F5 Certified exams are developed to deliver consistently reproducible results that guarantee excellence in those who achieve certification. F5 Certification is a differentiator for you in your career and it’s a competitive advantage for your employer.
Module 1: Application Traffic Flow.
Module 2: Initial setup of BIG-IP
Module 3: Basic traffic processing components on F5
Module 4: HTTP header and explanation of OWASP Top 10 Security Model
Module 5: Ways to deploy initial security policy on ASM.
Module 6: Tuning of your policy
Module 7: Attack Signatures
Module 8: Approach towards building a positive security policy.
Module 9: Securing Cookies and other headers.
Module 10: Reporting and Logging Functionalities on ASM.
Module 11: Static and Dynamic Parameter Handling
Module 12: Comparing Security Policies
Module 13: ASM deployment types
Module 14: Use of Templates for policy creation.
Module 15: Process of Automatic Policy building.
Module 16: Integration of ASM with Vulnerability Scanners
Module 17: Use of Layered policies.
Module 18: Enforce login and protection of application from Brute Force
Module 19: Details of Session tracking and Web Scraping.
Module 20: Protecting your application against DOS.
About The Course
F5 is a leader in mitigating cyberthreats and building a comprehensive digital security solution. Businesses are constantly moving more operations into a virtual space. With the growing reliance on the internet for data transmission, storage, and execution of critical activities, cybersecurity and system fortification is non-negotiable. Professionals in possession of an F5 accreditation are known for their high quality skills and ability to fortify, and problem solve. In turn, this offers professionals better starting salaries, elevated job opportunities, and heightened responsibilities at organizations across the globe in comparison to their non-certified counterparts.
This course teaches you about core aspects such as;
- Provisioning of the ASM
- Resource provisioning for the ASM
- Knowing security policy deployment
- Traffic processing with BIG-IP Local Traffic Manager (LTM)
- Knowing security policy tuning
In order to sit this F5-ASM/ Advanced Web Application Firewall course, students must sit the F5 BIG-IP LTM Foundations course. This F5-ASM/WAF course teaches professionals how to deploy, tune and operate BIG-IP Application Security Manager (ASM) and Web Application Firewall to protect web applications from cyber based attacks.
The F5-ASM/ Advanced Web Application Firewall course consists of lectures, hands-on labs, and discussions around the various F5 ASM components used to detect and mitigate threats from multiple attack vendors. These include Cross-Site-Scripting (XSS), SQL injection (SQLi), web scraping, Layer 7 Denial of Service, brute force, botnets, code injection, and other zero day attacks.
- 40 Hours Training Course
- 20 Modules
- 24/7 Support
- System Administrators
- Network Administrators
- Network Operators
- Configuration Specialists
- Maintenance Specialists
- Application Security Managers
- Deployment Specialists
- SecOps Professionals
- Software Developers
- Aspiring IT Administrators
- Professionals looking to understand everything about F5 ASM/WAF architecture