<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="20054" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/f5networks-trg-big-awf-cfg" lastchanged="2026-03-13T14:51:23+01:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Configuring F5 Advanced WAF (previously licensed as ASM)</title><productcode>TRG-BIG-AWF-CFG</productcode><vendorcode>F5</vendorcode><vendorname>F5 Networks</vendorname><fullproductcode>F5-TRG-BIG-AWF-CFG</fullproductcode><version>15.1</version><objective>&lt;ul&gt;
&lt;li&gt;Students should be able to:&lt;/li&gt;&lt;li&gt;Describe the role of the BIG-IP system as a full proxy device in an application delivery network&lt;/li&gt;&lt;li&gt;Provision the F5 Advanced Web Application Firewall&lt;/li&gt;&lt;li&gt;Define a web application firewall&lt;/li&gt;&lt;li&gt;Describe how F5 Advanced Web Application Firewall protects a web application by securing file types, URLs, and parameters&lt;/li&gt;&lt;li&gt;Deploy F5 Advanced Web Application Firewall using the Rapid Deployment template (and other templates) and define the security checks included in each&lt;/li&gt;&lt;li&gt;Define learn, alarm, and block settings as they pertain to configuring F5 Advanced Web Application Firewall&lt;/li&gt;&lt;li&gt;Define attack signatures and explain why attack signature staging is important&lt;/li&gt;&lt;li&gt;Deploy Threat Campaigns to secure against CVE threats&lt;/li&gt;&lt;li&gt;Contrast positive and negative security policy implementation and explain benefits of each&lt;/li&gt;&lt;li&gt;Configure security processing at the parameter level of a web application&lt;/li&gt;&lt;li&gt;Deploy F5 Advanced Web Application Firewall using the Automatic Policy Builder&lt;/li&gt;&lt;li&gt;Tune a policy manually or allow automatic policy building&lt;/li&gt;&lt;li&gt;Integrate third party application vulnerability scanner output into a security policy&lt;/li&gt;&lt;li&gt;Configure login enforcement for flow control&lt;/li&gt;&lt;li&gt;Mitigate credential stuffing&lt;/li&gt;&lt;li&gt;Configure protection against brute force attacks&lt;/li&gt;&lt;li&gt;Deploy Advanced Bot Defense against web scrapers, all known bots, and other automated agents&lt;/li&gt;&lt;li&gt;Deploy DataSafe to secure client-side data&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;Prerequisite &amp;ndash; Students must complete ONE of these: &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Attend an &lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/f5networks-trg-big-op-admin&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Administering BIG-IP &lt;span class=&quot;fl-prod-pcode&quot;&gt;(TRG-BIG-OP-ADMIN)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt; class&lt;/li&gt;&lt;li&gt;Achieve F5 Certified BIG-IP Administrator certification&lt;/li&gt;&lt;li&gt;Pass the free Administering BIG-IP Course Equivalency Assessment with a score of 70% or higher&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course: &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;OSI model encapsulation&lt;/li&gt;&lt;li&gt;Routing and switching&lt;/li&gt;&lt;li&gt;Ethernet and ARP&lt;/li&gt;&lt;li&gt;TCP/IP concepts&lt;/li&gt;&lt;li&gt;IP addressing and subnetting&lt;/li&gt;&lt;li&gt;NAT and private IP addressing&lt;/li&gt;&lt;li&gt;Default gateway&lt;/li&gt;&lt;li&gt;Network firewalls&lt;/li&gt;&lt;li&gt;LAN vs. WAN&lt;/li&gt;&lt;/ul&gt;</essentials><contents>&lt;ul&gt;
&lt;li&gt;Resource provisioning for F5 Advanced Web Application Firewall&lt;/li&gt;&lt;li&gt;Traffic processing with BIG-IP Local Traffic Manager (LTM)&lt;/li&gt;&lt;li&gt;Web application concepts&lt;/li&gt;&lt;li&gt;Mitigating the OWASP Top 10 and other vulnerabilities&lt;/li&gt;&lt;li&gt;Security policy deployment&lt;/li&gt;&lt;li&gt;Security policy tuning&lt;/li&gt;&lt;li&gt;Deploying Attack Signatures and Threat Campaigns&lt;/li&gt;&lt;li&gt;Positive security building&lt;/li&gt;&lt;li&gt;Securing cookies and other headers&lt;/li&gt;&lt;li&gt;Reporting and logging&lt;/li&gt;&lt;li&gt;Advanced parameter handling&lt;/li&gt;&lt;li&gt;Using Automatic Policy Builder&lt;/li&gt;&lt;li&gt;Integrating with web vulnerability scanners&lt;/li&gt;&lt;li&gt;Login enforcement for flow control&lt;/li&gt;&lt;li&gt;Brute force and credential stuffing mitigation&lt;/li&gt;&lt;li&gt;Session tracking for client reconnaissance&lt;/li&gt;&lt;li&gt;Using Parent and Child policies&lt;/li&gt;&lt;li&gt;Layer 7 DoS protection&lt;/li&gt;&lt;li&gt;Transaction Per Second-based DoS protection&lt;/li&gt;&lt;li&gt;Layer 7 Behavioral DoS Protection&lt;/li&gt;&lt;li&gt;Configuring Advanced Bot Defense&lt;/li&gt;&lt;li&gt;Web Scraping and other Microservice Protection&lt;/li&gt;&lt;li&gt;Working with Bot Signatures&lt;/li&gt;&lt;li&gt;Using DataSafe to Secure the client side of the Document Object Model&lt;/li&gt;&lt;li&gt;Certification&lt;/li&gt;&lt;li&gt;303 ASM Specialist&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;h5&gt;Chapter 1: Setting Up the BIG-IP System&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introducing the BIG-IP System&lt;/li&gt;&lt;li&gt;Initially Setting Up the BIG-IP System&lt;/li&gt;&lt;li&gt;Archiving the BIG-IP System