{"course":{"productid":33955,"modality":6,"active":true,"language":"de","title":"Securing Applications and APIs with F5 Distributed Cloud Services","productcode":"XC-WAAP","vendorcode":"F5","vendorname":"F5 Networks","fullproductcode":"F5-XC-WAAP","courseware":{"has_ekit":false,"has_printkit":true,"language":""},"url":"https:\/\/portal.flane.ch\/course\/f5networks-xc-waap","objective":"<p>By the end of this course, you will be able to:   <\/p>\n<ul>\n<li>Deploy and manage F5XC WAAP to mitigate the OWASP Top 10 - via WAF Policy and via Service Policy<\/li><li>Deploy F5XC WAAP to mitigate bot traffic<\/li><li>Deploy F5XC WAAP to mitigate DDoS attacks at layers 3, 4, and 7<\/li><li>Use F5XC WAAP to automatically discover and secure APIs<\/li><\/ul>","essentials":"<p>Administering Applications in F5 Distributed Cloud Services<\/p>","audience":"<p>The course is designed for DevOps, SecOps, NetOps, and application developers who have foundational knowledge of F5 Distributed Cloud services.<\/p>","contents":"<ul>\n<li>Module 1: Introduction to Distributed Cloud WAAP and WAF Deployment<\/li><li>Module 2: Setting the Stage: Analyzing Web Applications and HTTP<\/li><li>Module 3: Exploiting Web Application Vulnerabilities<\/li><li>Module 4: Mitigating Threats with Web Application Firewall Policies<\/li><li>Module 5: Manage Security Events with Exclusion Rules<\/li><li>Module 6: Mitigating Threats with Service Policies<\/li><li>Module 7: Bot Defense<\/li><li>Module 8: Mitigate Threats using Machine Learning and Artificial Intelligence<\/li><li>Module 9: Protecting Your Public APIs<\/li><li>Module 10: API Automation using Postman<\/li><\/ul>","outline":"<h5>Intro<\/h5><ul>\n<li>Overview of how F5XC WAAP protects web apps in any cloud, edge, or on-premises environment<\/li><li>Defining the core features: WAF, bot defense, DDoS protection, and securing APIs<\/li><\/ul><h5>Module 1: Introduction to Distributed Cloud WAAP and WAF Deployment<\/h5><ul>\n<li>Exploring the security flow through application proxy<\/li><li>Lab: Deploy Juice Shop (target application) on an HTTP load balancer and configure API endpoint discover\n<ul>\n<li>Create load balancer and connect origin pool to expose Juice Shop application<\/li><li>Enable API discovery (so that we can discuss API protection and have ready examples)<\/li><li>Run some traffic and review request log<\/li><\/ul><\/li><\/ul><h5>Module 2: Setting the Stage: Analyzing Web Applications and HTTP<\/h5><ul>\n<li>Overview of web application communication elements<\/li><li>Overview of HTTP message structure (headers and methods)<\/li><li>Parsing HTTP requests<\/li><li>Lab: Exploring the target application<\/li><\/ul><h5>Module 3: Exploiting Web Application Vulnerabilities<\/h5><ul>\n<li>A taxonomy of attacks: the threat landscape<\/li><li>Common exploits against web applications (OWASP Top 10, OWASP API)<\/li><li>Lab: Exploiting web application vulnerabilities\n<ul>\n<li>SQL injection<\/li><li>Cross-site scripting<\/li><li>Poison byte<\/li><li>Forceful browsing<\/li><\/ul><\/li><\/ul><h5>Module 4: Mitigating Threats with Web Application Firewall Policies<\/h5><ul>\n<li>Defining web application firewall processing at layer 7<\/li><li>Applying different protections to a load balancer<\/li><li>Defining violations and false positives<\/li><li>Reviewing RFC 2616 as it drives protocol compliance<\/li><li>Differentiating positive and negative security<\/li><li>Differentiating blocking and monitoring actions<\/li><li>Reviewing security event logging<\/li><li>Defining Threat Campaigns<\/li><li>Defining Attack Signatures<\/li><li>Lab: Create App Firewall, enable blocking mode, attach to load balancer\n<ul>\n<li>Lab: Launch XSS attack and observe security processing in the log<\/li><li>Lab: Launch SQL injection attack and observe security processing in the log<\/li><li>Lab: Launch poison null byte attack and observe security processing in the log<\/li><\/ul><\/li><\/ul><h5>Module 5: Manage Security Events with Exclusion Rules<\/h5><ul>\n<li>Defining exclusion rules<\/li><li>Analyzing elements and contexts of exclusion rules<\/li><li>Lab: Create an Exclusion Rule for Two Attack Signature IDs<\/li><\/ul><h5>Module 6: Mitigating Threats with Service Policies<\/h5><ul>\n<li>Differentiating protections at namespace vs. load balancer levels<\/li><li>Exploring service policy rules, policies, and policy sets<\/li><li>Handling traffic flow<\/li><li>Enforcing layer 7 elements of HTTP processing<\/li><li>Lab: Practicing service policy protections for geolocation enforcement, file types enforcement, method and path enforcement, and IP address enforcement.