Configuring F5 Advanced WAF (previously licensed as ASM) (TRG-BIG-AWF-CFG)

 

Course Overview

In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks.

The course includes lecture, hands-on labs, and discussion about different F5 Advanced Web Application Firewall tools for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits.

Prerequisites

There are no F5-technology-specific prerequisites for this course. However, completing the following before attending would be very helpful for students with limited BIG-IP administration and configuration experience:

or

  • F5 Certified BIG-IP Administrator

The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course:

  • OSI model encapsulation
  • Routing and switching
  • Ethernet and ARP
  • TCP/IP concepts
  • IP addressing and subnetting
  • NAT and private IP addressing
  • Default gateway
  • Network firewalls
  • LAN vs. WAN

Course Objectives

  • Describe the role of the BIG-IP system as a full proxy device in an application delivery network
  • Provision F5 Advanced Web Application Firewall resources
  • Define a web application firewall
  • Describe how F5 Advanced Web Application Firewall protects a web application by securing file types, URLs, and parameters
  • Deploy F5 Advanced Web Application Firewall using the Rapid Deployment template (and other templates) and define the security checks included in each
  • Define learn, alarm, and block settings as they pertain to configuring F5 Advanced Web Application Firewall
  • Define attack signatures and explain why attack signature staging is important
  • Contrast positive and negative security policy implementation and explain benefits of each
  • Configure security processing at the parameter level of a web application
  • Use an application template to protect a commercial web application
  • Deploy F5 Advanced Web Application Firewall using the Automatic Policy Builder
  • Tune a policy manually or allow automatic policy building
  • Integrate third party application vulnerability scanner output into a security policy
  • Configure login enforcement and session tracking
  • Configure protection against brute force, web scraping, and Layer 7 denial of service attacks
  • Implement iRules using specific F5 Advanced Web Application Firewall events and commands
  • Use Content Profiles to protect JSON and AJAX-based applications
  • Implement Bot Signatures
  • Implement Proactive Bot Defense

Course Content

  • Resource provisioning for F5 Advanced Web Application Firewall
  • Traffic processing with BIG-IP Local Traffic Manager (LTM)
  • Web application concepts
  • Web application vulnerabilities
  • Security policy deployment
  • Security policy tuning
  • Attack signatures
  • Positive security building
  • Securing cookies and other headers
  • Reporting and logging
  • Policy Diff, merging, and exporting
  • Advanced parameter handling
  • Using application templates
  • Using Automatic Policy Builder
  • Integrating with web vulnerability scanners
  • Login enforcement
  • Brute force mitigation
  • Session tracking
  • Web scraping detection and mitigation
  • Geolocation Enforcement and IP Address Exceptions
  • Using Parent and Child policies
  • Layer 7 DoS protection
  • F5 Advanced Web Application Firewall and iRules
  • Using Content Profiles for AJAX and JSON applications
  • Advanced Bot Detection and Defense
  • Proactive Bot Defense

Prices & Delivery methods

Online Training
Modality: U

Duration 4 days

Price
  • on request
Classroom Training
Modality: G

Duration 4 days

Price
  • on request

Schedule

English

Time zone: Central European Summer Time (CEST)

Online Training This is a FLEX course. Time zone: Central European Summer Time (CEST)
Online Training This is a FLEX course. Time zone: Central European Summer Time (CEST)
Online Training This is a FLEX course. Time zone: Central European Time (CET)
Online Training This is a FLEX course. Time zone: Central European Time (CET)
Guaranteed date:   We will carry out all guaranteed training regardless of the number of attendees, exempt from force majeure or other unexpected events, like e.g. accidents or illness of the trainer, which prevent the course from being conducted.
Instructor-led Online Training:   This computer icon in the schedule indicates that this date/time will be conducted as Instructor-Led Online Training.
This is a FLEX course, which is delivered both virtually and in the classroom. All FLEX courses are also Instructor-led Online Trainings (ILO).

Europe

Belgium

Diegem This is a FLEX course.   Time zone: Europe/Brussels Enroll:
for online training
for classroom training
Diegem This is a FLEX course.   Time zone: Europe/Brussels Enroll:
for online training
for classroom training

France

Paris Enroll

Italy

Agrate Brianza This is a FLEX course.   Time zone: Europe/Rome Enroll:
for online training
for classroom training
Agrate Brianza This is a FLEX course.   Time zone: Europe/Rome Enroll:
for online training
for classroom training
Agrate Brianza This is a FLEX course.   Time zone: Europe/Rome Enroll:
for online training
for classroom training
Agrate Brianza This is a FLEX course.   Time zone: Europe/Rome Enroll:
for online training
for classroom training

Netherlands

Houten This is a FLEX course.   Time zone: Europe/Amsterdam Enroll:
for online training
for classroom training
Houten This is a FLEX course.   Time zone: Europe/Amsterdam Enroll:
for online training
for classroom training
This is a FLEX course, which is delivered both virtually and in the classroom. All FLEX courses are also Instructor-led Online Trainings (ILO).