sharing bandwidth
 Guaranteed bandwidth
 QoS implementation on user, group, firewall, application, web category.
 Labs
Module 10: Network High Availability
 High Availability, LAN Failsafe?
 Clustering of devices
 What is link load balancing?
 Why undertake balancing?
 link fails scenario
 Why failover?
 Multilink Manager
 Load balancing
 Active – Active load balancing and gateway failover
 Active – Passive configuration and gateway failover
 MPLS failover to VPN
 Automatic ISP failover detection
 Labs
Module 11: General Administration
 Setup Logging
 DNS Management
 DHCP Management
 Upgrading Device Firmware
 Backing Up
 Restoring
 Diagnostic Tools
 Troubleshooting Tools
 Labs to provide hands on to deal with maintenance
Module 12: Logging & Reporting
 Cyberoam iView Introduction
 Types of Reports
 Data Management
 Report Management
 Compliance reports
 Searching within reports
 Identity based reporting

More Related Content

What's hot

Web Application Firewall
Web Application FirewallWeb Application Firewall
Web Application Firewall
Chandrapal Badshah
 
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Andy Ellis
 
My Final Year Project
My Final Year ProjectMy Final Year Project
My Final Year Project
MOHAMMEDELALAM1
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
Rodrigo Martini
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
MarketingArrowECS_CZ
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine
Erin Banks
 
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Akamai Technologies
 
Barracuda company and product presentation
Barracuda company and product presentationBarracuda company and product presentation
Barracuda company and product presentation
Softechms
 
Barracuda ng firewall
Barracuda ng firewallBarracuda ng firewall
Barracuda ng firewall
Kappa Data
 
Microservices Security
Microservices SecurityMicroservices Security
Microservices Security
Aditi Anand
 
Best Practices Guide: Introducing Web Application Firewalls
Best Practices Guide: Introducing Web Application FirewallsBest Practices Guide: Introducing Web Application Firewalls
Best Practices Guide: Introducing Web Application Firewalls
alexmeisel
 
Barracuda Networks Overview
Barracuda Networks OverviewBarracuda Networks Overview
Barracuda Networks Overview
AEC Networks
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
Maliha Ali
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
InnoTech
 
Security Operations
Security OperationsSecurity Operations
Security Operations
ankitmehta21
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec Training
Mike Spaulding
 
Backup2013 - Barracuda Networks
Backup2013 - Barracuda NetworksBackup2013 - Barracuda Networks
Backup2013 - Barracuda Networks
Kappa Data
 

What's hot (17)

Web Application Firewall
Web Application FirewallWeb Application Firewall
Web Application Firewall
 
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
 
My Final Year Project
My Final Year ProjectMy Final Year Project
My Final Year Project
 
UTM Cyberoam
UTM Cyberoam UTM Cyberoam
UTM Cyberoam
 
Bezpečnostní architektura F5
Bezpečnostní architektura F5Bezpečnostní architektura F5
Bezpečnostní architektura F5
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine
 
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
Kona Web Application Firewall Overview - Akamai at RSA Conference 2013
 
Barracuda company and product presentation
Barracuda company and product presentationBarracuda company and product presentation
Barracuda company and product presentation
 
Barracuda ng firewall
Barracuda ng firewallBarracuda ng firewall
Barracuda ng firewall
 
Microservices Security
Microservices SecurityMicroservices Security
Microservices Security
 
Best Practices Guide: Introducing Web Application Firewalls
Best Practices Guide: Introducing Web Application FirewallsBest Practices Guide: Introducing Web Application Firewalls
Best Practices Guide: Introducing Web Application Firewalls
 
Barracuda Networks Overview
Barracuda Networks OverviewBarracuda Networks Overview
Barracuda Networks Overview
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
 
Security Operations
Security OperationsSecurity Operations
Security Operations
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec Training
 
Backup2013 - Barracuda Networks
Backup2013 - Barracuda NetworksBackup2013 - Barracuda Networks
Backup2013 - Barracuda Networks
 

Viewers also liked

Ccnsp course outline
Ccnsp course outlineCcnsp course outline
Ccnsp course outline
Ralbary
 
Χριστουγεννιάτικο φιλανθρωπικό bazaar BSB
Χριστουγεννιάτικο φιλανθρωπικό bazaar BSBΧριστουγεννιάτικο φιλανθρωπικό bazaar BSB
Χριστουγεννιάτικο φιλανθρωπικό bazaar BSB
CHRISPAP7
 
Opening Ceremony Project
Opening Ceremony ProjectOpening Ceremony Project
Opening Ceremony Project
megangodfrey
 
