F5/Configuring BIG-IP ASM: Application Security Manager


Configuring BIG-IP ASM: Application Security Manager Certification Training Course Overview

Configuring BIG-IP ASM: Application Security Manager training course is designed to learn how to deploy, tune, and operate ASM to protect their web applications from HTTP-based attacks. In this training class, you will also learn ASM components for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits.

Target Audience:

This course is recommended for security and network administrators who will be responsible for the installation, deployment, tuning, and day-to-day maintenance of the Application Security Manager.


Configuring BIG-IP ASM: Application Security Manager Course schedule & Prices

Schedule & Prices
Course Details Schedule
Live Virtual Classroom (Instructor-Led)
Duration : 5 Days (10 Days for 4 Hours/Day)
Fee : On Request



July
8 Hours/Day
12-16
13-17
20-24
12-23
13-24
20-31
August
8 Hours/Day
03-07
09-13
10-14
17-21
03-14
09-20
10-21
17-28
September
8 Hours/Day
07-11
13-17
14-18
21-25
07-18
13-24
14-25
21-02
October
8 Hours/Day
05-09
05-16
Fly-Me-a-Trainer
Duration :
Client's Location
As per mutual convenience
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request

Enquire Now




Input symbols

Course Prerequisites
  • No formal pre-requisites for this course.

  • Describe the role of the BIG-IP system as a full proxy device in an application delivery network
  • Provision the Application Security Manager
  • Define a web application firewall
  • Describe how ASM protects a web application by securing file types, URLs, and parameters
  • Deploy ASM using the Rapid Deployment template (and other templates) and define the security checks included in each
  • Define learn, alarm, and block settings as they pertain to configuring ASM
  • Define attack signatures and explain why attack signature staging is important
  • Contrast positive and negative security policy implementation and explain benefits of each
  • Configure security processing at the parameter level of a web application
  • Use an application template to protect a commercial web application
  • Deploy ASM using the Automatic Policy Builder
  • Tune a policy manually or allow automatic policy building
  • Integrate third party application vulnerability scanner output into a security policy
  • Configure login enforcement and session tracking
  • Configure protection against brute force, web scraping, and Layer 7 denial of service attacks
  • Implement iRules using specific ASM events and commands
  • Use Content Profiles to protect JSON and AJAX-based applications
  • Implement Bot Signatures
  • Implement Proactive Bot Defense