F5 Distributed Cloud Services Bundle

This page provides information on how to purchase training for this course. It includes a description of the course, suggested prework, any required prerequisites, and links to purchase based on modality.

Key Info


COURSE ID:

F5-TRG-F5XC-BNDL


PRODUCT FAMILY:

Distributed Cloud


TITLE:

F5 Distributed Cloud Services Bundle


COURSE LEVEL:

Advanced


MODALITY:

Instructor-Led Training (ILT)


LENGTH (DAYS/HOUR):

5 Days


LANGUAGES:

English


PRICE ($$/TU):

$4840/88 TUs


CONTAINS HANDS-ON LABS?:

Yes


SDT details

ILT details

Administering Applications in F5 Distributed Cloud Services
Chapter 1: Introduction
  • Resources
  • Benefits of F5XC
  • How F5XC works
  • Primary F5XC Deployment Types
  • Chapter 2: (labs) Intro to Training Environment and F5XC Console
  • Accessing Training Environment
  • Intro to Console
  • Creating Namespace
  • Building Site Infrastructure
  • Configuring Cloud Credentials
  • Creating Cloud Site
  • Chapter 3: Site and Infrastructure Management
  • Tenants and Namespaces
  • Labels and Key Pairs
  • Virtual Sites
  • Load Balancing and Origin Pools
  • Architecture of Infrastructure Objects
  • Examples of Objects used in Production
  • Chapter 4: (labs) Using F5XC Objects to prepare AWS Application
  • Creating and Sending Alerts
  • Viewing Site Status
  • Creating Origin Pool for TCP Load Balancer
  • Creating Delegated DNS Domain
  • Creating TCP Load Balancer
  • Chapter 5: How F5XC Uses Kubernetes
  • Kubernetes (K8s) Overview
  • The Need for Kubernetes
  • Containers, Pods, Nodes, Services, Clusters
  • Virtual K8s
  • Chapter 6: (labs) Creating vK8s and Alerts on F5XC Gateway
  • Use F5 Simulator to Deliver Modern App at the Edge
  • Creating vK8s on F5XC Gateway
  • Exploring Basic Kubernetes Commands
  • Chapter 7: Introduction to Distributed Cloud Mesh
  • Services vs Service Mesh
  • Components of Service Mesh
  • Service Mesh and Sidecar Proxies
  • F5XC Cloud Mesh
  • Mesh vs App Stack
  • App Stack and Mesh Working Together
  • Chapter 8: (labs) Expose, Access, Protect, Reroute, and Troubleshoot AWS site
  • Creating Origin Pool and Health Check for HTTP(s) Load Balancer
  • Creating HTTP Load Balancer and View Application
  • Activating WAF
  • Creating Routing Configuration
  • Deploying Virtual K8s Workload for Application
  • Automation with Terraform
  • Viewing Data in Dashboards
  • Challenge Lab: Deploy and Troubleshoot Replica site
  • Challenge Lab: Access AWS Instance via SSH
  • Course Review
    Securing Applications and APIs with F5 Distributed Cloud Services Introduction and Agenda
  • Lesson Objectives
  • Lesson Topics
  • Overview of how F5XC WAAP protects web apps in any cloud, edge, or on-premises environment
  • Defining core features and use cases
  • Module 1: Introduction to Distributed Cloud WAAP and WAF Deployment
  • Exploring the security flow through application proxy
  • Lab: Deploy Juice Shop (target application) on an HTTP load balancer and configure API endpoint discover.
  • Create load balancer and connect origin pool to expose Juice Shop application
  • Enable API discovery (so that we can discuss API protection and have ready examples)
  • Run some traffic and review request log
  • Module 2: Overview of Web Application Processing
  • Overview of web application communication elements
  • Overview of HTTP message structure (headers and methods)
  • Parsing HTTP requests
  • Lab: Exploring the target application
  • Module 3: Overview of Web Application Vulnerabilities
  • A taxonomy of attacks: the threat landscape
  • Common exploits against web applications (OWASP Top 10, OWASP API)
  • Lab: Exploiting web application vulnerabilities
  • SQL injection
  • Cross-site scripting
  • Bypass security using a poison null byte
  • Forceful browsing
  • Module 4: Mitigating Threats with Web Application Firewall Policies
  • Defining web application firewall processing at layer 7
  • Applying different protections to a load balancer
