F5 Getting Started Series
Become fluent in F5 products and how to integrate them in your company's environment. The F5 Getting Started Series of free web-based training courses offers you the chance to:
-
Explore the features and functionality of F5 solutions and how to leverage them to solve typical business problems
-
Learn how to perform basic BIG-IP administration and configuration tasks
-
Discover the tools available for you to customize application delivery to meet your business needs
This course is the introductory module for the Getting Started series and explains the training opportunities available through F5 and authorized F5 Training Centers.
The topics presented in this course are organized around a simple customer scenario in which a web application is vulnerable to external threats. You’ll learn how to identify common threats to such a web application, and then create and deploy a web application security policy to mitigate common threats.
In this training module you will learn how to complete the Guided Configuration for protecting your server from Denial of Service using behavioral analytics. Behavioral DoS mitigation measures normal traffic and server stress. When server stress occurs, F5 Advanced WAF can rate limit or drop those source IP addresses whose behavior has exceeded the thresholds for legitimate traffic. Behavioral DoS is fully automated and has no configuration other than the four modes of operation. There are no thresholds to configure, and there is no need to maintain or fine tune any settings.
This course provides an overview of the BIG-IP Cloud Edition and how it offers a per-app model to deploy traffic management and security services to every app. The BIG-IP Cloud Edition also promotes self-service for application developers.
This course discusses Programmability within the context of BIG-IP and specifically the new technology, iControl REST.
The topics presented in this course are organized around a customer scenario involving a company that is delivering their web applications through a BIG-IP platform and wishes to dramatically scale up their throughput capabilities. The customer...