- Mohamed Lamine DhouiouFebruary 7, 2025February 7, 2027Claroty Implementation Engineer - IND
Mohamed Lamine Dhouiou
This course is intended for implementation engineers who are tasked with post-sales deployment, implementation and operationalization of Claroty solutions. If desired, this course can also be undertaken by pre-sales engineers and technical consultants. This course provides the knowledge base necessary to complete CTD and SRA implementations in virtual and physical environments, including CTD and SRA installations, delivery-related project management, identification of network SPAN tapping points, configuration of networks and products, network design, and system-tuning processes.
Upon successfully completing this course, learners:
Will have been given an overview of the Continuous Threat Detection (CTD) solution, including:
Asset visibility within CTD, including how Claroty identifies network assets, asset details and virtual zones.
The concept of ‘vulnerability’, including Claroty's asset-risk mechanism, reporting and vulnerability identification.
Threat detection, including alert generation, alert details, custom alert rules and how to work with policy rules.
Familiarity with CTD deployment architectures, including different deployment components and their purposes, values, and limitations.
Familiarity with CTD’s Active and Passive detection, including the advantages and disadvantages of each detection method.
Will have been given an overview of the Secure Remote Access (SRA) solution, including value propositions and use cases.
Will have been given an overview of a typical Claroty implementation project, including:
Project initiation.
Project scoping.
Project planning.
Implementation of Claroty solutions, including:
The traffic-mirroring guidelines that need to be followed to correctly harvest data into CTD.
The traffic-validation process that ensures the correct data-tapping points were properly identified and configured.
Claroty-approved hardware mounting processes.
Claroty-approved software installation processes.
System sanity checking (Basic troubleshooting).
The CTD system tuning processes are used in cases where there is excessive system noise.
Claroty-approved system handover processes.
Skills / Knowledge
- OT Cybersecurity
- Continuous Threat Detection
- Secure Remote Access
- Network Configuration
- Cyber Physical Systems
- Project Management
- Network Design