Imperva Cloud Security Certification (ICSC)

Course Overview

  • In this instructor-led training, students will learn:
    The advantage of the optimization, security and redundancy features of DDoS protection for websites, Web Site Security, Content Delivery Network & Load Balancer products and solutions.
  •   Traffic routing, inspection & filtering capabilities between clients & web applications through the Incapsula network.
  •   Handling account settings & setting up new system users.
  •  Onboarding of the Incapsula Web Application Firewall to shield an association's web site.
  •   The Incapsula security model, setting up customized rules, web application security protections, & handling Layer 7 DDoS Attacks.
  •   Benefits & performance improvements available with various caching options in an Incapsula CDN.
  •   Configuration of load balancing within & between data centers.
  •   Setting up log integration solutions, choosing the correct retrieve mode, & retrieving logs from a cloud repository.

Prerequisites

Before taking this course, you should have the following skills:

  • Working experience of DNS, Application Control, SSL, and Web Application Firewalls
  • General comprehending of networking protocols, application layer Web protocols, and application layer security concepts

Audience Profile

This course is developed for anyone who will need to evaluate, configure, or sustain Incapsula Web Security or DDos Protection products; such as,  security experts, system administrators, database administrators, Web application developers, & other IT professionals.

Learning Objectives

  • Explore how Cloudflare supports application deployment
  • Understand domain registration and SSL certificates
  • Employ different kinds of SSL Certificates to secure web applications
  • Configure caching to speed the delivery of resources

Content Outline

  •   Explain the path data takes between clients and the web applications being protected by Incapsula.
  •   Explain the Incapsula Network.
  •   Recognize the Incapsula PoP’s elements.
  •   Explain the Incapsula WAF Onboarding Process.
  •   Recognize the steps to add a new site into Incapsula protection.
  •   List the 2 options available for SSL Support.
  •   Describe the Domain Redirection feature & its benefits.
  •   Recognize the DNS records to change to protect the organization's naked & full domain with Incapsula.
  •   Find where DNS record issues display in the Incapsula interface.
  •   Follow the procedure to develop additional users in the Incapsula web interface.
  •  Configure account level settings.
  •  Explain the functions of the status page and how to subscribe to it.
  •   Explain Incapsula Client classification process.
  •   Describe the function of the Access Control security layer about web application protection.
  •   Describe how the Bot Mitigation security layer addresses automated risks to the web application.
  •   List Incapsula WAF features & provide examples of attack types blocked.
  •   Read & analyze security events.
  •   Explain the function of the Custom Rules and Policy Engine.
  •   Configure IncapRules to address common utilization case scenarios.
  •   Manage Layer 7 DDoS Attack.
  •   Explain the flow HTTP requests take between client, Incapsula proxies and origin servers.
  •   Explain how the cache is built within a PoP.
  •   Define Static & Dynamic content and explain their differences.
  •   Recognize the four Caching Mode options & their Incapsula web caching behavior.
  •   Describe the task of purging the cache & describe a situation where it would be desirable.
  •   Find the Incapsula HTTP header that recognizes the caching status of a webpage & identify cached and non-cached pages.
  •   Debug performance problems using X-ray headers.
  •   Explain the redundancy options available when Incapsula is used without the Load Balancing feature.
  •   Describe what forms of Load Balancing are available with the Load Balancing feature.
  •   Recognize how Incapsula handles a server outage.
  •   Configure Incapsula to load balance within one single data center.
  • Configure Incapsula to load balance between 2 or more data centers.
  •   Configure Incapsula to load balance between data centers based on client geography.
  •   Configure server health checks and minimum healthy server thresholds.
  •   Explain the function of Application Delivery rules.
  •   Configure AD rules to address common use case scenarios.
  •   Describe log collection and retrieval flows.
  •   List the options available for Logs retrieval.
  •   Configure Log integration settings using the web user interface.
  •   Retrieve your logs from the cloud repository using a python connector.

