Scheda corso
NovaNext Training / F5 Networks / F5 Networks / Configuring F5 Advanced WAF- BIG-AWF-CFG

Configuring F5 Advanced WAF- BIG-AWF-CFG

4 Giorni
3.800,00 € (iva escl.)
Virtual Classroom
Corso in aula


Luogo Data Iscrizione
A Richiesta

In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web.

Application Firewall to protect their web applications from HTTP-based attacks.

The course includes lecture, hands-on labs, and discussion about different F5 Advanced Web Application Firewall tools for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits.



Students must complete one of the following F5 prerequisites before attending this course:

  • Administering BIG-IP instructor-Led Course
  • F5-Certified BIG-IP Administrator



After course completion, participants will be able to differentiate between negative and positive security models, and configure the most appropriate protection for their own web applications.



The following free web-based courses, although optional, will be very helpful for any student with limited BIG-IP administration and configuration experience.

These courses are available at F5 University:

Getting Started with BIG-IP web-based training

- Getting Started with BIG-IP Local Traffic Manager (LTM) web-based training

- Getting Started with BIG-IP Application Security Manager (ASM) web-based training



v14 Course Topics

- Traffic processing with BIG-IP Local Traffic Manager (LTM)

- Web application concepts

- Web application vulnerabilities

- Security policy deployment

- Security policy tuning

- Attack signatures

- Positive security building

- Securing cookies and other headers

- Reporting and logging

- User roles

- Policy modification, merging, and exporting

- Advanced parameter handling

- Using application templates

- Using Automatic Policy Builder

- Integrating with web vulnerability scanners

- Login enforcement and session tracking

- Web scraping detection and mitigation

- Session tracking

- Geolocation Enforcement and IP Address Exceptions

- Using Parent and Child policies

- Layer 7 DoS protection

- ASM and iRules

- Using Content Profiles for AJAX and JSON applications

NEW - Advanced Bot Detection and Defense

NEW - Proactive Bot Defense

NEW — Simple Edit Mode for Attack Signatures

Accredited training provided in partnership with Westcon Academy