<\/li><\/ul><h5>Module 7: Bot Defense<\/h5><ul>\n<li>Classifying and categorizing bots (good\/suspicious\/malicious)<\/li><li>Reviewing bot signatures<\/li><li>Configuring bot defense on the XC load balancer<\/li><li>Lab: Mitigating an attack from an automated agent (python scripts for bad traffic and credential stuffing\/brute force)<\/li><\/ul><h5>Module 8: Mitigate Threats using Machine Learning and Artificial Intelligence<\/h5><ul>\n<li>Defining Malicious User Detection\n<ul>\n<li>TLS fingerprinting<\/li><li>JavaScript challenges\/client side defense<\/li><\/ul><\/li><li>Lab: Deploying Machine Learning<\/li><\/ul><h5>Module 9: Protecting Your Public APIs<\/h5><ul>\n<li>Defining an API<\/li><li>Defining API specifications<\/li><li>Defining a RESTful API<\/li><li>Recognizing API endpoints<\/li><li>Defining Shadow APIs<\/li><li>Defining OpenAPI 3.0 and the Swagger specification<\/li><li>Analyzing API routing in F5XC<\/li><li>Analyzing API protection in F5XC\n<ul>\n<li>App firewall (OWASP vulnerabilities)<\/li><li>CAPTCHA\/JS challenges<\/li><li>Network firewall<\/li><li>API usage characterizations<\/li><li>User anomaly detection<\/li><li>API rate limiting (threshold configuration)<\/li><li>API Learning<\/li><\/ul><\/li><li>Endpoint learning<\/li><li>Schema learning<\/li><li>Behavioral firewall\/business logic markup<\/li><li>Lab: Machine Learning Lab\n<ul>\n<li>Review discovered APIs<\/li><li>Configure malicious users mitigation<\/li><li>Configure user identification<\/li><li>Configure load balancer<\/li><li>Test XSS (without WAF policy)<\/li><\/ul><\/li><\/ul><h5>Module 10: API Automation using Postman<\/h5><ul>\n<li>Introduction to Postman\n<ul>\n<li>Defining environments<\/li><li>Defining collections<\/li><li>Reviewing variables<\/li><\/ul><\/li><li>Lab: Use a postman collection to create a WAF policy for a namespace<\/li><li>Lab: Use a postman collection to create service policies for a shared namespace<\/li><\/ul>","summary":"<p>Tentatively named &quot;Protecting Web Applications and APIs with F5 Distributed Cloud WAAP&quot; this is a security course covering all major web application firewall, bot defense, DoS protection, and API discovery\/protection components offered through the XC WAAP console with the exception of SOC- based DoS protection. The course explores the header and method elements of HTTP which must be recognized to configure protection from external client vectors. Students will exploit vulnerabilities in the target application in before-and-after learning scenarios.  Major topics are web application firewall policies, attack signatures, threat campaigns, and differentiation between positive and negative security. We will address handling violations, false positives, and how to manage security events with exclusion rules. The course then takes a deep dive into controlling HTTP request flows at layer 7 with service policies. We will configure bot defense and threat mitigation using machine learning and artificial intelligence. Additional topics include discovery of public API endpoints and securing those endpoints. The course wraps up with API automation using Postman environments, collections, and variables.<\/p>","objective_plain":"By the end of this course, you will be able to:   \n\n\n- Deploy and manage F5XC WAAP to mitigate the OWASP Top 10 - via WAF Policy and via Service Policy\n- Deploy F5XC WAAP to mitigate bot traffic\n- Deploy F5XC WAAP to mitigate DDoS attacks at layers 3, 4, and 7\n- Use F5XC WAAP to automatically discover and secure APIs","essentials_plain":"Administering Applications in F5 Distributed Cloud Services","audience_plain":"The course is designed for DevOps, SecOps, NetOps, and application developers who have foundational knowledge of F5 Distributed Cloud services.","contents_plain":"- Module 1: Introduction to Distributed Cloud WAAP and WAF Deployment\n- Module 2: Setting the Stage: Analyzing Web Applications and HTTP\n- Module 3: Exploiting Web Application Vulnerabilities\n- Module 4: Mitigating Threats with Web Application Firewall Policies\n- Module 5: Manage Security Events with Exclusion Rules\n- Module 6: Mitigating Threats with Service Policies\n- Module 7: Bot Defense\n- Module 8: Mitigate Threats using Machine Learning and Artificial Intelligence\n- Module 9: Protecting Your Public APIs\n- Module 10: API Automation using Postman","outline_plain":"Intro\n\n\n- Overview of how F5XC WAAP protects web apps in any cloud, edge, or on-premises environment\n- Defining the core features: WAF, bot defense, DDoS protection, and securing APIs\nModule 1: Introduction to Distributed Cloud WAAP and WAF Deployment\n\n\n- Exploring the security flow through application proxy\n- Lab: Deploy Juice Shop (target application) on an HTTP load balancer and configure API endpoint discover\n\n- Create load balancer and connect origin pool to expose Juice Shop application\n- Enable API discovery (so that we can discuss API protection and have ready examples)\n- Run some traffic and review request log\nModule 2: Setting the Stage: Analyzing Web Applications and HTTP\n\n\n- Overview of web application communication elements\n- Overview of HTTP message structure (headers and methods)\n- Parsing HTTP requests\n- Lab: Exploring the target application\nModule 