Securing Apps with F5 Solutions (TRG-BIG-SEC-2)

 
Moyens Pédagogiques :
  • Quiz pré-formation de vérification des connaissances (si applicable)
  • Réalisation de la formation par un formateur agréé par l’éditeur
  • Formation réalisable en présentiel ou en distanciel
  • Mise à disposition de labs distants/plateforme de lab pour chacun des participants (si applicable à la formation)
  • Distribution de supports de cours officiels en langue anglaise pour chacun des participants
    • Il est nécessaire d'avoir une connaissance de l'anglais technique écrit pour la compréhension des supports de cours
Moyens d'évaluation :
  • Quiz pré-formation de vérification des connaissances (si applicable)
  • Évaluations formatives pendant la formation, à travers les travaux pratiques réalisés sur les labs à l’issue de chaque module, QCM, mises en situation…
  • Complétion par chaque participant d’un questionnaire et/ou questionnaire de positionnement en amont et à l’issue de la formation pour validation de l’acquisition des compétences

Who should attend

This workshop is intended for security and network administrators who are responsible for protecting applications delivered through a BIG-IP system, and who would like a more holistic view of applying F5 solutions to achieve greater application security.

Prerequisites

The following F5 Certifications are required:

  • F5 Certified BIG-IP Administrator

Working knowledge of and practical experience deploying configurations using one or more of the following BIG-IP modules is required:

  • BIG-IP Local Traffic Manager (LTM)
  • BIG-IP Application Security Manager (ASM)
  • BIG-IP Advanced Firewall Manager (AFM)
  • BIG-IP Access Policy Manager (APM)
  • Fraud Protection Service (FPS) – also known as WebSafe

This is an advanced workshop and is not designed to teach students how to configure these products in isolation. For practical experience learning how to configure each of these products, we recommend taking any of our Configuring courses first.

Course Objectives

This Security Workshop provides participants with an opportunity to experiment with many of the different components of F5’s security solutions in a hands-on lab environment using a real-world application delivery deployment scenario. The goal of the course is to put to practical use the extensive capabilities of the BIG-IP system to safeguard application delivery in today’s growing threat landscape, and to help the audience think differently about application security.

The labs in this workshop are designed to demonstrate how you might deploy some of F5's security solutions to protect applications at different layers of the OSI reference model. The course focuses on some of the features and functionality available in several BIG-IP modules, including:

  • BIG-IP Local Traffic Manager (LTM)
  • BIG-IP Advanced Firewall Manager (AFM)
  • BIG-IP Application Security Manager (ASM)
  • BIG-IP Access Policy Manager (APM)
  • BIG-IP Fraud Protection Service (FPS), also known as F5 WebSafe

Course Content

  • Using L7 local traffic policies to direct expected traffic from a public-facing virtual server to private virtual servers for additional processing
  • Configuring and using security event logging to monitor legitimate traffic patterns and detect aberrations
  • Using network firewall rules to protect perimeter resources at L3/4
  • Using a web application firewall to detect and protect perimeter resources from known attack signatures
  • Using a web application firewall on internal resources to apply a positive security model and protect from data leakage
  • Using iRules to help maintain identity information for clients connecting from CDN and other proxy networks
  • Allowing DNS resolution through the BIG-IP system and implementing protection against unauthorized query types and recursive resolution requests
  • Mitigating DoS attacks using device DoS protection and eviction policies
  • Mitigating known L3/4 attack vectors at the perimeter
  • Using the Secure Web Gateway feature to categorize and filter webpages for use in access controls
  • Implementing access controls to prevent unauthorized access to sensitive applications
  • Consolidating logon functionality for all domains on a single domain
  • Implementing Single Sign-On (SSO) access to multiple applications
  • Using Fraud Protection Services (WebSafe) to protect the integrity of data shared between clients and the applications they connect to
  • Using the FPS Login Page feature to provide alerts upon successful or unsuccessful log into an application
  • Using the FPS Automatic Transactions feature to help differentiate “human” traffic from bot traffic
  • Using the FPS Malware Detection feature to recognize malware on clients and safeguard against its introduction into applications the clients connect to
  • Using the FPS Application Layer Encryption feature to automatically encrypt form data on the client as it is entered in a form field

Prix & Delivery methods

Formation en ligne

Durée
2 jours

Prix
  • sur demande
Formation en salle équipée

Durée
2 jours

Prix
  • sur demande

Actuellement aucune session planifiée