Kurskode: ARR_F5N_BIG-AWAF

varighet: 4 Dag(er)

Sted: Virtual, Instructor Led Training
Katergori: F5

Course Overview

In this 4-day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks.

The course includes lecture, hands-on labs, and discussion about different F5 Advanced Web Application Firewall tools for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero-day exploits.

Course Topics

โ€ข Resource provisioning for F5 Advanced Web Application Firewall

โ€ข Traffic processing with BIG-IP Local Traffic Manager (LTM)

โ€ข Web application concepts

โ€ข Mitigating the OWASP Top 10 and other vulnerabilities

โ€ข Security policy deployment

โ€ข Security policy tuning

โ€ข Deploying Attack Signatures and Threat Campaigns

โ€ข Positive security building

โ€ข Securing cookies and other headers

โ€ข Reporting and logging

โ€ข Advanced parameter handling

โ€ข Using Automatic Policy Builder

โ€ข Integrating with web vulnerability scanners

โ€ข Login enforcement for flow control

โ€ข Brute force and credential stuffing mitigation

โ€ข Session tracking for client reconnaissance

โ€ข Using Parent and Child policies

โ€ข Layer 7 DoS protection

โ€ข Configuring Advanced Bot Defense

โ€ข Course Objectives

โ€ข Describe the role of the BIG-IP system as a full proxy device in an application delivery network

โ€ข Provision the F5 Advanced Web Application Firewall

โ€ข Define a web application firewall

โ€ข Describe how F5 Advanced Web Application Firewall protects a web application by securing file types, URLs, and parameters

โ€ข Deploy F5 Advanced Web Application Firewall using the Rapid Deployment template (and other templates) and define the security checks included in each

โ€ข Define learn, alarm, and block settings as they pertain to configuring F5 Advanced Web Application Firewall

โ€ข Define attack signatures and explain why attack signature staging is important

โ€ข Deploy Threat Campaigns to secure against CVE threats

โ€ข Contrast positive and negative security policy implementation and explain benefits of each

โ€ข Configure security processing at the parameter level of a web application

โ€ข Deploy F5 Advanced Web Application Firewall using the Automatic Policy Builder

โ€ข Tune a policy manually or allow automatic policy building

โ€ข Integrate third party application vulnerability scanner output into a security policy

โ€ข Configure login enforcement for flow control

โ€ข Mitigate credential stuffing

โ€ข Configure protection against brute force attacks

โ€ข Deploy Advanced Bot Defense against web scrapers, all known bots, and other automated agents

