Configuring F5 Advanced WAF

Course Description

In this four-day course, students have a functional understanding of how to deploy, tune, and operate the F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks. The course includes lectures, hands-on labs, and discussions about different F5 Advanced Web Application Firewall tools for detecting and mitigating threats from multiple attack vectors such as web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero-day exploits. This course is on the list of approved study resources for the F5 ASM 303 certification exam.

All attendees receive an original F5 study guide.

  • Describe the role of the Advanced Web Application Firewall.
  • Describe how F5 Advanced Web Application Firewall protects a web application by securing file types, URLs, and parameters.
  • Deploy F5 Advanced Web Application Firewall policies.
  • Define learn, alarm, and block settings as they pertain to configuring F5 Advanced Web Application Firewall.
  • Define attack signatures and explain why attack signature staging is essential.
  • Deploy Threat Campaigns to secure against CVE threats.
  • Deploy police using manual or automated approaches.
  • Deploy Advanced Bot Defense against web scrapers, all known bots, and other automated agents.
  • Deploy DataSafe to secure client-side data.

Prerequisites

Students should understand the following:

  • Basic HTTP and HTML concepts
  • Basic security concepts
  • Common network terminology
  • Web application terminology

Content Outline

Resource provisioning for F5 Advanced Web Application Firewall

  • Traffic processing with BIG-IP Local Traffic Manager (LTM)
  • Web application concepts
  • Mitigating the OWASP Top 10 and other vulnerabilities

Security policy deployment

  • Security policy tuning
  • Deploying Attack Signatures and Threat Campaigns
  • Positive security building
  • Securing cookies and other headers
  • Reporting and logging
  • Advanced parameter handling
  • Using Automatic Policy Builder

Integrating with web vulnerability scanners

  • Login enforcement for flow control
  • Brute force and credential stuffing mitigation
  • Session tracking for client reconnaissance

Using Parent and Child policies

  • Layer 7 DoS protection Transaction Per Second-based DoS protection Layer 7 Behavioral DoS Protection
  • Configuring Advanced Bot Defense Web Scraping and other Microservice Protection Working with Bot Signatures
  • Using DataSafe to Secure the client side of the Document Object Model

FAQs

A: To attend the training session, you should have operational Desktops or Laptops with the required specification and a good internet connection to access the labs. 

 

A: We recommend you attend the live session to practice & clarify the doubts instantly and get more value from your investment. However, if, due to some contingency, you have to skip the class, Radiant Techlearning will help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.

A: Radiant Techlearning has a data center containing a Virtual Training environment for participants’ hands-on practice. Participants can easily access these labs over Cloud with the help of a remote desktop connection. Radiant virtual labs allow you to learn from anywhere in the world and any time zone. 

 

A: The learners will be enthralled as we engage them in the natural world and Oriented industry projects during the training program. These projects will improve your skills and knowledge and give you a better experience. These real-time projects will significantly help you in future tasks and assignments.

Send a Message.


  • Enroll