Key Info
Configuring BIG-IP Advanced WAF: Web Application Firewall
Self-Directed Training (SDT), Instructor-Led Training (ILT)
ILT - 4 Days
SDT - 33 Hours
ILT - English, German
SDT - English
ILT - $4840 USD/88 TUs
SDT - $825 USD/15 TUs
SDT details
Deploying F5 Advanced WAF is a curriculum bundle intended for Application Security Administrators responsible for the deployment of F5 Advanced Web Application Firewall to secure web applications from common vulnerabilities and denial of service. Course topics cover the identification and mitigation of web application vulnerabilities on both the client and application sides of the threat spectrum. Subject areas include Advanced WAF fundamentals, mitigating vulnerabilities, defending against Bots and other automated attacks, and additional deployments. Skills are imparted through a combination of video presentations and lab demonstrations, with accompanying job aids that provide configuration examples.
__Audience__
This course is intended for SecOps personnel responsible for the deployment, tuning, and day-to-day maintenance of F5 Adv. WAF. Participants will obtain a functional level of expertise with F5 Advanced WAF, including comprehensive security policy and profile configuration, client assessment, and appropriate mitigation types.
Advanced WAF: Fundamentals
Understanding Web Application Communication Elements
Understanding HTTP Request Headers and their Vulnerabilities
Understanding HTTP Response Headers and their Vulnerabilities
Understanding HTTP Response Status Codes
Differentiating HTTP from HTTS
Understanding Web Application Flow with F5 Advanced WAF
Understanding Today's Threat Landscape
Discover Web Application Vulnerabilities
Understanding Deployment Workflow and Configuration
Viewing and Interpreting Application Security Event Logs
Exploring the Rapid Deployment Policy Template
Using the Guided Configuration to Deploy an Application Security Policy
Managing an Application Security Policy After Deployment
Trigger and Review a Violation
Accept Requests and View Learning Suggestions
Handle Learning Suggestions
Manage Policy Enforcement Mode and Staging
Mitigating Vulnerabilities, Attacks, and Threats
Deploying and Managing F5-Supplied Attack Signatures
Creating User-Defined Attack Signatures
Deploying and Updating Threat Campaigns
Reporting and Logging Features
Understanding F5 Advanced WAF Administrative Logs
Managing Security Event Logging with Logging Profiles
Configuring a Remote Logging Profile for Application Security Events
Configuring Response Logging
Achieving PCI Compliance
Generate the PCI Compliance Report
Using the Login Enforcement Feature to Control Application Flow
Detecting and Mitigating Brute Force Attacks
Detecting and Mitigating Credential Stuffing Attacks
Using the Session Tracking Feature to Detect and Deter Bad Actors
Login Enforcement for Flow Control
Mitigating Brute Force Attacks
Mitigating Credential Stuffing
Reconnaissance with Session Tracking
Deploy Session Awareness and Log All Requests
Protecting Application Delivery on the Client with DataSafe
Securing a Login Page on the Client Using DataSafe
Protecting Against Sensitive Data Leakage with the Data Guard Feature
Protect against credit card number leakage using Data Guard
Defending against Bots and other Automated Attacks
Understanding L7 DoS Attacks Protections
Deploying TPS-Based DoS Protection
Deploying Stress-Based Protection
Deploying Behavioral DoS Protection
Deploying BaDoS Mitigation
Deploying TPS-based DoS Mitigation
Classifying Clients with the Bot Defense Profile
Configuring and Deploying a Bot Defense Profile
Protecting Against OWASP Automated Threats with Bot Defense Profile Microservices
Mitigate a Web Scraping Attack
Provide Login Protection
Provide Signup Protection
Deploy the Search Protection Microservice
Deploy the Shopping Cart Protection Microservice
Deploy the Checkout Protection Microservice
Deploy the Automated Form Submission Microservice
Deploy the Intellectual Property Harvesting Microservice
Deploy Custom Microservice Protection
Additional Deployment Options
Understanding Entities (URLs, File Types, Parameters, Cookies, and Redirection Domains)
Managing Entities through Policy Building and Traffic Learning
Learning with Never, Selective, and Always
Experiment with Learning and Enforcement
