Securing Apps with F5 Solutions v.13.1

Course

In London

Price on request

Description

  • Type

    Course

  • Location

    London

  • Duration

    2 Days

This Security Workshop provides participants with an opportunity to experiment with many of the different components of F5’s security solutions in a hands-on lab environment using a real-world application delivery deployment scenario. The goal of the course is to put to practical use the extensive capabilities of the BIG-IP system to safeguard application delivery in today’s growing threat landscape, and to help the audience think differently about application security.
The labs in this workshop are designed to demonstrate how you might deploy some of F5's security solutions to protect applications at different layers of the OSI reference model. The course focuses on some of the features and functionality available in several BIG-IP modules, including:


BIG-IP Local Traffic Manager (LTM)


BIG-IP Advanced Firewall Manager (AFM)


BIG-IP Application Security Manager (ASM)


BIG-IP Access Policy Manager (APM)

BIG-IP Fraud Protection Service (FPS), also known as F5 WebSafe
Workshop Topics


Using L7 local traffic policies to direct expected traffic from a public-facing virtual server to private virtual servers for additional processing


Configuring and using security event logging to monitor legitimate traffic patterns and detect aberrations


Using network firewall rules to protect perimeter resources at L3/4


Using a web application firewall to detect and protect perimeter resources from known attack signatures


Using a web application firewall on internal resources to apply a positive security model and protect from data leakage


Using iRules to help maintain identity information for clients connecting from CDN and other proxy networks


Allowing DNS resolution through the BIG-IP system and implementing protection against unauthorized query types and recursive resolution requests


Mitigating DoS attacks using device DoS protection and eviction policies


Mitigating known L3/4 attack vectors at the perimeter

Facilities

Location

Start date

London
See map
Arrow Ecs Training, 56433

Start date

On request

About this course



At the end of this lab, you will be able to use a range of F5 security solutions on the BIG-IP system and on the client to detect, mitigate, and protect from many common attacks and exploits waged against web applications.



This workshop is intended for security and network administrators who are responsible for protecting applications delivered through a BIG-IP system, and who would like a more holistic view of applying F5 solutions to achieve greater application security.

The following F5 Certifications are required:


F5 Certified BIG-IP Administrator

Working knowledge of and practical experience deploying configurations using one or more of the following BIG-IP modules is required:


BIG-IP Local Traffic Manager (LTM)


BIG-IP Application Security Manager (ASM)


BIG-IP Advanced Firewall Manager (AFM)


BIG-IP Access Policy Manager (APM)


Fraud Protection Service (FPS) – also known as WebSafe
.
This is an advanced workshop and is not designed to teach students how to configure these products in isolation

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • IP
  • Web
  • DOS
  • Firewall
  • DNS
  • Server
  • Access

Course programme

Day 1:

Lab 1: Adding Traffic Management Directional Controls
Lab 2: Adding L3/4 Firewall Protections and Traffic Inspection
Lab 3: Implementing L7 Protections for a Vulnerable Web Application
Lab 4: Protecting DNS Services
Lab 5: Defending Against L4 DoS Attacks at the Global Context
Lab 6: Defending Against L4 DoS Attacks at the Virtual Server Context
Lab 7: Defending Against L7 DoS Attacks

Day 2:

Lab 8: Detecting Client-Side Malware
Lab 9: Deploying Client-Side Application Layer Encryption
Lab 10: Detecting Client-Side Automatic Transaction
Lab 11: Implementing Access Controls
Lab 12: Implementing Multi-Domain Sign-On
Lab 13: Implementing Single Sign-On to Applications
Lab 14: Defending on Your Own Terms

Securing Apps with F5 Solutions v.13.1

Price on request