Securing Apps with F5 Solutions v13 About this class Dates: 8/28/2018 - 8/29/2018 Location: Seattle, Company: F5 Networks View the prerequisites Full Contact Course Summary This Security Workshop provides participants with an opportunity to experiment with many of the different components of F5’s security solutions in a hands-on lab environment using a real-world application delivery deployment scenario. The goal of the course is to put to practical use the extensive capabilities of the BIG-IP system to safeguard application delivery in today’s growing threat landscape, and to help the audience think differently about application security. The labs in this workshop are designed to demonstrate how you might deploy some of F5's security solutions to protect applications at different layers of the OSI reference model. The course focuses on some of the features and functionality available in several BIG-IP modules, including: BIG-IP Local Traffic Manager (LTM) BIG-IP Advanced Firewall Manager (AFM) BIG-IP Application Security Manager (ASM) BIG-IP Access Policy Manager (APM) BIG-IP Fraud Protection Service (FPS), also known as F5 WebSafe Workshop Objectives At the end of this lab, you will be able to use a range of F5 security solutions on the BIG-IP system and on the client to detect, mitigate, and protect from many common attacks and exploits waged against web applications. Workshop Topics Using L7 local traffic policies to direct expected traffic from a public-facing virtual server to private virtual servers for additional processing Configuring and using security event logging to monitor legitimate traffic patterns and detect aberrations Using network firewall rules to protect perimeter resources at L3/4 Using a web application firewall to detect and protect perimeter resources from known attack signatures Using a web application firewall on internal resources to apply a positive security model and protect from data leakage Using iRules to help maintain identity information for clients connecting from CDN and other proxy networks Allowing DNS resolution through the BIG-IP system and implementing protection against unauthorized query types and recursive resolution requests Mitigating DoS attacks using device DoS protection and eviction policies Mitigating known L3/4 attack vectors at the perimeter Using Secure Web Gateway to categorize and filter webpages for use in access controls Implementing access controls to prevent unauthorized access to sensitive applications Consolidating logon functionality for all domains on a single domain Implementing Single Sign-On (SSO) access to multiple applications Using Fraud Protection Services (WebSafe) to protect the integrity of data shared between clients and the applications they connect to Using the FPS Login Page feature to provide alerts upon successful or unsuccessful log into an application Using the FPS Automatic Transactions feature to help differentiate “human” traffic from bot traffic Using the FPS Malware Detection feature to recognize malware on clients and safeguard against its introduction into applications the clients connect to Using the FPS Application Layer Encryption feature to automatically encrypt form data on the client as it is entered in a form field Major Course Changes since v12 The Securing Apps with BIG-IP Solutions v13.1 course presents the same content as v12 with minor modifications to improve flow and updates needed for v13.1 enhancements. Course Length: 2 days Course SKU: F5-TRG-BIG-SEC-2 Price: $2495 (USD) Prerequisites The following F5 Certifications are required: F5 Certified BIG-IP Administrator Working knowledge of and practical experience deploying configurations using one or more of the following BIG-IP modules is required: BIG-IP Local Traffic Manager (LTM) BIG-IP Application Security Manager (ASM) BIG-IP Advanced Firewall Manager (AFM) BIG-IP Access Policy Manager (APM) Fraud Protection Service (FPS) – also known as WebSafe This is an advanced workshop and is not designed to teach students how to configure these products in isolation. For practical experience learning how to configure each of these products, we recommend taking any of our Configuring courses first.