Configuration&lt;/li&gt;&lt;li&gt;Leveraging F5 Support Resources and Tools&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 2: Traffic Processing with BIG-IP&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Identifying BIG-IP Traffic Processing Objects&lt;/li&gt;&lt;li&gt;Understanding Profiles&lt;/li&gt;&lt;li&gt;Overview of Local Traffic Policies&lt;/li&gt;&lt;li&gt;Visualizing the HTTP Request Flow&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 3: Web Application Concepts&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Overview of Web Application Request Processing&lt;/li&gt;&lt;li&gt;Web Application Firewall: Layer 7 Protection&lt;/li&gt;&lt;li&gt;Layer 7 Security Checks&lt;/li&gt;&lt;li&gt;Overview of Web Communication Elements&lt;/li&gt;&lt;li&gt;Overview of the HTTP Request Structure&lt;/li&gt;&lt;li&gt;Examining HTTP Responses&lt;/li&gt;&lt;li&gt;How F5 Advanced WAF Parses File Types, URLs, and Parameters&lt;/li&gt;&lt;li&gt;Using the Fiddler HTTP Proxy&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 4: Web Application Vulnerabilities&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;A Taxonomy of Attacks: The Threat Landscape&lt;/li&gt;&lt;li&gt;Common Exploits Against Web Applications&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 5: Security Policy Deployment&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Defining Learning&lt;/li&gt;&lt;li&gt;Comparing Positive and Negative Security Models&lt;/li&gt;&lt;li&gt;The Deployment Workflow&lt;/li&gt;&lt;li&gt;Assigning Policy to Virtual Server&lt;/li&gt;&lt;li&gt;Deployment Workflow: Using Advanced Settings&lt;/li&gt;&lt;li&gt;Configure Server Technologies&lt;/li&gt;&lt;li&gt;Defining Attack Signatures&lt;/li&gt;&lt;li&gt;Viewing Requests&lt;/li&gt;&lt;li&gt;Security Checks Offered by Rapid Deployment&lt;/li&gt;&lt;li&gt;Defining Attack Signatures&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 6: Policy Tuning and Violations&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Post-Deployment Traffic Processing&lt;/li&gt;&lt;li&gt;How Violations are Categorized&lt;/li&gt;&lt;li&gt;Violation Rating: A Threat Scale&lt;/li&gt;&lt;li&gt;Defining Staging and Enforcement&lt;/li&gt;&lt;li&gt;Defining Enforcement Mode&lt;/li&gt;&lt;li&gt;Defining the Enforcement Readiness Period&lt;/li&gt;&lt;li&gt;Reviewing the Definition of Learning&lt;/li&gt;&lt;li&gt;Defining Learning Suggestions&lt;/li&gt;&lt;li&gt;Choosing Automatic or Manual Learning&lt;/li&gt;&lt;li&gt;Defining the Learn, Alarm and Block Settings&lt;/li&gt;&lt;li&gt;Interpreting the Enforcement Readiness Summary&lt;/li&gt;&lt;li&gt;Configuring the Blocking Response Page&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 7: Attack Signatures and Threat Campaigns&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Defining Attack Signatures&lt;/li&gt;&lt;li&gt;Attack Signature Basics&lt;/li&gt;&lt;li&gt;Creating User-Defined Attack Signatures&lt;/li&gt;&lt;li&gt;Defining Simple and Advanced Edit Modes&lt;/li&gt;&lt;li&gt;Defining Attack Signature Sets&lt;/li&gt;&lt;li&gt;Defining Attack Signature Pools&lt;/li&gt;&lt;li&gt;Understanding Attack Signatures and Staging&lt;/li&gt;&lt;li&gt;Updating Attack Signatures&lt;/li&gt;&lt;li&gt;Defining Threat Campaigns&lt;/li&gt;&lt;li&gt;Deploying Threat Campaigns&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 8: Positive Security Policy Building&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Defining and Learning Security Policy Components&lt;/li&gt;&lt;li&gt;Defining the Wildcard&lt;/li&gt;&lt;li&gt;Defining the Entity Lifecycle&lt;/li&gt;&lt;li&gt;Choosing the Learning Scheme&lt;/li&gt;&lt;li&gt;How to Learn: Never (Wildcard Only)&lt;/li&gt;&lt;li&gt;How to Learn: Always&lt;/li&gt;&lt;li&gt;How to Learn: Selective&lt;/li&gt;&lt;li&gt;Reviewing the Enforcement Readiness Period: Entities&lt;/li&gt;&lt;li&gt;Viewing Learning Suggestions and Staging Status&lt;/li&gt;&lt;li&gt;Defining the Learning Score&lt;/li&gt;&lt;li&gt;Defining Trusted and Untrusted IP Addresses&lt;/li&gt;&lt;li&gt;How to Learn: Compact&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 9: Securing Cookies and Other Headers&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;The Purpose of F5 Advanced WAF Cookies&lt;/li&gt;&lt;li&gt;Defining Allowed and Enforced Cookies&lt;/li&gt;&lt;li&gt;Securing HTTP headers&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 10: Visual Reporting and Logging&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Viewing Application Security Summary Data&lt;/li&gt;&lt;li&gt;Reporting: Build Your Own View&lt;/li&gt;&lt;li&gt;Reporting: Chart based on filters&lt;/li&gt;&lt;li&gt;Brute Force and Web Scraping Statistics&lt;/li&gt;&lt;li&gt;Viewing Resource Reports&lt;/li&gt;&lt;li&gt;PCI Compliance: PCI-DSS 3.0&lt;/li&gt;&lt;li&gt;Analyzing Requests&lt;/li&gt;&lt;li&gt;Local Logging Facilities and Destinations&lt;/li&gt;&lt;li&gt;Viewing Logs in the Configuration Utility&lt;/li&gt;&lt;li&gt;Defining the Logging Profile&lt;/li&gt;&lt;li&gt;Configuring Response Logging&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 11: Lab Project 1&lt;/h5&gt;&lt;h5&gt;Chapter 