Why get trained with Gatewatcher?

Gatewatcher offers 3 levels of certification to value the expertise of its partners. These courses are a real asset to stand out in the market and gain increased visibility with your customers. The proof of a high qualification for the optimal use of our solution Trackwatch®, the guarantee of a regular skills upgrade, a pledge of sought-after expertise which distinguishes you on the market and an increased credibility with your customers.

Gatewatcher Certified Security Professional (GCSP)

Duration: 1 day

Training overview

GCSP certifying training is for administrators and users of Trackwatch®. At the end of the course, you will be able to install and configure GCAP probes and GCENTER, perform GCAP and GCENTER pairing, diagnose GCAP and GCENTER, and have a first level of Trackwatch® alert analysis.

Prerequisites

Each attendee should ideally have a computer station with access to the solution if it is already installed on the training site or if necessary to connect remotely if the solution is in our premises. Good knowledge of Linux environment, process concepts and inter-process communication as well as LAN / WAN, TCP / IP, IPSEC, proxy and HTTP protocols.

Content

  • Trackwatch® operation, deployment and hardware
  • GCAP probe operation and deployment
  • GCAP and GCENTER pairing
  • Sigflow management
  • GCENTER operation and deployment
  • Architecture: integration
  • Analyse engines: Sigflow / Malcore / Codebreaker
Next sessions

Gatewatcher Certified Security Expert (GCSE)

Duration: 2 days

Training overview

GCSE certifying training is for advanced architects and administrators of Trackwatch®. At the end of the course, you will be able to set up and configure GCAP and GCENTER, to configure and understand Trackwatch® detection options, to understand alerts and have an advanced expertise on the product.

Prerequisites

Each attendee should ideally have a computer station with access to the solution if it is already installed on the training site or if necessary to connect remotely if the solution is in our premises. A test platform will be set up by Gatewatcher team on which attendees will be able to run tests. Good knowledge of Linux environment, process concepts and inter-process communication as well as LAN / WAN, TCP / IP, IPSEC, proxy and HTTP protocols.

Content

  • Reminders on Trackwatch®
  • ANSSI (French Cybersecurity Agency) hardening
  • Theory and practice on detection probes (GCAP)
  • Theory and practice on the management server (GCENTER)
  • Military Planning Act mode: GCAP et GCENTER
  • Advanced GCENTER configuration (interfaces)
  • Advanced GCAP configuration
  • Attacker/victim platform
Next sessions

Gatewatcher Certified Security Analyst (GCSA)

Duration: 3 days

Training overview

GCSA certifying training is for advanced architects and administrators of Trackwatch ® . At the end of the course, you’ll be able to manage signatures (Sigflow), analyse events, attacks and advanced intrusions, to size according to network flow structure and security policy, to optimise detection process by adjusting to attacks, to detect custom shellcodes, to fight against polymorphic threats. You’ll also access a demonstration platform on which you’ll be able to inject several PCAP.

Prerequisites

Each attendee should ideally have a computer station with access to the solution if it is already installed on the training site or if necessary to connect remotely if the solution is in our premises. A test platform will be set up by Gatewatcher team on which attendees will be able to run tests. Good knowledge of Linux environment, process concepts and inter-process communication as well as LAN / WAN, TCP / IP, IPSEC, proxy and HTTP protocols.

Content

  • Reminders on Trackwatch®
  • Test platform launch
  • Intrusion detection and analysis by signatures: Sigflow
  • APTs threat: Malcore
  • Malicious programs detection and analysis (malware): Malcore
  • From shellcodes to ROPs: Codebreaker
Next sessions

This website uses cookies to ensure you get the best experience on our website. Learn more.