Course Information
Course Overview
Complete F5 Technical & Practical Training For The Main Three Modules Of F5 ( LTM , ASM & DNS "GTM" ) .
In this first portion of this course ( Complete F5 Technical & Practical Training For The Main Three Modules Of F5 ( LTM , ASM & DNS "GTM" ) we will tackle the main needed topics to secure a web application through ASM "Application Security Manager" of f5 .
In the first section we will speak about an overview of ASM module and the theory of web application firewall , what are the main attack types that we can secure against and finally we'll tackle the main owasp top 10 vunlerabilities of any web application .
With the section section , we'll be familiar with how ASM learning methodolgy works and how we can tune the policy according to the learning results .
In the third section , we'll understand deeply the concept of automatic learning and how we can create a policy in an automatic mode to automatically enable our asm to accept learning suggestion without any intervention from the administrator .
Then , we'll take a deep look into the main objects to secure related to the web application against some popular attacks like ( brute force attacks , DOS attacks , bot attacks and others ) .
After that , we'll see how to work with parameters with all their types inside the web application ( static parameters and dynamic parameters ) .
Finally , we'll configure some features related to the administration of this module "ASM" and how to configure logging and also how to generate reports .
Course Content
- 6 section(s)
- 31 lecture(s)
- Section 1 F5 Bigip ASM Overview
- Section 2 Learning & Policy Tuning
- Section 3 Objects Securing
- Section 4 Administration & Integrations
- Section 5 Real World Project With Penetration Testing Using Kali Linux
- Section 6 Logging & Reporting
What You’ll Learn
- Take a complete overview of f5 bigip asm module and how it works, Define the main components of security policy and how to configure it, Identify the differences between learning and blocking settings, Take a complete real world project scenario, Make a real world penetration testing scenarios using kali linux
Skills covered in this course
Reviews
-
EElsayed Kasem
Thanks a lot for this greet course
-
EEmmanuel Ngeno
Good for learning and getting comfortable with ASM. Audio was a bit unclear with some background noise in some videos though.
-
UUSMAN ALI
This course delivering good content so far.