F5/Configuring BIG-IP ASM: Application Security Manager

Configuring BIG-IP ASM: Application Security Manager Certification Training Course Overview

Configuring BIG-IP ASM: Application Security Manager training course is designed to learn how to deploy, tune, and operate ASM to protect their web applications from HTTP-based attacks. In this training class, you will also learn ASM components for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits. Target Audience: This course is recommended for security and network administrators who will be responsible for the installation, deployment, tuning, and day-to-day maintenance of the Application Security Manager.

Configuring BIG-IP ASM: Application Security Manager Course schedule & Prices

Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 5 Days (10 Days for 4 Hours/Day)
Fee : On Request
9 AM - 5 PM (Flexible Time Slots for 4 hours option)

Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Special Solutions for Corporate Clients. Click here

Get Quote

Course Prerequisites
  • No formal pre-requisites for this course.

Describe the role of the BIG-IP system as a full proxy device in an application delivery network Provision the Application Security Manager Define a web application firewall Describe how ASM protects a web application by securing file types, URLs, and parameters Deploy ASM using the Rapid Deployment template (and other templates) and define the security checks included in each Define learn, alarm, and block settings as they pertain to configuring ASM Define attack signatures and explain why attack signature staging is important Contrast positive and negative security policy implementation and explain benefits of each Configure security processing at the parameter level of a web application Use an application template to protect a commercial web application Deploy ASM using the Automatic Policy Builder Tune a policy manually or allow automatic policy building Integrate third party application vulnerability scanner output into a security policy Configure login enforcement and session tracking Configure protection against brute force, web scraping, and Layer 7 denial of service attacks Implement iRules using specific ASM events and commands Use Content Profiles to protect JSON and AJAX-based applications Implement Bot Signatures Implement Proactive Bot Defense