Maslak Mah. Ahi Evran Caddesi Polaris Plaza Kat:10 34485 Sarıyer/İstanbul
iletisim@btegitim.com +90 (212) 274 69 98

Configuring BIG-IP ASM v11: Application Security Manager

Eğitim İçeriği
Hakkında

4 günlük eğitimde, BIG-IP ASM v11 sisteminin kullanımı ve gelişmiş özelliklerinin anlaşılması sağlanır. Teorik ve lab içerikli derste BIG-IP ASM sistemlerinin kurulumu, konfigürasyonu ve yönetimi ele alınır.

Eğitim Nasıl Verilecek?

Eğitimler en fazla 18 kişilik sınıflarda uygulamalı olarak yapılmaktadır. Her katılımcıya bir bilgisayar ve sanal F5 tahsis edilir. Kurs içeriklerinin tamamı İngilizce fakat eğitimin anlatımı Türkçe olarak yapılmaktadır.



Önkoşullar

There are no required F5 prerequisites for this course.

However, completing one of the following before attending would be very helpful for students unfamiliar with BIG-IP:

The following web-based courses, although optional, will be very helpful for any student with limited BIG-IP administration and configuration experience:

Students should understand:

  • TMOS administration
  • Network concepts and configuration
  • Programming concepts
  • Security concepts and terminology
  • Web application delivery


Kurs İçeriği

The BIG-IP Application Security Manager course provides participants with the expertise needed to detect, mitigate, and prevent HTTP-based attacks on web applications. The four-day lab intensive course starts at the simplest level for quickly configuring and implementing an application security policy and progresses through more complex configurations. The course includes detailed analysis and hands-on exercises for protecting web applications from brute force, web scraping, layer 7 DDoS, and other current attack vectors.

Topics covered in this course include:

  • Setting up the BIG-IP system
  • Traffic processing with BIG-IP Local Traffic Manager (LTM)
  • Web application concepts
  • Web application vulnerabilities
  • Security policy deployment
  • Attack signatures
  • Positive security building
  • Cookies and other headers
  • Reporting
  • User roles and administration
  • Advanced parameter handling
  • Application templates
  • Real Traffic Policy Builder
  • Vulnerability scanners
  • Login enforcement and session tracking
  • Anomaly detection
  • ASM and iRules
  • AJAX and JSON support
  • XML and web services support


Kurs Hedefleri

After course completion, participants will be able to differentiate between negative and positive security models, and configure the most appropriate protection for their own web applications.



Ders İçeriği

v11 COURSE OUTLINE

Chapter 1: Setting Up the BIG-IP System

  • Introducing the BIG-IP System
  • Initially Setting Up the BIG-IP System
  • Creating an Archive of the BIG-IP System
  • Leveraging F5 Support Resources and Tools

Chapter 2: Traffic Processing with BIG-IP

  • Understanding Traffic Processing with LTM
  • Overview of Local Traffic Policies and ASM

Chapter 3: Web Application Concepts

  • Anatomy of a Web Application
  • An Overview of Common Security Methods
  • Examining HTTP & Web Application Components
  • Examining HTTP Headers
  • Examining HTTP Responses
  • Examining HTML Components
  • How ASM parses File Types, URLs, & Parameters
  • Using the Fiddler HTTP proxy tool

Chapter 4: Web Application Vulnerabilities

  • Examining the OWASP Top 10 vulnerabilities
  • Summary of risk mitigation using ASM

Chapter 5: Security Policy Deployment

  • About Positive and Negative Security Models
  • Deployment Wizard: Local Traffic Deployment
  • Deployment Wizard: Configuration settings
  • Violations and Security Policy Building
  • Reviewing Violations

Chapter 6: Attack Signatures

  • Defining Attack Signatures
  • Attack Signature Features
  • Defining Attack Signature Sets
  • About User-defined Attack Signatures
  • Updating Attack Signatures
  • Understanding Attack Signatures and staging