12: Advanced Parameter Handling&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Defining Parameter Types&lt;/li&gt;&lt;li&gt;Defining Static Parameters&lt;/li&gt;&lt;li&gt;Defining Dynamic Parameters&lt;/li&gt;&lt;li&gt;Defining Parameter Levels&lt;/li&gt;&lt;li&gt;Other Parameter Considerations&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 13: Automatic Policy Building&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Overview of Automatic Policy Building&lt;/li&gt;&lt;li&gt;Defining Templates Which Automate Learning&lt;/li&gt;&lt;li&gt;Defining Policy Loosening&lt;/li&gt;&lt;li&gt;Defining Policy Tightening&lt;/li&gt;&lt;li&gt;Defining Learning Speed: Traffic Sampling&lt;/li&gt;&lt;li&gt;Defining Track Site Changes&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 14: Web Application Vulnerability Scanner Integration&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Integrating Scanner Output&lt;/li&gt;&lt;li&gt;Importing Vulnerabilities&lt;/li&gt;&lt;li&gt;Resolving Vulnerabilities&lt;/li&gt;&lt;li&gt;Using the Generic XML Scanner XSD file&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 15: Deploying Layered Policies&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Defining a Parent Policy&lt;/li&gt;&lt;li&gt;Defining Inheritance&lt;/li&gt;&lt;li&gt;Parent Policy Deployment Use Cases&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 16: Login Enforcement and Brute Force Mitigation&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Defining Login Pages for Flow Control&lt;/li&gt;&lt;li&gt;Configuring Automatic Detection of Login Pages&lt;/li&gt;&lt;li&gt;Defining Brute Force Attacks&lt;/li&gt;&lt;li&gt;Brute Force Protection Configuration&lt;/li&gt;&lt;li&gt;Source-Based Brute Force Mitigations&lt;/li&gt;&lt;li&gt;Defining Credential Stuffing&lt;/li&gt;&lt;li&gt;Mitigating Credential Stuffing&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 17: Reconnaissance with Session Tracking&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Defining Session Tracking&lt;/li&gt;&lt;li&gt;Configuring Actions Upon Violation Detection&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 18: Layer 7 DoS Mitigation&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Defining Denial of Service Attacks&lt;/li&gt;&lt;li&gt;Defining the DoS Protection Profile&lt;/li&gt;&lt;li&gt;Overview of TPS-based DoS Protection&lt;/li&gt;&lt;li&gt;Creating a DoS Logging Profile&lt;/li&gt;&lt;li&gt;Applying TPS Mitigations&lt;/li&gt;&lt;li&gt;Defining Behavioral and Stress-Based Detection&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 19: Advanced Bot Defense&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Classifying Clients with the Bot Defense Profile&lt;/li&gt;&lt;li&gt;Defining Bot Signatures&lt;/li&gt;&lt;li&gt;Defining F5 Fingerprinting&lt;/li&gt;&lt;li&gt;Defining Bot Defense Profile Templates&lt;/li&gt;&lt;li&gt;Defining Microservices protection&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 20: Form Encryption using DataSafe&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Targeting Elements of Application Delivery&lt;/li&gt;&lt;li&gt;Exploiting the Document Object Model&lt;/li&gt;&lt;li&gt;Protecting Applications Using DataSafe&lt;/li&gt;&lt;li&gt;The Order of Operations for URL Classification&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Chapter 21: Review and Final Labs&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Final Lab Project (Option 1) &amp;ndash; Production Scenario&lt;/li&gt;&lt;li&gt;Final Lab Project (Option 2) &amp;ndash; Managing Traffic with Layer 7 Local Traffic Policies&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>- Students should be able to:
- Describe the role of the BIG-IP system as a full proxy device in an application delivery network
- Provision the F5 Advanced Web Application Firewall
- Define a web application firewall
- Describe how F5 Advanced Web Application Firewall protects a web application by securing file types, URLs, and parameters
- Deploy F5 Advanced Web Application Firewall using the Rapid Deployment template (and other templates) and define the security checks included in each
- Define learn, alarm, and block settings as they pertain to configuring F5 Advanced Web Application Firewall
- Define attack signatures and explain why attack signature staging is important
- Deploy Threat Campaigns to secure against CVE threats
- Contrast positive and negative security policy implementation and explain benefits of each
- Configure security processing at the parameter level of a web application
- Deploy F5 Advanced Web Application Firewall using the Automatic Policy Builder
- Tune a policy manually or allow automatic policy building
- Integrate third party application vulnerability scanner output into a security policy
- Configure login enforcement for flow control
- Mitigate credential stuffing
- Configure protection against brute force attacks
- Deploy Advanced Bot Defense against web scrapers, all known bots, and other automated agents
- Deploy DataSafe to secure client-side data</objective_plain><essentials_plain>Prerequisite – Students must complete ONE of these: 


