Understand how the ASM/AWAF works with other F5 modules to protect applications. Learn how to deploy and tune policies, identify false positives and respond to policy violations.
Intended Audience:
- Security Engineers/Architects
- Network Engineers/Architects
- Application Developers
- IT Decision Makers
Training Includes:
- Best practices and F5 solution overview
- HTTP Protocol and web application concepts
- Regulatory compliance: PCI-DSS, HIPAA, NIST
- Understand Positive and Negative Security Models
- Selecting the correct template for your policy
- Creating policies with the Automatic Policy Builder
- Applying and updating attack signatures
- Identify clients with Bot Defense Profile
- Working with application owners and developers
- Real world deployment for applications
Hands-On Labs and Demos:
- Lab 1: Initial Policy Creation
- Lab 2: Manage the ASM Policy Builder
- Lab 3: Troubleshoot and Resolve False Positives
- Lab 4: Identify and Respond to Policy Violations
- Lab 5: Ongoing Policy Tuning and Enhancement