“F5 Application Security Manager” training, students are provided with a functional understanding of how to deploy, tune, and operate ASM to protect their web applications from HTTP-based attacks. The course includes lecture, hands-on labs, and discussion about different ASM components for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits
There are no required F5 prerequisites for this course.
However, completing one of the following before attending would be very helpful for students unfamiliar with BIG-IP:
The following web-based courses, although optional, will be very helpful for any student with limited BIG-IP administration and configuration experience:
Students should understand:
The BIG-IP Application Security Manager course provides participants with the expertise needed to detect, mitigate, and prevent HTTP-based attacks on web applications. The four-day lab intensive course starts at the simplest level for quickly configuring and implementing an application security policy and progresses through more complex configurations. The course includes detailed analysis and hands-on exercises for protecting web applications from brute force, web scraping, layer 7 DDoS, and other current attack vectors.
Topics covered in this course include:
• Describe the role of the BIG-IP system as a full proxy device in an application delivery network
• Provision the Application Security Manager
• Define a web application firewall
• Describe how ASM protects a web application by securing file types, URLs, and parameters
• Deploy ASM using the Rapid Deployment template (and other templates) and define the security checks included in each
• Define learn, alarm, and block settings as they pertain to configuring ASM
• Define attack signatures and explain why attack signature staging is important
• Contrast positive and negative security policy implementation and explain benefits of each
• Configure security processing at the parameter level of a web application
• Use an application template to protect a commercial web application
• Deploy ASM using the Automatic Policy Builder
• Tune a policy manually or allow automatic policy building
• Integrate third party application vulnerability scanner output into a security policy
• Configure login enforcement and session tracking
• Configure protection against brute force, web scraping, and Layer 7 denial of service attacks
• Implement iRules using specific ASM events and commands
• Use Content Profiles to protect JSON and AJAX-based applications
• Implement Bot Signatures
• Implement Proactive Bot Defense
Chapter 1: Setting Up the BIG-IP System
Chapter 2: Traffic Processing with BIG-IP
Chapter 3: Web Application Concepts
Chapter 4: Web Application Vulnerabilities
Chapter 5: Security Policy Deployment
Chapter 6: Attack Signatures
Chapter 7: Positive Security Policy Building
Chapter 8: Cookies and other Headers
Chapter 9: Reporting and Logging
Chapter 10: User Roles, policy modification, and other deployments
Chapter 11: Lab Project 1
Chapter 12: Advanced parameter handling
Chapter 13: Application-Ready Templates
Chapter 14: Real Traffic Policy Builder
Chapter 15: Web Application Vulnerability Scanners
Chapter 16: Login Enforcement, Session tracking, and Flows
Chapter 17: Anomaly Detection
Chapter 18: ASM and iRules
Chapter 19: Web 2.0 Support: AJAX and JSON
Chapter 20: XML and Web Services
Chapter 21: Review and Final Labs
This course is intended for security and network administrators who will be responsible
for the installation, deployment, tuning, and day-to-day maintenance of the Application
Security Manager.