F5 Configuring Advanced WAF V16.1
In this 4-day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks. The course includes lecture, hands-on labs, and discussion about different F5 Advanced Web Application Firewall tools for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits.
Register your interest in this course here
Register your interest now
-
27May4 days, Mon, Tue, Wed & Thu 9:00 AM - 5:00 PMVirtual - AUS
Sessions
Session 1
Mon 27 May 09:00 - Mon 27 May 17:00Virtual - AUSSession 2
Tue 28 May 09:00 - Tue 28 May 17:00Virtual - AUSSession 3
Wed 29 May 09:00 - Wed 29 May 17:00Virtual - AUSSession 4
Thu 30 May 09:00 - Thu 30 May 17:00Virtual - AUS- $4,995.00 excl. GST
-
17Jun4 days, Mon, Tue, Wed & Thu 9:00 AM - 5:00 PMVirtual - AUS
Sessions
Session 1
Mon 17 Jun 09:00 - Mon 17 Jun 17:00Virtual - AUSSession 2
Tue 18 Jun 09:00 - Tue 18 Jun 17:00Virtual - AUSSession 3
Wed 19 Jun 09:00 - Wed 19 Jun 17:00Virtual - AUSSession 4
Thu 20 Jun 09:00 - Thu 20 Jun 17:00Virtual - AUS- $4,995.00 excl. GST
-
22Jul4 days, Mon, Tue, Wed & Thu 9:00 AM - 5:00 PMVirtual - AUS
Sessions
Session 1
Mon 22 Jul 09:00 - Mon 22 Jul 17:00Virtual - AUSSession 2
Tue 23 Jul 09:00 - Tue 23 Jul 17:00Virtual - AUSSession 3
Wed 24 Jul 09:00 - Wed 24 Jul 17:00Virtual - AUSSession 4
Thu 25 Jul 09:00 - Thu 25 Jul 17:00Virtual - AUS- $4,995.00 excl. GST
Description
Course Topics
- Setting up the BIG-IP System
- Traffic processing with BIG-IP
- Overview of Web Application Processing
- Overview of Web Application Vulnerabilities
- Security policy deployment
- Policy Tuning and Violations
- Attack Signatures and Threat Campaigns
- Positive security policy building
- Securing cookies and other headers
- Understanding Logging and Reporting
- Lab project 1
- Advanced Parameter Handling
- Automatic Policy Building
- Web application vulnerability scanners integration
- Deploying Layered Policies
- Login Enforcement and Brute Force Mitigation
- Session tracking for client reconnaissance
- Layer 7 DoS Mitigation
- Advanced Bot Defense
- Review and Final labs