F5 Networks Setting Up BIG-IP Advanced WAF: Web Application Firewall

Price
$995.00

Duration
1 Day

 

Delivery Methods
Virtual Instructor Led
Private Group

Course Overview

In this 1 day course, participants identify and mitigate common web application vulnerabilities on the client and application sides of the threat spectrum. Participants use F5 Advanced WAF to quickly configure advanced protection against common Layer 7 vulnerabilities (OWASP Top Ten) and bot defense.

Who Should Attend?

This course is intended for users who wish to rapidly deploy a basic web application security policy with minimal configuration; deploy a DoS Protection Profile to detect server stress, and block bad actors.

United Training is committed to working as a partner with our clients. Choose United Training and take advantage of the following benefits.

  • Robust Public Enrollment Schedule. Enjoy access to hundreds of Guaranteed to Run dates across a diverse catalog of course titles.
  • Private Group Training. Let our world-class instructors come to you to deliver training at your place of business or we can present to your team online using our Virtual Instructor-Led Training platform.
  • Custom Training Solutions. Our subject matter experts can customize the class to specifically address the unique goals of your team.
  • Free Re-Takes. Most completed United Training courses carry our unbeatable Learning Guarantee. This guarantee allows students to repeat most United Training courses, if they are the same version, FREE OF CHARGE, within six months of completion of the courses. Exceptions: Cisco, Citrix, VMware, Red Hat, and courses provided by affiliated 3rd party training providers.

Course Prerequisites

Administering BIG-IP, OSI model, TCP/IP addressing and routing, WAN, LAN environments; or having achieved TMOS Administration Certification. Knowledge of Advanced WAF/ASM is recommended.

Agenda

1 - Setting Up the BIG-IP System

  • Introducing the BIG-IP System
  • Initially Setting Up the BIG-IP System
  • Archiving the BIG-IP System Configuration
  • Leveraging F5 Support Resources and Tools

2 - Threat Overview and Guided Configuration

  • Classifying Attack Types
  • Differentiating Benign and Malicious Clients
  • Categorizing Attack Techniques
  • Defining the Layer 7 Web Application Firewall
  • Defining Traffic Processing Objects
  • Introducing F5 Advanced WAF
  • Using Guided Configuration for Web Application Security

3 - Exploring HTTP Traffic

  • Exploring Web Application HTTP Request Processing
  • Overview of Application-Side Vulnerabilities
  • Defining Attack Signatures
  • Defining Violations

4 - Securing HTTP Traffic

  • Defining Learning
  • Defining Attack Signature Staging
  • Defining Attack Signature Enforcement

5 - Mitigating Credentials Stuffing

  • Defining Credentials Stuffing Attacks
  • The Credentials Stuffing Mitigation Workflow

6 - Form Encryption Using BIG-IP DataSafe

  • What Elements of Application Delivery are Targeted?
  • Exploiting the Document Object Model
  • Protecting Applications Using DataSafe
  • Configuring a DataSafe Profile

7 - Deploying Threat Campaigns

  • Defining Threat Campaigns
  • Live Update for Threat Campaigns

8 - Using Layer 7 Behavioral Analysis to Mitigate DoS

  • Defining Behavioral Analysis
  • Defining the DoS Protection Profile
 

There are no open enrollment courses currently scheduled.
Inquire about scheduling this course when it’s best for your team. Learn More about Private Group Training

 


Do You Have Additional Questions? Please Contact Us Below.

contact us contact us 
 
Contact Us about Starting Your Business Training Strategy with United Training