F5 WAF and BIG-IP LTM Advanced Training Course ( f5waf | 35 hours )
Prerequisites:
- Basic understanding of computers and networking
Audience
- Network engineers, IT Specialists, Security Engineers, and Computer science graduates
Overview:
F5 Advanced training makes you confident to design, deploy, manage, and troubleshoot any issues in F5 infrastructure on your own.
This instructor-led, live training (online) is aimed to provide In-depth knowledge about F5 Administering BIG-IP LTM and F5 WAF (Web Application Firewall) with the help of step-by-step LAB sessions.
- In-depth knowledge about F5 WAF (Web Application Firewall) with the help of step-by-step LAB sessions.
- Strong and extensive knowledge to build a strong security policy to protect the web applications that are behind F5 WAF
- Extensive knowledge about OWASP's Top 10 Web Application Attacks and Vulnerabilities
- In-depth knowledge about BIG-IP F5 LTM (Local Traffic Manager) with the help of step-by-step LAB sessions.
- You will learn about all the Load Balancing Methods and Monitors in detail.
- Detailed understanding of the features and functions of BIG-IP F5 in-depth.
- You will understand all the complex topics of LTM very Easily with the help of step-by-step LAB.
- Detailed understanding of the Proxy setup, its traffic flow, and its functions and advantages.
- Understanding the various methods to secure the Application Server running behind the BIG-IP LTM in the F5 Infrastructure
By the end of this training, participants will be able to:
- Configure a strong security policy to mitigate web application attacks
- Configure and Manage F5 WAF
- To design, Deploy, Administrate, and Troubleshoot the F5 LTM (Local Traffic Manager) infrastructure
- Troubleshoot any issues in both the StandAlone and High Availablity Cluster environment of F5 LTM
- Configure Nodes, Pools, Load Balancing methods, Profile, NAT, SNAT, Automap, Profiles, Persistence, SSL, iRule, High Availablity, etc.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
Course Outline:
- Setting Up the BIG-IP System
- Traffic Processing with BIG-IP
- Web Application concepts
- Common Web Application vulnerabilities
- Security Policy Deployment
- Policy Tuning and Violations
- Attack Signatures
- Cookies and Headers
- Reporting and Logging
- Advanced parameter Handling
- Policy Diff. and Administration
- Using Application-Ready Templates
- Automatic Policy Building
- Web Application Vulnerability Scanner Integration
- Layered Policies
- Login enforcement, Brute force Mitigation, and Session tracking
- Web scraping mitigation and Geolocation enforcement
- Layer 7 DoS Mitigation and Advanced Bot Protection
- Setting up BIG IP System
- Traffic Processing Building Blocks
- Virtual Servers
- Load Balancing Techniques
- Profiles
- Persistence
- Network Address Translation and Secure NAT
- iAPP
- QKView and IHealth
- Backup and Upgrade
- High Availability
- Logging in BIG-IP System
- Troubleshooting
- TMOS
- iRule