Course Content

  • Describe the role of the BIG-IP system as a full proxy device in an application delivery network

  • Provision of the Application Security Manager

  • Define a web application firewall

  • Describe how ASM protects a web application by securing file types, URLs, and parameters

  • Deploy ASM using the Rapid Deployment template (and other templates) and define the security checks included in each

  • Define learn, alarm, and block settings as they pertain to configuring ASM

  • Define attack signatures and explain why attack signature staging is important

  • Contrast positive and negative security policy implementation and explain the benefits of each

  • Configure security processing at the parameter level of a web application

  • Use an application template to protect a commercial web application

  • Deploy ASM using the Automatic Policy Builder

  • Tune a policy manually or allow automatic policy building

  • Integrate third-party application vulnerability scanner output into a security policy

  • Configure login enforcement and session tracking

  • Configure protection against brute force, web scraping, and Layer 7 Denial of service attacks

  • Implement iRules using specific ASM events and commands

  • Use Content Profiles to protect JSON and AJAX-based applications

  • Implement Bot Signatures

  • Implement Proactive Bot Defense

Course 

  • Provisioning ASM

  • Traffic processing with BIG-IP Local Traffic Manager (LTM)

  • Web application concepts

  • Web application vulnerabilities

  • Security policy deployment

  • Security policy tuning

  • Attack signatures

  • Positive security building

  • Securing cookies and other headers

  • Reporting and logging

  • Policy Diff, merging, and exporting

  • Advanced parameter handling

  • Using application templates

  • Using Automatic Policy Builder

  • Integrating with web vulnerability scanners

  • Login enforcement

  • Brute force mitigation

  • Session tracking

  • Web scraping detection and mitigation

  • Geolocation Enforcement and IP Address Exceptions

  • Using Parent and Child policies

  • Layer 7 DoS protection

  • ASM and iRules

  • Using Content Profiles for AJAX and JSON applications

  • Advanced Bot Detection and Defense

  • Proactive Bot Defense

  • Simple Edit Mode for Attack Signatures

Nothing to book right now. Check back soon

Contact Us!

11900 Research Road #4307, Frisco, TX 75033, USA

UG 02, Ivory Tower, SG Imressions 58, Rajnagar Extension, Ghazibad,Uttar Pradesh, India, 201017

 



 

© 2020 by NexGenTech, All rights reserved.