Learn Using the Compact Scheme
Securing Advanced WAF System Cookies
Protect Against Cookie Tampering
Secure HTTP Headers
Modify ASM Cookie Names
Secure Application Domain Cookies with Secure and HTTP-Only Attributes
Secure BIG-IP ASM Cookies with Secure and HTTP-Only Attributes
Protecting Web Application Parameters
Protect Static and Dynamic Parameters
Using Automatic Policy Building
Deploying an Application Security Policy Automatically
Creating and Deploying Layered Policies
Using iRules with an Application Security Policy
Deploy an iRule to Handle a Custom Violation
Log Violation Data and Send a Custom Response Page from an iRule
Implementing Geolocation Enforcement and IP Address Exceptions
Secure a Modern Single Page Application
Qualys Scan Integration
Manage Traffic with Layer 7 Local Traffic Policies
ILT details
Learn to deploy and operate F5 Advanced WAF to protect web applications from the most critical security risks as described in the OWASP Top 10 list, from bots and other automated agents, and from Denial of Service (DoS) attacks operating at the HTTP layer of the web application delivery ecosystem. Through a combination of lecture, hands-on labs, and discussion, secure applications from the majority of common attacks by the end of the first day. Take technical deep dives into mitigating web scraping, account aggregation, account creation, ad fraud, CAPTCHA defeat, card cracking, carding, cashing out, credential stuffing, and other unwanted automated application abuse as described in the OWASP automated threats list.
Observe various vulnerability mitigations in real time by playing the role of an attacker in lab exercises. Gain context for securing applications, including analysis of HTTP and the elements of both modern and traditional web applications such as file types, parameters, URLs, and login pages. Learn to recognize client and server-side technologies such as JSON and AJAX, and learn to address vulnerabilities that might be present in common application development tools such as PHP, AngularJS, and others.
Review recommended practices for reporting, security event logging, and integration with third-party web application vulnerability scanners in detail. Follow prescribed step-by-step directions for activities initially, and gradually gain proficiency so that, by the end of class, little or no instruction is needed to complete simple to more complex configurations.
This course is intended for SecOps personnel responsible for the deployment, tuning, and day-to-day maintenance of F5 Adv. WAF. Participants will obtain a functional level of expertise with F5 Advanced WAF, including comprehensive security policy and profile configuration, client assessment, and appropriate mitigation types. Experience with LTM and prior WAF knowledge are not required.
Prior Knowledge
The following free Self-Directed Training (SDT) courses, although optional, are helpful for any student with limited BIG-IP administration and configuration experience:
Getting Started with BIG-IP
Getting Started with Local Traffic Manager (LTM)
Getting Started with F5 Advanced WAF
General network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course, including OSI model encapsulation, routing and switching, Ethernet and ARP, TCP/IP concepts, IP addressing and subnetting, NAT and private IP addressing, NAT and private IP addressing, default gateway, network firewalls, and LAN vs. WAN.
Register for your course
To view and/or purchase the SDT Course click here:
View SDT
Please find below the current active sessions for the ILT. If there are no sessions listed below and you would like to register your interest in attending the ILT version of this course please email:
support@mail.education.f5.com
Configuring BIG-IP Advanced WAF: Web Application Firewall - UK Virtual (Nov 10, 2025):
View ILT
Configuring BIG-IP Advanced WAF: Web Application Firewall - US Virtual (Nov 18, 2025):
View ILT
Configuring BIG-IP Advanced WAF: Web Application Firewall - US Virtual (Dec 9, 2025):
View ILT
Configuring BIG-IP Advanced WAF: Web Application Firewall - German-Language Classroom/virtual (Oct 7, 2025):
View ILT
Configuring BIG-IP Advanced WAF: Web Application Firewall - UK Virtual (Dec 16, 2025):
View ILT
Configuring BIG-IP Advanced WAF: Web Application Firewall - German-Language Classroom (Dec 16, 2025):
View ILT