Akamai Fraud Management

Course Overview

The Akamai Fraud Management course covers the current threat landscape, attacker motivations, & technical mitigation strategies for automated non-human (bot) attacks. These range from a single host running command-line scripts to distributed botnets actively trying to appear as legitimate clients. Attack types range from introductory page/price scraping to more advanced credential-stuffing attacks. The participants learn how our fraud management products detect & mitigate unwanted bots using AI models for user behaviour analysis & browser fingerprinting. The course demonstrates Akamai's Bot Manager Premier (BMP) product - how it can collect & evaluate different signals (network characteristics, device characteristics, & human interaction data) to determine if a human or an automated machine runs a browser session. The course covers the new Bot Score detection engine & how it helps manage False Positive/False Negative response balance, & the new Account Protector product, which mitigates the most complex credential stuffing attacks. In addition to common mitigation strategies such as deny, tarpit & slow, students will also learn & implement advanced mitigation techniques such as conditional actions, CAPTCHA & crypto challenges in hands-on lab environments.

Prerequisites

  • You have at least one Akamai Security Product on contract
  • You have an account set up in the Akamai Control Center (control.akamai.com)
  • You have deployed an Akamai Configuration to staging or production

Learning Objectives:

After completing this course, participants will be able to do the following:

  • Describe the basics of the Akamai Intelligent Platform.
  • Provide an overview of the Akamai Cloud Security Solutions portfolio.
  • Identify the top bot use cases Akamai customers encounter.
  • Explain how to mitigate various types of bot attacks using Bot Manager.
  • Configure Bot Manager actions appropriate for each use case.
  • Using Akamai Control Center, prepare & deploy a Bot Manager configuration
  • to mitigate bot attacks & view detailed reporting on bot activity.
  • Describe how to tune & troubleshoot fundamental bot false positive & false negative
  • issues to improve your security posture.
  • Identify the use case for Account Protector & describe its key features.
  • Configure Account Protector to mitigate account takeover.

Content Outline

  • Module 1 is an introduction to Akamai's Cloud Security Solutions portfolio, & a reference architecture for Bot Manager discussion
  •  This module discusses the various pain points that bot cause. In this module, we examine why defence is complex and the top five bot use cases that Akamai customers encounter.
  • This module is a technical review of Akamai's Security Cloud Security Solutions portfolio & discusses how the products work together to defend customer websites for bot mitigation.
  • This module will identify mitigation strategies available in Bot Manager & review appropriate mitigation strategies based on the type of botnet detected.
  • This module introduces the key features of our Bot Management products, including Bot Visibility & Mitigation & Bot Manager Standard, & how to use Akamai Bot Categories & Custom Bot Categories. Essential Bot Detections such as Request Anomaly, User-Agent, & Validation are discussed.
  • This module introduces Bot Manager Premier & BMP SDK. The technical approach to Behavior Anomaly Detection, API Definition & Resource Purpose, & the new Bot Score model is discussed. This module also covers the Bot Manager Premier Mobile solution & Software Development Kit (SDK) available for mobile app protection.
  • This module introduces the new Fraud management solution known as Account Protector, & discusses the account takeover (ATO) problem, how Account Protector assists with ATO types of attacks, & how to configure Account Protector
  • This module will review the value proposition features of Managed Security Services & describe the critical features of MSS for Bot Manager Premier
  •  This module will assist the learner in Identifying & using various reports & tools available in Security Center for analyzing Bot traffic & setting up notifications. Tuning Bot Manager based on your analysis will be discussed as an introduction to the subsequent module.
  • In this penultimate module, based on their knowledge of Security Center, learners will learn how to tune bot definitions & set them into Deny Mode. The module will also review basic troubleshooting steps for Bot Management & Account Protector & review basic escalation steps for Bot Management.
  • This final module provides critical takeaways for the entire course & provides a last opportunity for learners to complete lab work, receive job aids & other materials, & a class discussion on follow-up questions or concerns.

FAQs

  • You have at least one Akamai Security Product on contract
  • You have an account set up in the Akamai Control Center (control.akamai.com)
  • You have deployed an Akamai Configuration to staging or production

Bot Manager Premier (BMP) is Akamai's solution for identifying & mitigating malicious bot traffic in complex connected device environments typical to our broadcast, OTT, gaming, & publishing customers.

 

 The course demonstrates Akamai's Bot Manager Premier (BMP) product - how it can collect & evaluate different signals (network characteristics, device characteristics, & human interaction data) to determine if a human or an automated machine runs a browser session. The course covers the new Bot Score detection engine & how it helps manage False Positive/False Negative response balance, & the new Account Protector product, which mitigates the most complex credential stuffing attacks.

 

Akamai Bot Manager gives you visibility & control over bots to help you guard your business &, in turn, protect the trust in your online relationships. Companies increasingly implement good bots for efficiency online — automating interactions with consumers, partners, suppliers, & third parties.

 

A: To attend the training session, professionals should have an operational Desktop or Laptop with the required specifications and a good internet connection to access the labs. 

 

 Ans- Yes, Radiant will provide you most updated high, value-relevant real-time projects & case studies in each training program.

 

Ans- Technical issues are unpredictable & might occur with us as well. Participants must ensure access to the required configuration with good internet speed.

A: When we receive your enrollment request, we will send you the information you need to choose and complete the enrollment process.

To learn about the upcoming schedule for a specific technology training programme, please contact us at the email address listed below (whichever is applicable).

Individuals should contact training@radianttechlearning.com.

RadiantTech Learning Corporate: Corporate@radiantechlearning.com

 

Send a Message.


  • Enroll