Course

Configuring BIG-IP Advanced WAF: Web Application Firewall

Course details


Cost Training Units Course number Points Time Modules
$825.00 15 F5-TRG-BIG-AWF-CFG-SDT 0 33 hours 22 minutes 136

Total Progress

0%

Course description

Configuring BIG-IP Advanced WAF: Web Application Firewall is a course intended for Application Security Administrators responsible for the deployment of BIG-IP Advanced Web Application Firewall to secure web applications from common vulnerabilities and denial of service. Course topics cover the identification and mitigation of web application vulnerabilities on both the client and application sides of the threat spectrum. Subject areas include Advanced WAF fundamentals, mitigating vulnerabilities, defending against Bots and other automated attacks, and additional deployments. Skills are imparted through a combination of video presentations and lab demonstrations, with accompanying job aids that provide configuration examples.

Course Objectives: By the end of this course, you will be able to:

  • Describe the role of the BIG-IP system as a full proxy device in an application delivery network
  • Provision the BIG-IP Advanced Web Application Firewall
  • Define a Web Application Firewall
  • Describe how BIG-IP Advanced Web Application Firewall protects a web application by securing file types, URLs, and parameters
  • Deploy BIG-IP Advanced Web Application Firewall using the Rapid Deployment template (and other templates) and define the security checks included in each
  • Define learn, alarm, and block settings as they pertain to configuring BIG-IP Advanced Web Application Firewall
  • Define attack signatures and explain why attack signature staging is important Course Objectives, continued
  • Deploy Threat Campaigns to secure against CVE threats
  • Contrast positive and negative security policy implementation and explain benefits of each
  • Configure security processing at the parameter level of a web application
  • Deploy BIG-IP Advanced Web Application Firewall using the Automatic Policy Builder
  • Tune a policy manually or allow automatic policy building
  • Integrate third party application vulnerability scanner output into a security policy
  • Configure login enforcement for flow control
  • Mitigate credential stuffing
  • Configure protection against brute force attacks
  • Deploy Advanced Bot Defense against web scrapers, all known bots, and other automated agents

Course access

Please login to access course materials.