Securing Apps with F5 Solutions

Securing Apps with F5 Solutions

The F5 Certified™ Professionals program helps you develop career-advancing technical skills and extensive knowledge of F5 products and solutions, including options emphasizing Administration, Sales, Product Specializations, and Solutions including Cloud and Security.

Course Overivew

This Security Workshop provides participants with an opportunity to experiment with many of the different components of F5’s security solutions in a hands-on lab environment using a real-world application delivery deployment scenario. The goal of the course is to put to practical use the extensive capabilities of the BIG-IP system to safeguard application delivery in today’s growing threat landscape, and to help the audience think differently about application security.
The labs in this workshop are designed to demonstrate how you might deploy some of F5’s security solutions to protect applications at different layers of the OSI reference model. The course focuses on some of the features and functionality available in several BIG-IP modules, including:

  • BIG-IP Local Traffic Manager (LTM)
  • BIG-IP Advanced Firewall Manager (AFM)
  • BIG-IP Application Security Manager (ASM)
  • BIG-IP Access Policy Manager (APM)
  • BIG-IP Fraud Protection Service (FPS), also known as F5 WebSafe

Workshop Objectives
At the end of this lab, you will be able to use a range of F5 security solutions on the BIG-IP system and on the client to detect, mitigate, and protect from many common attacks and exploits waged against web applications.

Read More
Read Less
Course Benefits:

Day 1:
Lab 1: Adding Traffic Management Directional Controls
Lab 2: Adding L3/4 Firewall Protections and Traffic Inspection
Lab 3: Implementing L7 Protections for a Vulnerable Web Application
Lab 4: Protecting DNS Services
Lab 5: Defending Against L4 DoS Attacks at the Global Context
Lab 6: Defending Against L4 DoS Attacks at the Virtual Server Context
Lab 7: Defending Against L7 DoS Attacks
Day 2:
Lab 8: Detecting Client-Side Malware
Lab 9: Deploying Client-Side Application Layer Encryption
Lab 10: Detecting Client-Side Automatic Transaction
Lab 11: Implementing Access Controls
Lab 12: Implementing Multi-Domain Sign-On
Lab 13: Implementing Single Sign-On to Applications
Lab 14: Defending on Your Own Terms

  • Using L7 local traffic policies to direct expected traffic from a public-facing virtual server to private virtual servers for additional processing
  • Configuring and using security event logging to monitor legitimate traffic patterns and detect aberrations
  • Using network firewall rules to protect perimeter resources at L3/4
  • Using a web application firewall to detect and protect perimeter resources from known attack signatures
  • Using a web application firewall on internal resources to apply a positive security model and protect from data leakage
  • Using iRules to help maintain identity information for clients connecting from CDN and other proxy networks
  • Allowing DNS resolution through the BIG-IP system and implementing protection against unauthorized query types and recursive resolution requests
  • Mitigating DoS attacks using device DoS protection and eviction policies
  • Mitigating known L3/4 attack vectors at the perimeter
  • Using Secure Web Gateway to categorize and filter webpages for use in access controls
  • Implementing access controls to prevent unauthorized access to sensitive applications
  • Consolidating logon functionality for all domains on a single domain
  • Implementing Single Sign-On (SSO) access to multiple applications
  • Using Fraud Protection Services (WebSafe) to protect the integrity of data shared between clients and the applications they connect to
  • Using the FPS Login Page feature to provide alerts upon successful or unsuccessful log into an application
  • Using the FPS Automatic Transactions feature to help differentiate “human” traffic from bot traffic
  • Using the FPS Malware Detection feature to recognize malware on clients and safeguard against its introduction into applications the clients connect to
  • Using the FPS Application Layer Encryption feature to automatically encrypt form data on the client as it is entered in a form field

This workshop is intended for security and network administrators who are responsible for protecting applications delivered through a BIG-IP system, and who would like a more holistic view of applying F5 solutions to achieve greater application security.

Download
Course
Brochure

Prerequisites

This course is available at :

Classroom Training

Cairo
Giza
Onsite

Online Training

Virtual Interactive Instructor LED
Self-Paced Training

WHY CHOOSE CLS

Experience

We have been in the market since 1995, and we kept accumulating experience in the training business, and providing training for more than 100,000 trainees ever since, in Egypt, and the MENA region.

Premium Facilities

CLS facilities are well-equipped with strong hardware and software technologies that aid both students and trainers lead very effective smooth training programs.

Customer Support

We provide our clients with the best solutions, customized to their specific needs and goals. Our team is highly qualified to answer whatever questions you have.

Global Accredited

CLS is an authorized and accredited partner by technology leaders. This means that our training programs are of the highest quality source materials.

Up To Date

We keep tabs on every change in the market and the technology field, so our training programs will always be updated up to the World-class latest standards, and adapted to the global shape-shifting job market.

Certified Instructors

We select the best instructors, who are certified from trustworthy international vendors. They share their professional experience with the Trainees, so they can have a clear hands-on experience.

Over 200,000 Gradutes From CLS

Play Video
Amr Mostafa
An employee of the Security Department at the Ministry of Electricity

I`m attending now CEH Training with Eng Mohamed Hamdy ,CISSP Training with Eng Mohamed Gohar, I really learned a lot from him , everything here in CLS  is very satisfying including facilities .

Play Video
Lamiaa Medhat
CIO

We took a series of courses as the digital Transformation Unit of the ministry . we just finished CRISC Certification Training with DR Adel Abdel Meneim . Thank you CLS for all your efforts, we really appreciate it

Play Video
Ahmed Salah
Senior Cyber Security Engineer

Me and my colleagues are working in a government Organization, We took a no. of cyber security trainings with CLS starting with CEH and CISSP. we liked every thing the instructors, the stuff and whole environment

Play Video
Ferras Hassan
Head of the Programming Department at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Mohamed Ahmed Ali
Systems management specialist

Qualifying the cadres of digital transformation units in government agencies moving to the administrative capital .Thanks CLS

Play Video
Zeinab Salah
Software Developer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Play Video
Ibrahim Khalaf
IT Infrastructure and Security Manger

I`m attending now CRISC Training with DR Adel Abdel Meneim , I really learned a lot from him , everything here in CLS  is very satisfying including facilities , locations and the team.

Play Video
Samar Shams ElDin
Programmer at Bashayer Energy Company

I`m attending ASP.NET Core with MVC Training with Eng Mohamed Hesham , I really learned a lot from him , everything here in CLS  is very satisfying including facilities .Thanks you all team.

Student Application For

Securing Apps with F5 Solutions
Full Name *
Email *
Phone *
Full Phone
Training Location *
Additional Request

Business Application For

Securing Apps with F5 Solutions
Full Name *
Company Name *
Job Title *
Number of Employees
Email *
Phone *
Full Phone
Training Location *
Additional Request