Progetto SCUOLA+15 progetti di diattica integrata
Progetto SCUOLA+15 progetti di diattica integrataProgetto SCUOLA+15 progetti di diattica integrata
Progetto SCUOLA+15 progetti di diattica integrata
Stefania Farsagli
 
Tipologia proyecto
Tipologia proyectoTipologia proyecto
Tipologia proyecto
Jefferson Granda
 
SAP Landscape
SAP Landscape SAP Landscape
SAP Landscape
lakshmi rajkumar
 
Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01
Ralbary
 
Dan Slee, Walsall Council | #DigiLead
Dan Slee, Walsall Council | #DigiLeadDan Slee, Walsall Council | #DigiLead
Dan Slee, Walsall Council | #DigiLead
NeighbourhoodWatchScotland
 
Operational Research
Operational ResearchOperational Research
Operational Research
Roy Thomas
 
Dynamic programming 2
Dynamic programming 2Dynamic programming 2
Dynamic programming 2
Roy Thomas
 
Screen print day
Screen print dayScreen print day
Screen print day
etekeurope
 
Home express
Home expressHome express
Home express
Anastasia Fedosimova
 
Email and groupware
Email and groupwareEmail and groupware
Email and groupware
Roy Thomas
 
KISP
KISPKISP
La Prospettiva delle Scienze Sociali
La Prospettiva delle Scienze SocialiLa Prospettiva delle Scienze Sociali
La Prospettiva delle Scienze Sociali
asvsa
 

Viewers also liked (16)

Ccnsp course outline
Ccnsp course outlineCcnsp course outline
Ccnsp course outline
 
Χριστουγεννιάτικο φιλανθρωπικό bazaar BSB
Χριστουγεννιάτικο φιλανθρωπικό bazaar BSBΧριστουγεννιάτικο φιλανθρωπικό bazaar BSB
Χριστουγεννιάτικο φιλανθρωπικό bazaar BSB
 
Opening Ceremony Project
Opening Ceremony ProjectOpening Ceremony Project
Opening Ceremony Project
 
Progetto SCUOLA+15 progetti di diattica integrata
Progetto SCUOLA+15 progetti di diattica integrataProgetto SCUOLA+15 progetti di diattica integrata
Progetto SCUOLA+15 progetti di diattica integrata
 
Tipologia proyecto
Tipologia proyectoTipologia proyecto
Tipologia proyecto
 
SAP Landscape
SAP Landscape SAP Landscape
SAP Landscape
 
Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01Ccnsptrainerpresentation 111019052032-phpapp01
Ccnsptrainerpresentation 111019052032-phpapp01
 
Dan Slee, Walsall Council | #DigiLead
Dan Slee, Walsall Council | #DigiLeadDan Slee, Walsall Council | #DigiLead
Dan Slee, Walsall Council | #DigiLead
 
Operational Research
Operational ResearchOperational Research
Operational Research
 
Dynamic programming 2
Dynamic programming 2Dynamic programming 2
Dynamic programming 2
 
Screen print day
Screen print dayScreen print day
Screen print day
 
Home express
Home expressHome express
Home express
 
Email and groupware
Email and groupwareEmail and groupware
Email and groupware
 
KISP
KISPKISP
KISP
 
La Prospettiva delle Scienze Sociali
La Prospettiva delle Scienze SocialiLa Prospettiva delle Scienze Sociali
La Prospettiva delle Scienze Sociali
 
Каталог
КаталогКаталог
Каталог
 

Similar to Ccnsp course outline

Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and Benefits
Anthony Daniel
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
CloudExpoEurope
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
Array Networks
 
Cr vs fortinet
Cr vs fortinetCr vs fortinet
Cr vs fortinet
gopi123_ipog
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
MSAdvAnalytics
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Global Online Trainings
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Amazon Web Services Korea
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
Armor
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
CeleraNetworks
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
Ali Kapucu
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
Allen Brokken
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
IDG Romania
 
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfazure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdf
BenAissaTaher1
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
Moshe Ferber
 
Building Up Network Security: An Introduction
Building Up Network Security: An Introduction Building Up Network Security: An Introduction
Building Up Network Security: An Introduction
Global Knowledge Training
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
Baqar Kazmi
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
bakar kazmi
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
Baqar kazmi
 
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDUBest CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
Ns3Edu
 

Similar to Ccnsp course outline (20)

Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and Benefits
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
Cr vs fortinet
Cr vs fortinetCr vs fortinet
Cr vs fortinet
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
Celera Networks on Cloud Computing
Celera Networks on Cloud Computing Celera Networks on Cloud Computing
Celera Networks on Cloud Computing
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
azure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdfazure-security-overview-slideshare-180419183626.pdf
azure-security-overview-slideshare-180419183626.pdf
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
 