FAQs

A: Imperva's Web Protection is based on a network of secure reverse proxies deployed on our globally distributed CDN. Web traffic that is routed through the Imperva network is terminated by those proxies, allowing Imperva to inspect each and every request to the website and identify and block any malicious activity.

A: Imperva protects cloud applications, websites and applications, files, SharePoint systems, databases and big data repositories from both theft and ever-evolving extortion attacks like DDoS and ransomware.

A: Imperva Cloud WAF offers the industry's leading web application security firewall, providing enterprise-class protection against the most sophisticated security threats. As a cloud-based WAF, it ensures that your website is always protected against any type of application layer hacking attempt.

A: Imperva Data Security provides continuous monitoring with separation of duties. It captures and analyzes all database activity from both application and privileged user accounts, providing detailed audit trails that show who accesses what data, when, and what was done to the data.

A: To attend the training session, you should have operational Desktops or Laptops with the required specifications, along with a good internet connection to access the labs.

A: We would always recommend you attend the live session to practice & clarify the doubts instantly and get more value from your investment. However, if, due to some contingency if you have to skip the class, Radiant Tech learning will help you with the recorded session of that particular day. However, those recorded sessions are not meant only for personal consumption and NOT for distribution or any commercial use.

A: Radiant Tech learning has a data center containing the Virtual Training environment for the purpose of participant hand-on-practice. Participants can easily access these labs over Cloud with the help of a remote desktop connection. Radiant virtual labs provide you the flexibility to learn from anywhere in the world and in any time zone.

A: The learners will be enthralled as we engage them in real-world and Oriented industry projects during the training program. These projects will improve your skills and knowledge, and you will gain a better experience. These real-time projects will help you a lot in your future tasks and assignments.

A: You can request a return if you do not desire to enroll in the course.

A: Yes you can.

A: We use the ideal standards in Internet security. Any data retained is not communicated with third parties.

A:It is recommended but not mandatory. Being acquainted with the primary course material will enable students and the trainer to move at the desired pace during classes. You can access courseware for most vendors.

A: You can buy online from the page by clicking on "Buy Now". You can view alternate payment methods on the payment options page.

A:Yes, students can pay from the course page.

A: The course completion certification will be awarded to all the professionals who have completed the training program & the project assignment given by your instructor. You can use the certificate in your future job interviews which will surely help you to acquire your dream job.

A: Radiant believes in a practical & creative approach to training & development, which distinguishes it from other training & development platforms. Moreover, training courses are undertaken by some experts with range of experience in their domain.

A: Radiant team of experts will be available at e-mail support@radianttechlearning.com to answer your technical queries even after the training program.

A: Yes, Radiant will provide you with the most updated high, value & relevant real-time projects & case studies in each training program.

A: Technical issues are unpredictable & might occur with us as well. Participants have to ensure they have access to the required configuration with good internet speed.

A: Radiant Techlearning offers training programs on weekdays, weekends & combination of weekdays & weekends. We provide you with complete liberty to choose the schedule that suits your needs.

A: Radiant has highly intensive selection criteria for Technology Trainers & Consultants, who deliver you training programs. Our trainers & consultants undergo rigorous technical and behavioral interview and assessment processes before they are on board in the company.

Our Technology experts/trainers & consultants carry deep-dive knowledge in the technical subject & are certified from the OEM.

Our training programs are practically oriented with 70% – 80% hands on the training technology tool.  Our training program focuses on one-on-one interaction with each participant, latest content in curriculum, real-time projects and case studies during the training program.

Our faculty will provide you with the knowledge of each course from the fundamental level in an easy way and you are free to ask your doubts any time from your respective faculty.

Our trainers have patience and ability to explain difficult concepts in a simplistic way with depth and width of knowledge.

To ensure quality learning, we provide a support session even after the training program.

Send a Message.


  • Enroll