- Attend an Administering BIG-IP (TRG-BIG-OP-ADMIN) class
- Achieve F5 Certified BIG-IP Administrator certification
- Pass the free Administering BIG-IP Course Equivalency Assessment with a score of 70% or higher
The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course: 


- OSI model encapsulation
- Routing and switching
- Ethernet and ARP
- TCP/IP concepts
- IP addressing and subnetting
- NAT and private IP addressing
- Default gateway
- Network firewalls
- LAN vs. WAN</essentials_plain><contents_plain>- Resource provisioning for F5 Advanced Web Application Firewall
- Traffic processing with BIG-IP Local Traffic Manager (LTM)
- Web application concepts
- Mitigating the OWASP Top 10 and other vulnerabilities
- Security policy deployment
- Security policy tuning
- Deploying Attack Signatures and Threat Campaigns
- Positive security building
- Securing cookies and other headers
- Reporting and logging
- Advanced parameter handling
- Using Automatic Policy Builder
- Integrating with web vulnerability scanners
- Login enforcement for flow control
- Brute force and credential stuffing mitigation
- Session tracking for client reconnaissance
- Using Parent and Child policies
- Layer 7 DoS protection
- Transaction Per Second-based DoS protection
- Layer 7 Behavioral DoS Protection
- Configuring Advanced Bot Defense
- Web Scraping and other Microservice Protection
- Working with Bot Signatures
- Using DataSafe to Secure the client side of the Document Object Model
- Certification
- 303 ASM Specialist</contents_plain><outline_plain>Chapter 1: Setting Up the BIG-IP System