Chapter 1: Introducing the BIG-IP System

โ€ข Initially Setting Up the BIG-IP System

โ€ข Archiving the BIG-IP System Configuration

โ€ข Leveraging F5 Support Resources and Tools

Chapter 2: Traffic Processing with BIG-IP

โ€ข Identifying BIG-IP Traffic Processing Objects

โ€ข Understanding Profiles

โ€ข Overview of Local Traffic Policies

โ€ข Visualizing the HTTP Request Flow

Chapter 3: Overview of Web Application Processing

โ€ข Web Application Firewall: Layer 7 Protection

โ€ข Layer 7 Security Checks

โ€ข Overview of Web Communication Elements

โ€ข Overview of the HTTP Request Structure

โ€ข Examining HTTP Responses

โ€ข How F5 Advanced WAF Parses File Types, URLs, and Parameters

โ€ข Using the Fiddler HTTP Proxy

Chapter 4: Overview of Web Application Vulnerabilities

โ€ข A Taxonomy of Attacks: The Threat Landscape

โ€ข Common Exploits Against Web Applications

Chapter 5: Security Policy Deployments: Concepts and Terminology

โ€ข Defining Learning

โ€ข Comparing Positive and Negative Security Models

โ€ข The Deployment Workflow

โ€ข Assigning Policy to Virtual Server

โ€ข Deployment Workflow: Using Advanced Settings

โ€ข Configure Server Technologies

โ€ข Defining Attack Signatures

โ€ข Viewing Requests

โ€ข Security Checks Offered by Rapid Deployment

Chapter 6: Policy Tuning and Violations

โ€ข Post-Deployment Traffic Processing

โ€ข How Violations are Categorized

โ€ข Violation Rating: A Threat Scale

โ€ข Defining Staging and Enforcement

โ€ข Defining Enforcement Mode

โ€ข Defining the Enforcement Readiness Period

โ€ข Reviewing the Definition of Learning

โ€ข Defining Learning Suggestions

โ€ข Choosing Automatic or Manual Learning

โ€ข Defining the Learn, Alarm and Block Settings

โ€ข Interpreting the Enforcement Readiness Summary

โ€ข Configuring the Blocking Response Page

Chapter 7: Using Attack Signatures and Threat Campaigns

โ€ข Defining Attack Signatures

โ€ข Attack Signature Basics

โ€ข Creating User-Defined Attack Signatures

โ€ข Defining Simple and Advanced Edit Modes

โ€ข Defining Attack Signature Sets

โ€ข Defining Attack Signature Pools

โ€ข Understanding Attack Signatures and Staging

โ€ข Updating Attack Signatures

โ€ข Defining Threat Campaigns

โ€ข Deploying Threat Campaigns

Chapter 8: Positive Security Policy Building

โ€ข Defining and Learning Security Policy Components

โ€ข Defining the Wildcard

โ€ข Defining the Entity Lifecycle

โ€ข Choosing the Learning Scheme

โ€ข How to Learn: Never (Wildcard Only)

โ€ข How to Learn: Always

โ€ข How to Learn: Selective

โ€ข Reviewing the Enforcement Readiness Period: Entities

โ€ข Viewing Learning Suggestions and Staging Status

โ€ข Defining the Learning Score

โ€ข Defining Trusted and Untrusted IP Addresses

โ€ข How to Learn: Compact

Chapter 9: Securing Cookies and other Header Topics

โ€ข The Purpose of F5 Advanced WAF Cookies

โ€ข Defining Allowed and Enforced Cookies

โ€ข Securing HTTP headers

Chapter 10: Visual Reporting and Logging

โ€ข Viewing Application Security Summary Data

โ€ข Reporting: Build Your Own View

โ€ข Reporting: Chart based on filters

โ€ข Brute Force and Web Scraping Statistics

โ€ข Viewing Resource Reports

โ€ข PCI Compliance: PCI-DSS 3.0

โ€ข Analyzing Requests

โ€ข Local Logging Facilities and Destinations

โ€ข Viewing Logs in the Configuration Utility

โ€ข Defining the Logging Profile

โ€ข Configuring Response Logging

Chapter 11: Lab Project 1

Chapter 12: Advanced Parameter Handling

โ€ข Defining Parameter Types

โ€ข Defining Static Parameters

โ€ข Defining Dynamic Parameters

โ€ข Defining Parameter Levels

โ€ข Other Parameter Considerations

Chapter 13: Automatic Policy Building

โ€ข Defining Templates Which Automate Learning

โ€ข Defining Policy Loosening

โ€ข Defining Policy Tightening

โ€ข Defining Learning Speed: Traffic Sampling

โ€ข Defining Track Site Changes

Chapter 14: Integrating with Web Application Vulnerability Scanners

โ€ข Integrating Scanner Output

โ€ข Importing Vulnerabilities

โ€ข Resolving Vulnerabilities

โ€ข Using the Generic XML Scanner XSD file

Chapter 15: Deploying Layered Policies

โ€ข Defining a Parent Policy

โ€ข Defining Inheritance

โ€ข Parent Policy Deployment Use Cases

Chapter 16: Login Enforcement and Brute Force Mitigation

โ€ข Defining Login Pages for Flow Control

โ€ข Configuring Automatic Detection of Login Pages

โ€ข Defining Brute Force Attacks

โ€ข Brute Force Protection Configuration

โ€ข Source-Based Brute Force Mitigations

โ€ข Defining Credential Stuffing

โ€ข Mitigating Credential Stuffing

Chapter 17: Reconnaissance with Session Tracking

โ€ข Defining Session Tracking

โ€ข Configuring Actions Upon Violation Detection

Chapter 18: Layer 7 Denial of Service Mitigation

โ€ข Defining Denial of Service Attacks

โ€ข Defining the DoS Protection Profile

โ€ข Overview of TPS-based DoS Protection

โ€ข Creating a DoS Logging Profile

โ€ข Applying TPS Mitigations

โ€ข Defining Behavioral and Stress-Based Detection

Chapter 19: Advanced Bot Defense

โ€ข Classifying Clients with the Bot Defense Profile

โ€ข Defining Bot Signatures

โ€ข Defining F5 Fingerprinting

โ€ข Defining Bot Defense Profile Templates

โ€ข Defining Microservices protection

Chapter 20: Final Projects

Course Changes since v15

โ€ข The Configuring F5 Advanced Web Application Firewall course has been modified to reflect changes in the Configuration utility and changes in behavior. 

