Getting Started with BIG-IP Application Security Manager (ASM) asm big-ip asm security virtual edition The topics presented in this course are organized around a simple customer scenario involving a photo-sharing website and its potential vulnerabilities to business logic abuse and other threats. You’ll learn how to identify common threats to such a web application, and then deploy ASM’s Real Traffic Policy Builder® to quickly eliminate most threats. You’ll see how ASM can apply its attack signatures to inspect user input and alert you if a violation is detected. And you’ll step through the process of using the Deployment Wizard to create, configure, and manage a basic application security policy using the automatic option. To access any of the Getting Started courses, go to F5 University. If you have not visited F5 University before, click on Register for an Account and fill in the required information. An account will be setup immediately. After logging in, click on the F5 University link on the left and then click on the link to the F5 Getting Started Series. Go to F5 Getting Started Series.