- Introducing the BIG-IP System
- Initially Setting Up the BIG-IP System
- Archiving the BIG-IP System Configuration
- Leveraging F5 Support Resources and Tools
Chapter 2: Traffic Processing with BIG-IP


- Identifying BIG-IP Traffic Processing Objects
- Understanding Profiles
- Overview of Local Traffic Policies
- Visualizing the HTTP Request Flow
Chapter 3: Web Application Concepts


- Overview of Web Application Request Processing
- Web Application Firewall: Layer 7 Protection
- Layer 7 Security Checks
- Overview of Web Communication Elements
- Overview of the HTTP Request Structure
- Examining HTTP Responses
- How F5 Advanced WAF Parses File Types, URLs, and Parameters
- Using the Fiddler HTTP Proxy
Chapter 4: Web Application Vulnerabilities


- A Taxonomy of Attacks: The Threat Landscape
- Common Exploits Against Web Applications
Chapter 5: Security Policy Deployment


- Defining Learning
- Comparing Positive and Negative Security Models
- The Deployment Workflow
- Assigning Policy to Virtual Server
- Deployment Workflow: Using Advanced Settings
- Configure Server Technologies
- Defining Attack Signatures
- Viewing Requests
- Security Checks Offered by Rapid Deployment
- Defining Attack Signatures
Chapter 6: Policy Tuning and Violations


- Post-Deployment Traffic Processing
- How Violations are Categorized
- Violation Rating: A Threat Scale
- Defining Staging and Enforcement
- Defining Enforcement Mode
- Defining the Enforcement Readiness Period
- Reviewing the Definition of Learning
- Defining Learning Suggestions
- Choosing Automatic or Manual Learning
- Defining the Learn, Alarm and Block Settings
- Interpreting the Enforcement Readiness Summary
- Configuring the Blocking Response Page
Chapter 7: Attack Signatures and Threat Campaigns


