Pobierz konspekt szkolenia w formacie PDF

Transkrypt

Pobierz konspekt szkolenia w formacie PDF
Szkolenie F5 Networks
CONFIGURING BIG-IP ASM V11 APPLICATION SECURITY
MANAGER
Strona 1 z 8
Szkolenie: F5 Networks
CONFIGURING BIG-IP ASM V11 APPLICATION SECURITY
MANAGER
FORMA SZKOLENIA
MATERIAŁY
CENA
Stacjonarne
Tradycyjne
17500 PLN NETTO*
Stacjonarne
Tablet ctab
17900 PLN NETTO*
Metoda dlearning
Tradycyjne
17500 PLN NETTO*
Metoda dlearning
Tablet ctab
17500 PLN NETTO*
*(+VAT zgodnie z obowiązującą stawką w dniu wystawienia faktury)
INFORMACJE DODATKOWE
Czas trwania szkolenia
4 dni
Lokalizacje
Kraków - ul. Tatarska 5, II piętro, godz. 9:00 - 16:00
Warszawa - ul. Bielska 17, godz. 9:00 - 16:00
OPIS SZKOLENIA
The BIG-IP Application Security Manager course provides participants with the expertise needed to detect, mitigate, and prevent
HTTP-based attacks on web applications. The four-day lab intensive course starts at the simplest level for quickly configuring and
implementing an application security policy and progresses through more complex configurations. The course includes detailed
analysis and hands-on exercises for protecting web applications from brute force, web scraping, layer 7 DDoS, and other current
attack vectors. After course completion, participants will be able to differentiate between negative and positive security models, and
configure the most appropriate protection for their own web applications.Audience:
This course is intended for network operators, network administrators, network engineers, network architects, security administrators,
and security architects responsible for installation, setup, configuration, and administration of the BIG-IP Advanced Firewall Manager
(AFM) system.
PLAN SZKOLENIA
- Setting Up the BIG-IP System
- Introducing the BIG-IP System
- Initially Setting Up the BIG-IP System
Compendium Centrum Edukacyjne sp. z o.o.
ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77
ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70
Bank BPH Spółka Akcyjna
Oddział w Krakowie
Numer konta: 74 1060 0076 0000 3210 0022 6028
Szkolenie F5 Networks
CONFIGURING BIG-IP ASM V11 APPLICATION SECURITY
MANAGER
Strona 2 z 8
- Backing Up and Restoring BIG-IP configuration
- Leveraging F5 Support Resources and Tools
- Traffic Processing with BIG-IP
- Understanding Traffic Processing with LTM
- Overview of Local Traffic Policies and ASM
- Web Application Concepts
- Anatomy of a Web Application
- An Overview of Common Security Methods
- Examining HTTP & Web Application Components
- Examining HTTP Headers
- Examining HTTP Responses
- Examining HTML Components
- How ASM parses File Types, URLs, & Parameters
- Using the Fiddler HTTP proxy tool
- Web Application Vulnerabilities
Compendium Centrum Edukacyjne sp. z o.o.
ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77
ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70
Bank BPH Spółka Akcyjna
Oddział w Krakowie
Numer konta: 74 1060 0076 0000 3210 0022 6028
Szkolenie F5 Networks
CONFIGURING BIG-IP ASM V11 APPLICATION SECURITY
MANAGER
Strona 3 z 8
- Examining the OWASP Top 10 vulnerabilities
- Summary of risk mitigation using ASM
- Security Policy Deployment
- About Positive and Negative Security Models
- Deployment Wizard: Local Traffic Deployment
- Deployment Wizard: Configuration settings
- Violations and Security Policy Building
- Reviewing Violations
- Attack Signatures
- Defining Attack Signatures
- Attack Signature Features
- Defining Attack Signature Sets
- About User-defined Attack Signatures
- Updating Attack Signatures
- Understanding Attack Signatures and staging
- Positive Security Policy Building
Compendium Centrum Edukacyjne sp. z o.o.
ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77
ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70
Bank BPH Spółka Akcyjna
Oddział w Krakowie
Numer konta: 74 1060 0076 0000 3210 0022 6028
Szkolenie F5 Networks
CONFIGURING BIG-IP ASM V11 APPLICATION SECURITY
MANAGER
Strona 4 z 8
- Defining Security Policy Components
- Security Through Entity Learning