Building Up Network Security: An Introduction
Building Up Network Security: An Introduction Building Up Network Security: An Introduction
Building Up Network Security: An Introduction
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
CyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochureCyberoamVirtualSecurityBrochure
CyberoamVirtualSecurityBrochure
 
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDUBest CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
 

Recently uploaded

spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 

Recently uploaded (20)

spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 

Ccnsp course outline

  • 1. Cyberoam Certified Network & Security Professional Course Outline Email : training@cyberoam.com Website : http://training.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. OVERVIEW CCNSP is the certification for security professionals from Cyberoam. It is the only Identity-based Security Certification available globally and given the rising criticality of insider threats in enterprises, it brings recognition to the certified professionals’ expertise in Identity-based Security, adding immense value to their career. The CCNSP certification prepares individuals to recognize insider threats and user-targeted external threats while giving them expertise in networking and security fundamentals in addition to the deployment and configuration of Cyberoam Identity-based UTM. The certification is comprehensive and easy to follow with real world scenarios, delivering practical value to security professionals. The CCNSP training is divided into the following modules. Module 1: Cyberoam Product Overview  Cyberoam UTM overview  Cyberoam Central Console Overview  Cyberoam on-cloud management overview  Cyberoam iView Overview Module 2: Deploying Cyberoam  Prerequisites for deployment  Network Diagrams & Scenarios  Deployment Scenarios (Transparent/Gateway/Mixed) Mode  Failure of Security Device & it's Consequences  Proxy Scenarios  Managing connectivity with multiple ISP’s  Manage 3G and Wi-Max connections  Labs Module 3: Firewall  What is a Firewall?  Types of Firewall  How to Control Access  Identifying Each Machine on the network  Managing the Firewall  NAT  DoS (Denial of Service)  Fusion Technology based Unified Control  Firewall - as a single solution to identity, security, connectivity, productivity, and logging Labs Module 4: User Authentication  What is Authentication?  Requirement to Authenticate  How can Authentication be done?  Types of Authentication (Single Sign On, Local, and External)  Group Authentication  Traffic Discovery  Authenticating from Servers (AD, LDAP, or RADIUS)  Labs
  • 2. Cyberoam Certified Network & Security Professional Course Outline Email : training@cyberoam.com Website : http://training.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Module 5: Web Filter  Need for Web Filtering  Web 2.0 Filtering  Filtering with Keywords  Filtering with URL  Filtering by Categories  Filtering Web Traffic  Labs Module 6: Application Firewall  Evolution of Application Firewall  File Filtering  Application & P2P Filtering  Instant Messaging Filters  Custom Filters  Compliance based filtering  Labs Module 7: Network Threat Protection  Functioning of Anti-Virus & Anti-Spam  Basics of Virus, Spyware, Malware, Phising, and Pharming.  Web/Mail/FTP Anti-Virus  Gateway level Anti-Virus/Anti-Spam  Instant Messaging Anti-Virus  Virus Outbreak Detection  Recurrent Pattern Detection  RBL (Realtime Black List), IP Reputation  Understanding of Intrusion  Signature based detection  Statistical anomaly based detection  Stateful protocol analysis detection  Network Based IPS (NIPS) & Wireless Based IPS (WIPS)  Network Behaviour Analysis (NBA)  Host Based IPS (HIPS)  WAF  Labs Module 8: VPN  What is VPN?  Why use VPN?  Advantages of VPN  Types of VPN based on protocols  Types of VPN Based on Tunnels  Need of firewall in VPN  Threat Free Tunneling  VPN Bandwidth Management  VPN Failover  Identity based authentication in VPN  Labs
  • 3. Cyberoam Certified Network & Security Professional Course Outline Email : training@cyberoam.com Website : http://training.cyberoam.com © Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Module 9: QoS  What is QoS?  Why QoS?  Traffic Queuing  Traffic Prioritization  Bandwidth Allocation  Scheduling, and sharing bandwidth  Guaranteed bandwidth  QoS implementation on user, group, firewall, application, web category.  Labs Module 10: Network High Availability  High Availability, LAN Failsafe?  Clustering of devices  What is link load balancing?  Why undertake balancing?  link fails scenario  Why failover?  Multilink Manager  Load balancing  Active – Active load balancing and gateway failover  Active – Passive configuration and gateway failover  MPLS failover to VPN  Automatic ISP failover detection  Labs Module 11: General Administration  Setup Logging  DNS Management  DHCP Management  Upgrading Device Firmware  Backing Up  Restoring  Diagnostic Tools  Troubleshooting Tools  Labs to provide hands on to deal with maintenance Module 12: Logging & Reporting  Cyberoam iView Introduction  Types of Reports  Data Management  Report Management  Compliance reports  Searching within reports  Identity based reporting