F5 WAF and BIG-IP LTM Advanced Training Course ( f5waf | 35 hours )

Prerequisites:
  • Basic understanding of computers and networking

Audience

  • Network engineers, IT Specialists, Security Engineers, and Computer science graduates
Overview:

F5 Advanced training makes you confident to design, deploy, manage, and troubleshoot any issues in F5 infrastructure on your own.

This instructor-led, live training (online) is aimed to provide In-depth knowledge about F5 Administering BIG-IP LTM  and F5 WAF (Web Application Firewall) with the help of step-by-step LAB sessions.

  • In-depth knowledge about F5 WAF (Web Application Firewall) with the help of step-by-step LAB sessions.
  • Strong and extensive knowledge to build a strong security policy to protect the web applications that are behind F5 WAF
  • Extensive knowledge about OWASP's Top 10 Web Application Attacks and Vulnerabilities
  • In-depth knowledge about BIG-IP F5 LTM (Local Traffic Manager) with the help of step-by-step LAB sessions.
  • You will learn about all the Load Balancing Methods and Monitors in detail.
  • Detailed understanding of the features and functions of BIG-IP F5 in-depth.
  • You will understand all the complex topics of LTM very Easily with the help of step-by-step LAB.
  • Detailed understanding of the Proxy setup, its traffic flow, and its functions and advantages.
  • Understanding the various methods to secure the Application Server running behind the BIG-IP LTM in the F5 Infrastructure

By the end of this training, participants will be able to:

  • Configure a strong security policy to mitigate web application attacks
  • Configure and Manage F5 WAF
  • To design, Deploy, Administrate, and Troubleshoot the F5 LTM (Local Traffic Manager) infrastructure
  • Troubleshoot any issues in both the StandAlone and High Availablity Cluster environment of F5 LTM
  • Configure Nodes, Pools, Load Balancing methods, Profile, NAT, SNAT, Automap, Profiles, Persistence, SSL, iRule, High Availablity, etc.

Format of the Course

  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.

Course Customization Options

  • To request customized training for this course, please contact us to arrange.
Course Outline:
  • Setting Up the BIG-IP System
  • Traffic Processing with BIG-IP
  • Web Application concepts
  • Common Web Application vulnerabilities
  • Security Policy Deployment
  • Policy Tuning and Violations
  • Attack Signatures
  • Cookies and Headers
  • Reporting and Logging
  • Advanced parameter Handling
  • Policy Diff. and Administration
  • Using Application-Ready Templates
  • Automatic Policy Building
  • Web Application Vulnerability Scanner Integration
  • Layered Policies
  • Login enforcement, Brute force Mitigation, and Session tracking
  • Web scraping mitigation and Geolocation enforcement
  • Layer 7 DoS Mitigation and Advanced Bot Protection
  • Setting up BIG IP System
  • Traffic Processing Building Blocks
  • Virtual Servers
  • Load Balancing Techniques
  • Profiles
  • Persistence
  • Network Address Translation and Secure NAT
  • iAPP
  • QKView and IHealth
  • Backup and Upgrade
  • High Availability
  • Logging in BIG-IP System
  • Troubleshooting
  • TMOS
  • iRule