- Reviewing Staging and Enforcement
- Understanding the Selective mode
- Learning Differentiation: Real threats vs. false positives
- Cookies and other Headers
- Purposes of ASM Cookies
- Understanding Allowed and Enforced Cookies
- Configuring security processing on HTTP headers
- Reporting and Logging
- Reporting capabilities in ASM
- Generating a PCI Compliance Report
- Generating an ASM Security Events Report
- User Roles, policy modification, and other deployments
- Understanding User Roles & Partitions
Compendium Centrum Edukacyjne sp. z o.o.
ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77
ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70
Bank BPH Spółka Akcyjna
Oddział w Krakowie
Numer konta: 74 1060 0076 0000 3210 0022 6028
Szkolenie F5 Networks
CONFIGURING BIG-IP ASM V11 APPLICATION SECURITY
MANAGER
Strona 5 z 8
- Editing and Exporting Security Policies
- Lab Project 1
- Advanced parameter handling
- Defining Parameters
- Defining Static Parameters
- Configuring Dynamic Parameters and Extractions
- Application-Ready Templates
- Application-Ready Template Overview
- Real Traffic Policy Builder
- Overview of the Real Traffic Policy Builder
- Defining Policy Types
- Real Traffic Policy Builder Rules
- Web Application Vulnerability Scanners
- Integrating ASM with Application Vulnerability Scanners
Compendium Centrum Edukacyjne sp. z o.o.
ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77
ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70
Bank BPH Spółka Akcyjna
Oddział w Krakowie
Numer konta: 74 1060 0076 0000 3210 0022 6028
Szkolenie F5 Networks
CONFIGURING BIG-IP ASM V11 APPLICATION SECURITY
MANAGER
Strona 6 z 8
- Resolving Vulnerabilities
- Using the generic XML scanner output
- Login Enforcement, Session tracking, and Flows
- Defining Login Pages
- Configuring Login Enforcement
- Configuring session and user tracking
- Defining Flows
- Configuring Flow Control
- Anomaly Detection
- Defining Anomaly Detection
- Preventing Brute Force Attacks
- Preventing Web Scraping
- Geolocation Enforcement
- Configuring IP Address Exceptions
- ASM and iRules
Compendium Centrum Edukacyjne sp. z o.o.
ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77
ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70
Bank BPH Spółka Akcyjna
Oddział w Krakowie
Numer konta: 74 1060 0076 0000 3210 0022 6028
Szkolenie F5 Networks
CONFIGURING BIG-IP ASM V11 APPLICATION SECURITY
MANAGER
Strona 7 z 8
- Defining iRules and iRule Events
- Using ASM iRule Event Modes
- iRule Syntax
- ASM iRule Commands
- Web 2.0 Support: AJAX and JSON
- Defining Asynchronous JavaScript and XML
- Defining JavaScript Object Notation (JSON)
- Configuring a JSON Profile
- XML and Web Services
- Defining XML
- Configuring an XML Profile
- XML Attack Signatures
- Review and Final Labs
WYMAGANIA DLA UCZESTNIKA
Students are required to complete one of the following F5 prerequisites before attending this course:
- Administering BIG-IP
Compendium Centrum Edukacyjne sp. z o.o.
ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77
ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70
Bank BPH Spółka Akcyjna
Oddział w Krakowie
Numer konta: 74 1060 0076 0000 3210 0022 6028
Szkolenie F5 Networks
CONFIGURING BIG-IP ASM V11 APPLICATION SECURITY
MANAGER
Strona 8 z 8
Students should understand:
- TMOS administration
- Network concepts and configuration
- Programing concepts
- Security concepts and terminology
- Web application delivery
CERTYFIKATY
The participants will obtain certificates signed by F5 Networks (course completion).
This course also will help to prepare you for the F5 Networks ASM Specialist certification (F5-CTS) exams Exam 303 - ASM Specialist,
which is available through the Pearson VUE test centers.
PROWADZĄCY
Certified F5 Networks Trainer.
Compendium Centrum Edukacyjne sp. z o.o.
ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77
ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70
Bank BPH Spółka Akcyjna
Oddział w Krakowie
Numer konta: 74 1060 0076 0000 3210 0022 6028

Podobne dokumenty