  • Defining violations and false positives
  • Reviewing RFC 2616 as it drives protocol compliance
  • Differentiating positive and negative security
  • Differentiating blocking and monitoring actions
  • Reviewing security event logging
  • Defining Threat Campaigns
  • Defining Attack Signatures
  • Lab: Create App Firewall, enable blocking mode, attach to load balancer
  • Lab: Launch XSS attack and observe security processing in the log
  • Lab: Launch SQL injection attack and observe security processing in the log
  • Lab: Launch poison null byte attack and observe security processing in the log
  • Module 5: Manage Security Events with Exclusion Rules
  • Defining exclusion rules
  • Analyzing elements and contexts of exclusion rules
  • Lab: Create an Exclusion Rule for Two Attack Signature IDs
  • Module 6: Mitigating Threats with Service Policies
  • Differentiating protections at namespace vs. load balancer levels
  • Exploring service policy rules, policies, and policy sets
  • Handling traffic flow
  • Enforcing layer 7 elements of HTTP processing
  • Lab: Practicing service policy protections for geolocation enforcement, file types enforcement, method and path enforcement, and IP address enforcement
  • Module 7: Deploying Bot Defense
  • Classifying and categorizing bots (good/suspicious/malicious)
  • Reviewing bot signatures
  • Configuring bot defense on the XC load balancer
  • Lab: Mitigating an attack from an automated agent (python scripts for bad traffic and credential stuffing/brute force)
  • Module 8: Mitigate Threats using Machine Learning and Artificial Intelligence
  • Defining Malicious User Detection
  • TLS fingerprinting
  • JavaScript challenges/client side defense
  • Lab: Deploying Machine Learning
  • Module 9: Protecting Public APIs
  • Defining an API
  • Defining API specifications
  • Defining a RESTful API
  • Recognizing API endpoints
  • Defining Shadow APIs
  • Defining OpenAPI 3.0 and the Swagger specification
  • Analyzing API routing in F5XC
  • Analyzing API protection in F5XC
  • App firewall (OWASP vulnerabilities)
  • CAPTCHA/JS challenges
  • Network firewall
  • API usage characterizations
  • User anomaly detection
  • API rate limiting (threshold configuration)
  • API Learning
  • Endpoint learning
  • Schema learning
  • Behavioral firewall/business logic markup
  • Lab: Machine Learning Lab
  • Review discovered APIs
  • Configure malicious users mitigation
  • Configure user identification
  • Configure load balancer
  • Test XSS (without WAF policy)
  • Module 10: API Automation using Postman
  • Introduction to Postman
  • Defining environments
  • Defining collections
  • Reviewing variables
  • Lab: Use a postman collection to create a WAF policy for a namespace
  • Lab: Use a postman collection to create service policies for a shared namespace
  • Prior Knowledge

    There are no prerequisites before attending this course, but the following knowledge is helpful:
  • Experience with any cloud provider
  • Basic networking skills including a basic understanding of routing, firewalls (application and network layer), proxies and load balancers
  • Basic understanding of Kubernetes, pods, and containerization concepts

  • Register for your course




    Please find below the current active sessions for the ILT. If there are no sessions listed below and you would like to register your interest in attending the ILT version of this course please email: support@mail.education.f5.com

    F5 Distributed Cloud Services Bundle - SGP Virtual (Oct 6, 2025): View ILT

    F5 Distributed Cloud Services Bundle - UK Virtual (Aug 11, 2025): View ILT

    F5 Distributed Cloud Services Bundle - UK Virtual (Sep 29, 2025): View ILT

    F5 Distributed Cloud Services Bundle - US Virtual (Sep 22, 2025): View ILT

    F5 Distributed Cloud Services Bundle - US Virtual (Sep 8, 2025): View ILT

    F5 Distributed Cloud Services Bundle - US Virtual (Aug 18, 2025): View ILT

    Continued Learning