<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="20055" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/f5networks-trg-big-awf-su1" lastchanged="2025-10-09T16:13:30+02:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>Setting up F5 Advanced WAF</title><productcode>TRG-BIG-AWF-SU1</productcode><vendorcode>F5</vendorcode><vendorname>F5 Networks</vendorname><fullproductcode>F5-TRG-BIG-AWF-SU1</fullproductcode><version>14.1</version><objective>&lt;ul&gt;
&lt;li&gt;Provision resources for F5 Advanced Web Application Firewall&lt;/li&gt;&lt;li&gt;Rapidly deploy a security policy using the Guided Configuration&lt;/li&gt;&lt;li&gt;Configure learn, alarm, and block settings to ensure valid users can access your application&lt;/li&gt;&lt;li&gt;Define attack signatures&lt;/li&gt;&lt;li&gt;Contrast positive and negative security policy implementation&lt;/li&gt;&lt;li&gt;Review learning suggestions for policy tuning&lt;/li&gt;&lt;li&gt;Mitigate Credentials Stuffing attacks&lt;/li&gt;&lt;li&gt;Secure a URL from client-side fraud using DataSafe encryption and obfuscation&lt;/li&gt;&lt;li&gt;Use the automated L7 Behavioral Denial of Service feature to detect and mitigate DoS attacks&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;There are no F5-technology-specific prerequisites for this course. However, completing the following before attending would be very helpful for students with limited BIG-IP administration and configuration experience:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span class=&quot;cms-link-marked&quot;&gt;&lt;a class=&quot;fl-href-prod&quot; href=&quot;/swisscom/en/course/f5networks-trg-big-op-admin&quot;&gt;&lt;svg role=&quot;img&quot; aria-hidden=&quot;true&quot; focusable=&quot;false&quot; data-nosnippet class=&quot;cms-linkmark&quot;&gt;&lt;use xlink:href=&quot;/css/img/icnset-linkmarks.svg#linkmark&quot;&gt;&lt;/use&gt;&lt;/svg&gt;Administering BIG-IP &lt;span class=&quot;fl-prod-pcode&quot;&gt;(TRG-BIG-OP-ADMIN)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;or&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;F5 Certified BIG-IP Administrator&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;OSI model encapsulation&lt;/li&gt;&lt;li&gt;Routing and switching&lt;/li&gt;&lt;li&gt;Ethernet and ARP&lt;/li&gt;&lt;li&gt;TCP/IP concepts&lt;/li&gt;&lt;li&gt;IP addressing and subnetting&lt;/li&gt;&lt;li&gt;NAT and private IP addressing&lt;/li&gt;&lt;li&gt;Default gateway&lt;/li&gt;&lt;li&gt;Network firewalls&lt;/li&gt;&lt;li&gt;LAN vs. WAN&lt;/li&gt;&lt;/ul&gt;</essentials><contents>&lt;ul&gt;
&lt;li&gt;Differentiating between client-side and application-side web vulnerabilities&lt;/li&gt;&lt;li&gt;Categorizing Attack Techniques&lt;/li&gt;&lt;li&gt;Use the Guided Configuration to deploy a Web Application Security Policy&lt;/li&gt;&lt;li&gt;Defining the key parts of a Web Application Security Policy&lt;/li&gt;&lt;li&gt;Understanding request logging options&lt;/li&gt;&lt;li&gt;Identifying HTTP headers and methods&lt;/li&gt;&lt;li&gt;Defining attack signatures, attack signature staging, and violations&lt;/li&gt;&lt;li&gt;Overview of the OWASP Top Ten&lt;/li&gt;&lt;/ul&gt;</contents><objective_plain>- Provision resources for F5 Advanced Web Application Firewall
- Rapidly deploy a security policy using the Guided Configuration
- Configure learn, alarm, and block settings to ensure valid users can access your application
- Define attack signatures
- Contrast positive and negative security policy implementation
- Review learning suggestions for policy tuning
- Mitigate Credentials Stuffing attacks
- Secure a URL from client-side fraud using DataSafe encryption and obfuscation
- Use the automated L7 Behavioral Denial of Service feature to detect and mitigate DoS attacks</objective_plain><essentials_plain>There are no F5-technology-specific prerequisites for this course. However, completing the following before attending would be very helpful for students with limited BIG-IP administration and configuration experience:


- Administering BIG-IP (TRG-BIG-OP-ADMIN)
or


- F5 Certified BIG-IP Administrator
The following general network technology knowledge and experience are recommended before attending any F5 Global Training Services instructor-led course:


- OSI model encapsulation
- Routing and switching
- Ethernet and ARP
- TCP/IP concepts
- IP addressing and subnetting
- NAT and private IP addressing
- Default gateway
- Network firewalls
- LAN vs. WAN</essentials_plain><contents_plain>- Differentiating between client-side and application-side web vulnerabilities
- Categorizing Attack Techniques
- Use the Guided Configuration to deploy a Web Application Security Policy
- Defining the key parts of a Web Application Security Policy
- Understanding request logging options
- Identifying HTTP headers and methods
- Defining attack signatures, attack signature staging, and violations
- Overview of the OWASP Top Ten</contents_plain><duration unit="d" days="1">1 day</duration><pricelist><price country="DE" currency="USD">1100.00</price><price country="CH" currency="USD">1100.00</price><price country="AT" currency="USD">1100.00</price></pricelist><miles/></course>