โ€ข Data Guard is now accessed under Advanced Settings per application security policy. 

โ€ข File Types are now accessed under Advanced Settings per application security policy. 

โ€ข Login Page configuration has moved to Sessions and Logins section per application security policy. 

โ€ข Lab numbers are no longer used: Labs are now identified by name.

โ€ข The section and lab regarding Data Safe has been removed from the class. 

โ€ข A new section on Leaked Credentials Detection has been added to the Brute Force section of the class.

Course Changes since v15

โ€ข The Configuring F5 Advanced Web Application Firewall course has been modified to reflect changes in the Configuration utility and changes in behavior. 

โ€ข Data Guard is now accessed under Advanced Settings per application security policy. 

โ€ข File Types are now accessed under Advanced Settings per application security policy. 

โ€ข Login Page configuration has moved to Sessions and Logins section per application security policy. 

โ€ข Lab numbers are no longer used: Labs are now identified by name.

โ€ข The section and lab regarding Data Safe has been removed from the class. 

โ€ข A new section on Leaked Credentials Detection has been added to the Brute Force section of the class.


โ€ข Describe the role of the BIG-IP system as a full proxy device in an application delivery network

โ€ข Provision the F5 Advanced Web Application Firewall

โ€ข Define a web application firewall

โ€ข Describe how F5 Advanced Web Application Firewall protects a web application by securing file types, URLs, and parameters

โ€ข Deploy F5 Advanced Web Application Firewall using the Rapid Deployment template (and other templates) and define the security checks included in each

โ€ข Define learn, alarm, and block settings as they pertain to configuring F5 Advanced Web Application Firewall

โ€ข Define attack signatures and explain why attack signature staging is important

โ€ข Deploy Threat Campaigns to secure against CVE threats

โ€ข Contrast positive and negative security policy implementation and explain benefits of each

โ€ข Configure security processing at the parameter level of a web application

โ€ข Deploy F5 Advanced Web Application Firewall using the Automatic Policy Builder

โ€ข Tune a policy manually or allow automatic policy building

โ€ข Integrate third party application vulnerability scanner output into a security policy

โ€ข Configure login enforcement for flow control

โ€ข Mitigate credential stuffing

โ€ข Configure protection against brute force attacks

โ€ข Deploy Advanced Bot Defense against web scrapers, all known bots, and other automated agents

There are no F5-technology-specific prerequisites for this course. However, completing the following before attending would be very helpful for students with limited BIG-IP administration and configuration experience: 

? Administering BIG-IP instructor-led course ? -or- 

? F5 Certified BIG-IP Administrator 

The following free web-based training courses, although optional, will be very helpful for any student with limited BIG-IP administration and configuration experience. 

These courses are available at LearnF5 (https://www.f5.com/services/training): 

? Getting Started with BIG-IP web-based training 

? Getting Started with BIG-IP Application Security Manager (ASM) web-based training 

The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course: 

? OSI model encapsulation 

? Routing and switching 

? Ethernet and ARP 

? TCP/IP concepts 

? IP addressing and subnetting 

? NAT and private IP addressing 

? Default gateway 

? Network firewalls 

? LAN vs. WAN

This course is intended for SecOps personnel responsible for the deployment, tuning, and day-to-day maintenance of F5 Adv. WAF. 

Participants will obtain a functional level of expertise with F5 Advanced WAF, including comprehensive security policy and profile configuration, client assessment, and appropriate mitigation types.

โ€ขExperience with LTM is not required

โ€ขPrior WAF knowledge is not required

This course is on the list of approved study resources for the F5 ASM 303 certification exam.

Kontakt oss: Kurs@sgpartner.no

Kurskode: ARR_F5N_BIG-AWAF Kategori: , Tag

Relaterte kurs