Chapter 7: Positive Security Policy Building

  • Defining Security Policy Components
  • Security Through Entity Learning
  • Reviewing Staging and Enforcement
  • Understanding the Selective mode
  • Learning Differentiation: Real threats vs. false positives

Chapter 8: Cookies and other Headers

  • Purposes of ASM Cookies
  • Understanding Allowed and Enforced Cookies
  • Configuring security processing on HTTP headers

Chapter 9: Reporting and Logging

  • Reporting capabilities in ASM
  • Generating a PCI Compliance Report
  • Generating an ASM Security Events Report

Chapter 10: User Roles, policy modification, and other deployments

  • Understanding User Roles & Partitions
  • Editing and Exporting Security Policies

Chapter 11: Lab Project 1

Chapter 12: Advanced parameter handling

  • Defining Parameters
  • Defining Static Parameters
  • Configuring Dynamic Parameters and Extractions

Chapter 13: Application-Ready Templates

  • Application-Ready Template Overview

Chapter 14: Real Traffic Policy Builder

  • Overview of the Real Traffic Policy Builder
  • Defining Policy Types
  • Real Traffic Policy Builder Rules

Chapter 15: Web Application Vulnerability Scanners

  • Integrating ASM with Application Vulnerability Scanners
  • Resolving Vulnerabilities
  • Using the generic XML scanner output

Chapter 16: Login Enforcement, Session tracking, and Flows

  • Defining Login Pages
  • Configuring Login Enforcement
  • Configuring session and user tracking
  • Defining Flows
  • Configuring Flow Control

Chapter 17: Anomaly Detection

  • Defining Anomaly Detection
  • Preventing Brute Force Attacks
  • Preventing Web Scraping
  • Geolocation Enforcement
  • Configuring IP Address Exceptions

Chapter 18: ASM and iRules

  • Defining iRules and iRule Events
  • Using ASM iRule Event Modes
  • iRule Syntax
  • ASM iRule Commands

Chapter 19: Web 2.0 Support: AJAX and JSON

  • Defining Asynchronous JavaScript and XML
  • Defining JavaScript Object Notation (JSON)
  • Configuring a JSON Profile

Chapter 20: XML and Web Services

  • Defining XML
  • Configuring an XML Profile
  • XML Attack Signatures

Chapter 21: Review and Final Labs



Kimler Katılmalı

This course is intended for security and network administrators who will be responsible for the installation and day-to-day maintenance of the Application Security Manager.



Sınavlar

F5-CTS ASM Requirements
– F5-CA Certification

Exam 303 - ASM Specialist



EĞİTİM TAKVİMİ
Eğitime ait tanımlanmış bir takvim bulunmamaktadır. Sağda bulunan Bilgi Talebi formunu doldurarak eğitim takvimi, fiyatı ve içeriği hakkında bilgi edinebilirsiniz.
Eğitim içeriği, ücreti, tarih ve detaylı bilgi için :

+90 (212) 274 69 98

egitim@btegitim.com

İLETİŞİM FORMU

Eğitim içeriğini PDF olarak indir
Teknoloji
F5
Uzmanlık Sertifika Eğitimleri
Data Center
F5 Certified Technology Specialists
Configuring BIG-IP ASM v11: Application Security Manager
Bilgi Talebi


TAKİP ET
ADRES
Maslak Mah. Ahi Evran Caddesi Polaris Plaza Kat:10 34485 Sarıyer/İstanbul
Eskişehir Yolu 7.Km Mustafa Kemal Mah. 2123. Sok No:2-D Cepa Ofis Kule Kat: 5 Daire:504 Çankaya/Ankara
 
BT EĞİTİM ® bir Morten Bilgi ve İletişim Hizmetleri A.Ş. markasıdır.

YETKİLİ CISCO EĞİTİM MERKEZİ
Real Time Analytics