The course enables security professionals to become familiar with the basics of networking and UTM security and delivers practical knowledge of deployment, configuration and management of Cyberoam identity-based UTM appliances in complex enterprise scenarios. Participants will learn:

Evolution of Enterprise Security
  • Firewall to UTM
  • Insider Threats
  • Identity-based UTM
  • Centralised Security Management
Implementing Cyberoam devices in a network
  • Firewall Policy Configuration and Management
  • User Authentication
  • Identity-based Access Policies and their Significance
  • Feature Configuration – Content & Application Filtering, Anti-virus and Anti-spam, IPS, VPN, Bandwidth and Multiple Link Management
  • Identity-based Reporting and its Criticality
  • Routing Concepts
  • General Administration
  • Troubleshooting & Diagnostics