Akamai Web Application & API Protection

Course Overview

The Akamai Web Application & API Protection is a comprehensive course that focuses on configuring & maintaining App & API Protector (AAP) with Advanced Security Management using the new Adaptive Security Engine. The course starts with setting up a basic configuration utilizing default best practices. It describes the concepts involved in analyzing & tuning the structure to maintain it. The participants learn how to protect both APIs & web applications. They are also taught how to detect bots & apply actions to those that pose an immediate threat with the new Bot Visibility & Mitigation (BVM) feature.

Learning Objectives:

At the end of this course, professionals will be able to:

  • Describe the basics of the Akamai Intelligent Edge Platform.
  • Explain the Threat Landscape as it applies to Web Application Security.
  • Describe the features of the Application & API Protection products.
  • Configure & activate AAP.
  • Test the AAP configuration for APIs & web applications.
  • Analyze the behaviour of the configuration using reporting & alerting tools.
  • Tune AAP by the results of the analysis.
  • Discover the DevOps capabilities using our Security APIs.

Content Outline

  • This module introduces Akamai, the Cloud Security Solutions portfolio, & the Akamai Control Center.
  • This module will cover the basics of Web Application Security, such as OWASP, common attack trends, & how bots are designed, developed & used to attack web applications.
  • This module will describe the components used in essential site delivery like Site Shield, Site Failover, Compliance Management, etc. & how they can be edited to optimize the configuration & provide elements of security within the delivery configuration.
  • This module will introduce the new App & API Protector (AAP) with Advanced Security Management using the new Adaptive Security Engine, discuss the differences between AAP-ASM & Kona Site Defender or Web Application Protector, & how to upgrade into AAP-ASM from an existing product
  •  This module discusses the new features of the App & API Protector (AAP) with Advanced Security Management, & how to configure the various components such as Selected Hosts & Match Targets, Rate Controls, Application Layer Controls, Network Layer Controls, & Slow POST protection.
  • This module focuses on the details of API protection & how to set up a configuration for the protection of APIs.
  • This module demonstrates how to identify & utilize the different reports used in analyzing Network Lists, DOS Protections, Rate Controls, Slow POST protection, ASE rules, & Pattern-based bots. The Security Dashboard, Security Center, & Web Security Analytics will be highlighted. The module concludes with best practices around setting up notifications within the Security Center
  • This module delves into how & when to set rules for the Adaptive Security Engine within AAP-ASM into Deny mode.
  • This module explores the use of DevSecOps philosophies to automate security tasks using APIs and the security functionality available via Akamai APIs. This module also explores configuring reporting options for the SIEM integrations.

FAQs

Akamai Control Center is the integrated interface for Akamai's products, services, & platform. Control Center gives businesses the access, insight, & control they need to deliver the best online experiences.

The Akamai edge compute platform helps to build & run applications & services elastically with unparalleled scale, reliability, & security. For over two decades, Akamai has helped businesses develop edge computing solutions tailored to their specific growth & development needs.

 

 At the end of this course, participants will be able to:

• Describe the basics of the Akamai Intelligent Edge Platform.

• Explain the Threat Landscape as it applies to Web Application Security.

• Describe the features of the Application & API Protection products.

• Configure & activate AAP.

• Test the AAP configuration for APIs & web applications.

• Analyze the behaviour of the configuration using reporting & alerting tools.

• Tune AAP by the results of the analysis

A: Yes, you can.

 

A: Our Internet security standards are top-notch, and we never share any retained data with third parties.

A: It is recommended but optional. Being acquainted with the primary course material will enable students & the trainer to move at the desired pace during classes. You can access courseware for most vendors.

A: You can buy online from the page by clicking "Buy Now". You can view alternate payment methods on the payment options page.

A: Yes, students can pay from the course page.

A: All professionals who have completed the training programme and the project assignment assigned by your instructor will be awarded the course completion certification. Using the certificate in future job interviews will assist you in landing your dream job.

 

Ans- Radiant believes in a practical & creative approach to training & development, distinguishing it from other activity & developmental platforms. Moreover, training courses are undertaken by experts with a range of experience in their domain.

Send a Message.


  • Enroll