0% found this document useful (0 votes)
290 views

F5 ASM Training

The F5 ASM Training course provides participants with hands-on experience deploying, tuning, and operating the BIG-IP Application Security Manager to protect web applications from HTTP-based attacks like web scraping, denial of service, and code injection. The training covers topics such as provisioning and configuring ASM policies, implementing signatures and settings to detect attacks, integrating vulnerability scanners, and mitigating brute force, scraping, and denial of service attacks.

Uploaded by

vidit mehta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
290 views

F5 ASM Training

The F5 ASM Training course provides participants with hands-on experience deploying, tuning, and operating the BIG-IP Application Security Manager to protect web applications from HTTP-based attacks like web scraping, denial of service, and code injection. The training covers topics such as provisioning and configuring ASM policies, implementing signatures and settings to detect attacks, integrating vulnerability scanners, and mitigating brute force, scraping, and denial of service attacks.

Uploaded by

vidit mehta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

F5 ASM Training

The BIG-IP Application Security Manager course gives participants a functional


understanding of how to deploy, tune, and operate BIG-IP Application Security
Manager (ASM) to protect their web applications from HTTP-based attacks.

The course includes lecture, hands-on labs, and discussion about different ASM
components for detecting and mitigating threats from multiple attack vectors such
web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero
day exploits.

Course Objectives

 Describe the role of the BIG-IP system as a full proxy device in an application
delivery network

 Provision the Application Security Manager

 Define a web application firewall

 Describe how ASM protects a web application by securing file types, URLs,
and parameters

 Deploy ASM using the Rapid Deployment template (and other templates) and
define the security checks included in each

 Define learn, alarm, and block settings as they pertain to configuring ASM

 Define attack signatures and explain why attack signature staging is important

 Contrast positive and negative security policy implementation and explain


benefits of each

 Configure security processing at the parameter level of a web application

 Use an application template to protect a commercial web application

 Deploy ASM using the Automatic Policy Builder

 Tune a policy manually or allow automatic policy building

 Integrate third party application vulnerability scanner output into a security


policy
 Configure login enforcement and session tracking

 Configure protection against brute force, web scraping, and Layer 7 denial of
service attacks

 Implement iRules using specific ASM events and commands

 Use Content Profiles to protect JSON and AJAX-based applications

 Implement Bot Signatures

 Implement Proactive Bot Defense

Course Topics

 Provisioning ASM

 Traffic processing with BIG-IP Local Traffic Manager (LTM)

 Web application concepts

 Web application vulnerabilities

 Security policy deployment

 Security policy tuning

 Attack signatures

 Positive security building

 Securing cookies and other headers

 Reporting and logging

 Policy Diff, merging, and exporting

 Advanced parameter handling

 Using application templates

 Using Automatic Policy Builder

 Integrating with web vulnerability scanners

 Login enforcement
 Brute force mitigation

 Session tracking

 Web scraping detection and mitigation

 Geolocation Enforcement and IP Address Exceptions

 Using Parent and Child policies

 Layer 7 DoS protection

 ASM and iRules

 Using Content Profiles for AJAX and JSON applications

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy