Configuring BIG-IP ASM: Application Security Manager Training & Certification Courses

Enquire Now


 
Loading...  

Processing data, please wait...

Live Chat
Expert Trainers
Expert Trainers
Guarantee to Run the Classes
Guarantee to Run the Classes
#1 Offshore IT Training Company
#1 Offshore IT Training Company
Hello Koenig

Overview

Configuring BIG-IP ASM: Application Security Manager training course is designed to learn how to deploy, tune, and operate ASM to protect their web applications from HTTP-based attacks. In this training class, you will also learn ASM components for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits.

Target Audience:

This course is recommended for security and network administrators who will be responsible for the installation, deployment, tuning, and day-to-day maintenance of the Application Security Manager.

Need more info ? Email info@koenig-solutions.com  or   Enquire now!

Schedule & Prices

Delivery Mode Location Fees Schedule
Instructor-Led Online Training (1-on-1)

Duration : 5 Days

Reserve Your Seat Now
Client's Home/Office $ 1,700 As per mutual convenience (4-Hours Evenings & Weekends Possible
Classroom Training *

Duration : 5 Days

Reserve Your Seat Now
dubai $ 2,600
13-17 Oct 2019,
10-14 Nov 2019,
8 Dec -12 Dec 2019
Delhi, Bangalore, Dehradun (Rishikesh), Goa, Shimla, Chennai $ 1,700
7 Oct -11 Oct 2019,
4 Nov -8 Nov 2019,
11 Nov -15 Nov 2019,
2 Dec -6 Dec 2019,
9 Dec -13 Dec 2019,
16 Dec -20 Dec 2019
Fly-Me-a-Trainer

Duration : 5 Days
Client's Location On Request As per mutual convenience

Configuring BIG-IP ASM: Application Security Manager Benefits

  • Describe the role of the BIG-IP system as a full proxy device in an application delivery network
  • Provision the Application Security Manager
  • Define a web application firewall
  • Describe how ASM protects a web application by securing file types, URLs, and parameters
  • Deploy ASM using the Rapid Deployment template (and other templates) and define the security checks included in each
  • Define learn, alarm, and block settings as they pertain to configuring ASM
  • Define attack signatures and explain why attack signature staging is important
  • Contrast positive and negative security policy implementation and explain benefits of each
  • Configure security processing at the parameter level of a web application
  • Use an application template to protect a commercial web application
  • Deploy ASM using the Automatic Policy Builder
  • Tune a policy manually or allow automatic policy building
  • Integrate third party application vulnerability scanner output into a security policy
  • Configure login enforcement and session tracking
  • Configure protection against brute force, web scraping, and Layer 7 denial of service attacks
  • Implement iRules using specific ASM events and commands
  • Use Content Profiles to protect JSON and AJAX-based applications
  • Implement Bot Signatures
  • Implement Proactive Bot Defense
Need more info ? Email info@koenig-solutions.com  or   Enquire now!
Delhi
Bangalore (Bengaluru)
Goa
Shimla (Himalayas)
Chennai
Dehradun
Dubai
USA UK

Please Input Captcha Below

Submit