- Defining Attack Signatures
- Attack Signature Basics
- Creating User-Defined Attack Signatures
- Defining Simple and Advanced Edit Modes
- Defining Attack Signature Sets
- Defining Attack Signature Pools
- Understanding Attack Signatures and Staging
- Updating Attack Signatures
- Defining Threat Campaigns
- Deploying Threat Campaigns
Chapter 8: Positive Security Policy Building


- Defining and Learning Security Policy Components
- Defining the Wildcard
- Defining the Entity Lifecycle
- Choosing the Learning Scheme
- How to Learn: Never (Wildcard Only)
- How to Learn: Always
- How to Learn: Selective
- Reviewing the Enforcement Readiness Period: Entities
- Viewing Learning Suggestions and Staging Status
- Defining the Learning Score
- Defining Trusted and Untrusted IP Addresses
- How to Learn: Compact
Chapter 9: Securing Cookies and Other Headers


- The Purpose of F5 Advanced WAF Cookies
- Defining Allowed and Enforced Cookies
- Securing HTTP headers
Chapter 10: Visual Reporting and Logging


- Viewing Application Security Summary Data
- Reporting: Build Your Own View
- Reporting: Chart based on filters
- Brute Force and Web Scraping Statistics
- Viewing Resource Reports
- PCI Compliance: PCI-DSS 3.0
- Analyzing Requests
- Local Logging Facilities and Destinations
- Viewing Logs in the Configuration Utility
- Defining the Logging Profile
- Configuring Response Logging
Chapter 11: Lab Project 1

Chapter 12: Advanced Parameter Handling


- Defining Parameter Types
- Defining Static Parameters
- Defining Dynamic Parameters
- Defining Parameter Levels
- Other Parameter Considerations
Chapter 13: Automatic Policy Building


- Overview of Automatic Policy Building
- Defining Templates Which Automate Learning
- Defining Policy Loosening
- Defining Policy Tightening
- Defining Learning Speed: Traffic Sampling
- Defining Track Site Changes
Chapter 14: Web Application Vulnerability Scanner Integration


- Integrating Scanner Output
- Importing Vulnerabilities
- Resolving Vulnerabilities
- Using the Generic XML Scanner XSD file
Chapter 15: Deploying Layered Policies


- Defining a Parent Policy
- Defining Inheritance
- Parent Policy Deployment Use Cases
Chapter 16: Login Enforcement and Brute Force Mitigation


- Defining Login Pages for Flow Control
- Configuring Automatic Detection of Login Pages
- Defining Brute Force Attacks
- Brute Force Protection Configuration
- Source-Based Brute Force Mitigations
- Defining Credential Stuffing
- Mitigating Credential Stuffing
Chapter 17: Reconnaissance with Session Tracking


- Defining Session Tracking
- Configuring Actions Upon Violation Detection
Chapter 18: Layer 7 DoS Mitigation


- Defining Denial of Service Attacks
- Defining the DoS Protection Profile
- Overview of TPS-based DoS Protection
- Creating a DoS Logging Profile
- Applying TPS Mitigations
- Defining Behavioral and Stress-Based Detection
Chapter 19: Advanced Bot Defense


- Classifying Clients with the Bot Defense Profile
- Defining Bot Signatures
- Defining F5 Fingerprinting
- Defining Bot Defense Profile Templates
- Defining Microservices protection
Chapter 20: Form Encryption using DataSafe


- Targeting Elements of Application Delivery
- Exploiting the Document Object Model
- Protecting Applications Using DataSafe
- The Order of Operations for URL Classification
Chapter 21: Review and Final Labs


- Final Lab Project (Option 1) – Production Scenario
- Final Lab Project (Option 2) – Managing Traffic with Layer 7 Local Traffic Policies</outline_plain><duration unit="d" days="4">4 days</duration><pricelist><price country="NL" currency="EUR">3800.00</price><price country="BE" currency="EUR">3800.00</price><price country="IT" currency="EUR">3800.00</price><price country="GB" currency="GBP">3280.00</price><price country="FR" currency="EUR">3800.00</price><price country="DE" currency="USD">5280.00</price><price country="CH" currency="USD">5280.00</price><price country="AT" currency="USD">5280.00</price></pricelist><miles/></course>