Who Should Attend?
This course is intended for users who wish to rapidly deploy a basic web application security policy with minimal configuration; deploy a DoS Protection Profile to detect server stress, and block bad actors.
- Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
- Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
- Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
- Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
- Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
- Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.
Agenda
1 - Setting Up the BIG-IP System
- Introducing the BIG-IP System
- Initially Setting Up the BIG-IP System
- Archiving the BIG-IP System Configuration
- Leveraging F5 Support Resources and Tools
2 - Threat Overview and Guided Configuration
- Classifying Attack Types
- Differentiating Benign and Malicious Clients
- Categorizing Attack Techniques
- Defining the Layer 7 Web Application Firewall
- Defining Traffic Processing Objects
- Introducing F5 Advanced WAF
- Using Guided Configuration for Web Application Security
3 - Exploring HTTP Traffic
- Exploring Web Application HTTP Request Processing
- Overview of Application-Side Vulnerabilities
- Defining Attack Signatures
- Defining Violations
4 - Securing HTTP Traffic
- Defining Learning
- Defining Attack Signature Staging
- Defining Attack Signature Enforcement
5 - Mitigating Credentials Stuffing
- Defining Credentials Stuffing Attacks
- The Credentials Stuffing Mitigation Workflow
6 - Form Encryption Using BIG-IP DataSafe
- What Elements of Application Delivery are Targeted?
- Exploiting the Document Object Model
- Protecting Applications Using DataSafe
- Configuring a DataSafe Profile
7 - Deploying Threat Campaigns
- Defining Threat Campaigns
- Live Update for Threat Campaigns
8 - Using Layer 7 Behavioral Analysis to Mitigate DoS
- Defining Behavioral Analysis
- Defining the DoS Protection Profile