Overview
Explore
Partners
Select a tab
18 results found
JuicedShop Security Lab Series: Broken Access Control
The JuicedShop Security Lab Series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•190 launches
JuicedShop Security Lab Series: Injection Attacks
The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•64 launches
JuicedShop Security Lab Series: Server-Side Request Forgery (SSRF)
The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•12 launches
Deploying and Securing Multi-Cloud and Edge Generative AI Workloads with F5 Distributed Cloud
In the current AI market, the demand for scalable and secure deployments is increasing. Public cloud providers (AWS, Google, and Microsoft) are competing to provide GenAI infrastructure, driving the need for multi-cloud and hybrid cloud deployments.
However, distributed deployments come with challenges, including:
Complexity in managing multi-cloud environments.
Lack of unified visibility across clouds.
Inconsistent security and policy enforcement.
F5 Distributed Cloud provides a solution by offering a seamless, secure, and portable environment for GenAI workloads across clouds. This lab will guide you through setting up and securing GenAI applications with F5 Distributed Cloud on AWS EKS and GCP GKE.
Advanced Configuration Lab
•24 launches
JuicedShop Security Lab Series: Software and Data Integrity Failures
The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•15 launches
Practical API Security: Discover, Defend, and Secure APIs from Code to Runtime
This lab provides a hands-on introduction to API security and visibility using F5 Distributed Cloud Web App and API Protection (XC WAAP). As APIs continue to grow in number and complexity, they have become a primary target for cyberattacks. This lab explores how to discover, document, and secure both known and shadow APIs using the platform's API Discovery, Schema Validation, and Security Dashboards.
Participants will learn how to:
Send traffic through the F5 HTTPS Load Balancer to trigger API Discovery and the API Crawler
Automatically generate and maintain an API inventory, including undocumented shadow APIs
Apply OpenAPI Schema Validation to enforce API conformity and detect anomalies
Gain deep insights through advanced API Security Dashboards, including threat levels, sensitive data exposure, authentication status, and risk scores
Understand the importance of integrating DevSecOps practices by leveraging IaC and GitHub Actions for API protection deployment
By the end of this lab, users will gain critical visibility into their API ecosystem, identify vulnerabilities, and take actionable steps to secure both documented and undocumented APIs—helping to bring shadow APIs into the light.
Advanced Configuration Lab
•6 launches
JuicedShop Security Lab Series: Cryptographic Failures
The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•66 launches
F5 Distributed Cloud (XC) Application Security with Terraform
In this lab, users will experience F5 Distributed Cloud Web App and API protection (WAAP), where organizations can simplify their path to effective security without sacrificing continued business innovation and customer demand. An API-driven approach to application protection enables improved collaboration between networks, security operations, and developers. This lab will use Terraform to deploy a Web App and API protection solution that protects an existing application
Advanced Configuration Lab
•28 launches
JuicedShop Security Lab Series: Security Misconfiguration
The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•35 launches
F5 Distributed Cloud WAF on Regional and App Connect Deployment Mode
F5 Distributed Cloud WAF deployed on Regional Edge and App Connect Deployment mode. This deployment model offers an optimal solution for scenarios where backend applications are inaccessible from the internet, lacking a Fully Qualified Domain Name (FQDN) or Public IP.
In this case Customer Edge sites can be deployed to connect these "private" customer sites to the XC Global Network via IPSEC tunnels opened from Distributed Cloud Customer Edges to the closes two REs sites.
Distributed Cloud WAF is deployed on the Regional Edges, where the services are being advertised to the Internet through anycast IPs.
Customer Edges are being deployed on the customer sites and connect to the closest RE and traffic will be inspected by the WAAF security policy.
The traffic will then be forwarded across the distributed cloud global network towards an egress Regional Edge and then over an IPSEC tunnel to the Customer edge site where it will be forwarded to the backend applications as pure IP-based traffic.
Advanced Configuration Lab
•30 launches
Getting Started with NGINX One
Explore NGINX One, an all-in-one platform that integrates the best of NGINX's offerings into a unified package that includes a cloud-based dashboard and access to F5 Distributed Cloud. Customers get advanced load balancing, web and application server capabilities, API gateway functionalities, and security features. The goal of NGINX One is to provide unparalleled performance, security, and scalability for modern applications, whether they are deployed in the cloud, on-premises, or in hybrid environments.
Foundations Lab
•22 launches
JuicedShop Security Lab Series: Vulnerable and Outdated Components
The JuicedShop series is designed to explore the capabilities of Burp Suite and web application testing. Divided into shorter, palatable CTF games, the JuicedShop series features the vulnerable Juice Shop web application. These challenges provide an opportunity to apply web application testing methodologies in a live environment for real-world use cases.
Advanced Configuration Lab
•25 launches