Setting up F5 Advanced WAF

F5 Certified exams are developed to deliver consistently reproducible results that guarantee excellence in those who achieve certification. F5 Certification is a differentiator for you in your career and it’s a competitive advantage for your employer.

8 hours 0 Enrolled No ratings yet Intermediate

About The Course

Enrol for 1-day Setting up F5 Advanced WAF course from Upskill Finder. In this course you will learn identify and mitigate common web application vulnerabilities on the client and application sides of the threat spectrum. Participants use F5 Advanced WAF to quickly configure advanced protection against common Layer 7 vulnerabilities (OWASP Top Ten) and bot defense. This course is intended for users who wish to rapidly deploy a basic web application security policy with minimal configuration.

Course Objectives

This course teaches you about core aspects such as;

  • Provision the Application Security Manager and Fraud Protection Service modules
  • Define a web application firewall
  • Deploy F5 Advanced WAF using the Guided Configuration for Application Security
  • Define learn, alarm, and block settings as they pertain to configuring F5 Advanced WAF
  • Define attack signatures and explain why attack signature staging is important
  • Contrast positive and negative security policy implementation and explain benefits of each
  • Tune a policy manually by reviewing learning suggestions
  • Deploy a Threat Campaign


There are no F5-technology-specific prerequisites for this course. However, completing the following before attending would be very helpful for students with limited BIG-IP administration and configuration experience:

Administering BIG-IP instructor-led course

Show More
Free acess this course

What's included

  • 8 Hours Training Course
  • Certificate
  • 8 Modules
  • 24/7 Support


  • This course is intended for security and network administrators who will be responsible for the deployment of F5 Advanced Web Application Firewall to secure web applications from common vulnerabilities and denial of service.


4.8Instructor Rating
View Details