F5 Configuring Advanced WAF V16.1
In this 4-day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks. The course includes lecture, hands-on labs, and discussion about different F5 Advanced Web Application Firewall tools for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits.
Register your interest in this course here
Register your interest now
-
22Jan4 days, Mon, Tue, Wed & Thu 9:00 AM - 5:00 PMVirtual - AUS
Sessions
Session 1
Mon 22 Jan 09:00 - Mon 22 Jan 17:00Virtual - AUSSession 2
Tue 23 Jan 09:00 - Tue 23 Jan 17:00Virtual - AUSSession 3
Wed 24 Jan 09:00 - Wed 24 Jan 17:00Virtual - AUSSession 4
Thu 25 Jan 09:00 - Thu 25 Jan 17:00Virtual - AUS- $4,995.00 excl. GST
-
19Feb4 days, Mon, Tue, Wed & Thu 9:00 AM - 5:00 PMVirtual - AUS
Sessions
Session 1
Mon 19 Feb 09:00 - Mon 19 Feb 17:00Virtual - AUSSession 2
Tue 20 Feb 09:00 - Tue 20 Feb 17:00Virtual - AUSSession 3
Wed 21 Feb 09:00 - Wed 21 Feb 17:00Virtual - AUSSession 4
Thu 22 Feb 09:00 - Thu 22 Feb 17:00Virtual - AUS- $4,995.00 excl. GST
-
18Mar4 days, Mon, Tue, Wed & Thu 9:00 AM - 5:00 PMVirtual - AUS
Sessions
Session 1
Mon 18 Mar 09:00 - Mon 18 Mar 17:00Virtual - AUSSession 2
Tue 19 Mar 09:00 - Tue 19 Mar 17:00Virtual - AUSSession 3
Wed 20 Mar 09:00 - Wed 20 Mar 17:00Virtual - AUSSession 4
Thu 21 Mar 09:00 - Thu 21 Mar 17:00Virtual - AUS- $4,995.00 excl. GST
Description
Course Topics
- Setting up the BIG-IP System
- Traffic processing with BIG-IP
- Overview of Web Application Processing
- Overview of Web Application Vulnerabilities
- Security policy deployment
- Policy Tuning and Violations
- Attack Signatures and Threat Campaigns
- Positive security policy building
- Securing cookies and other headers
- Understanding Logging and Reporting
- Lab project 1
- Advanced Parameter Handling
- Automatic Policy Building
- Web application vulnerability scanners integration
- Deploying Layered Policies
- Login Enforcement and Brute Force Mitigation
- Session tracking for client reconnaissance
- Layer 7 DoS Mitigation
- Advanced Bot Defense
- Review and Final labs