Live Webinar - ITIL 4 Overview - What’s New from ITIL v3 to ITIL 4

closeClose

F5 Networks Configuring BIG-IP ASM: Application Security Manager v13

Course Details
Code: 9764
Tuition (USD): $4,000.00 • Virtual (4 days)
$4,000.00 • Classroom (4 days)
Course Details
GSA (USD): $3,421.41 • Virtual (4 days)
$3,421.41 • Classroom (4 days)

In this course, you will learn how to deploy, tune, and operate BIG-IP Application Security Manager (ASM) to protect your web applications from HTTP-based attacks.

The course includes lecture, hands-on labs, and discussion about different ASM components for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day.

 

Skills Gained

  • Setting up the BIG-IP system
  • Traffic processing with BIG-IP Local Traffic Manager (LTM)
  • Web application concepts
  • Web application vulnerabilities
  • Security policy deployment
  • Security policy tuning
  • Attack signatures
  • Positive security building
  • Securing cookies and other headers
  • Reporting and logging
  • User roles
  • Policy modification, merging, and exporting
  • Advanced parameter handling
  • Using application templates
  • Using Automatic Policy Builder
  • Integrating with web vulnerability scanners
  • Login enforcement and session tracking
  • Web scraping detection and mitigation
  • Using Parent and Child policies
  • Layer 7 DoS protection
  • ASM and iRules
  • Using Content Profiles for AJAX and JSON applications

Who Can Benefit

Security and network administrators who are responsible for the installation, deployment, tuning, and day-to-day maintenance of the Application Security Manager.

Course Details

Lab 1: Installation and Setup

  • Install and Setup
  • Licensing System
  • Set Up Utility
  • Configuration Utility
  • Configuration Backup

Lab 2: Fiddler

Lab 3: HTTP Vulnerabilities

Lab 4: ASM Applications Configuration

Lab 5: Security Policy

  • Attack Signatures

Lab 6: Rapid Deployment

  • Data Guard
  • Attack Signatures

Lab 7: Application-Ready Security Policy

Lab 8: Reporting

  • Remote System Log Server

Lab 9: Partitions and User Roles

Lab 10: Human Readable Policy

Lab 11: Traffic Learning

Lab 12: Parameters

Lab 13: Security Policy Builder

Lab 14: iRules

  • Flow Login Pages
  • Web Scraping

Lab 15: XML and Web Services

Lab 16: Protocol Security Manager FTP

2013-05-17 14:01:33.803000000

17. Configuration Lab Project 2

  • Review Questions

Lab 1: Installation and Setup

  • Install and Setup
  • Licensing System
  • Set Up Utility
  • Configuration Utility
  • Configuration Backup

Lab 2: Fiddler

Lab 3: HTTP Vulnerabilities

Lab 4: ASM Applications Configuration

Lab 5: Security Policy

  • Attack Signatures

Lab 6: Rapid Deployment

  • Data Guard
  • Attack Signatures

Lab 7: Application-Ready Security Policy

Lab 8: Reporting

  • Remote System Log Server

Lab 9: Partitions and User Roles

Lab 10: Human Readable Policy

Lab 11: Traffic Learning

Lab 12: Parameters

Lab 13: Security Policy Builder

Lab 14: iRules

  • Flow Login Pages
  • Web Scraping

Lab 15: XML and Web Services

Lab 16: Protocol Security Manager FTP