3: Exploiting Web Application Vulnerabilities\n\n\n- A taxonomy of attacks: the threat landscape\n- Common exploits against web applications (OWASP Top 10, OWASP API)\n- Lab: Exploiting web application vulnerabilities\n\n- SQL injection\n- Cross-site scripting\n- Poison byte\n- Forceful browsing\nModule 4: Mitigating Threats with Web Application Firewall Policies\n\n\n- Defining web application firewall processing at layer 7\n- Applying different protections to a load balancer\n- Defining violations and false positives\n- Reviewing RFC 2616 as it drives protocol compliance\n- Differentiating positive and negative security\n- Differentiating blocking and monitoring actions\n- Reviewing security event logging\n- Defining Threat Campaigns\n- Defining Attack Signatures\n- Lab: Create App Firewall, enable blocking mode, attach to load balancer\n\n- Lab: Launch XSS attack and observe security processing in the log\n- Lab: Launch SQL injection attack and observe security processing in the log\n- Lab: Launch poison null byte attack and observe security processing in the log\nModule 5: Manage Security Events with Exclusion Rules\n\n\n- Defining exclusion rules\n- Analyzing elements and contexts of exclusion rules\n- Lab: Create an Exclusion Rule for Two Attack Signature IDs\nModule 6: Mitigating Threats with Service Policies\n\n\n- Differentiating protections at namespace vs. load balancer levels\n- Exploring service policy rules, policies, and policy sets\n- Handling traffic flow\n- Enforcing layer 7 elements of HTTP processing\n- Lab: Practicing service policy protections for geolocation enforcement, file types enforcement, method and path enforcement, and IP address enforcement.\nModule 7: Bot Defense\n\n\n- Classifying and categorizing bots (good\/suspicious\/malicious)\n- Reviewing bot signatures\n- Configuring bot defense on the XC load balancer\n- Lab: Mitigating an attack from an automated agent (python scripts for bad traffic and credential stuffing\/brute force)\nModule 8: Mitigate Threats using Machine Learning and Artificial Intelligence\n\n\n- Defining Malicious User Detection\n\n- TLS fingerprinting\n- JavaScript challenges\/client side defense\n- Lab: Deploying Machine Learning\nModule 9: Protecting Your Public APIs\n\n\n- Defining an API\n- Defining API specifications\n- Defining a RESTful API\n- Recognizing API endpoints\n- Defining Shadow APIs\n- Defining OpenAPI 3.0 and the Swagger specification\n- Analyzing API routing in F5XC\n- Analyzing API protection in F5XC\n\n- App firewall (OWASP vulnerabilities)\n- CAPTCHA\/JS challenges\n- Network firewall\n- API usage characterizations\n- User anomaly detection\n- API rate limiting (threshold configuration)\n- API Learning\n- Endpoint learning\n- Schema learning\n- Behavioral firewall\/business logic markup\n- Lab: Machine Learning Lab\n\n- Review discovered APIs\n- Configure malicious users mitigation\n- Configure user identification\n- Configure load balancer\n- Test XSS (without WAF policy)\nModule 10: API Automation using Postman\n\n\n- Introduction to Postman\n\n- Defining environments\n- Defining collections\n- Reviewing variables\n- Lab: Use a postman collection to create a WAF policy for a namespace\n- Lab: Use a postman collection to create service policies for a shared namespace","summary_plain":"Tentatively named \"Protecting Web Applications and APIs with F5 Distributed Cloud WAAP\" this is a security course covering all major web application firewall, bot defense, DoS protection, and API discovery\/protection components offered through the XC WAAP console with the exception of SOC- based DoS protection. The course explores the header and method elements of HTTP which must be recognized to configure protection from external client vectors. Students will exploit vulnerabilities in the target application in before-and-after learning scenarios.  Major topics are web application firewall policies, attack signatures, threat campaigns, and differentiation between positive and negative security. We will address handling violations, false positives, and how to manage security events with exclusion rules. The course then takes a deep dive into controlling HTTP request flows at layer 7 with service policies. We will configure bot defense and threat mitigation using machine learning and artificial intelligence. Additional topics include discovery of public API endpoints and securing those endpoints. The course wraps up with API automation using Postman environments, collections, and variables.","skill_level":"Beginner","version":"1.0","duration":{"unit":"d","value":3,"formatted":"3 Tage"},"pricelist":{"List Price":{"GB":{"country":"GB","currency":"GBP","taxrate":20,"price":2460},"SI":{"country":"SI","currency":"EUR","taxrate":20,"price":3630},"DE":{"country":"DE","currency":"USD","taxrate":19,"price":3960},"CH":{"country":"CH","currency":"USD","taxrate":8.1,"price":3960},"AT":{"country":"AT","currency":"USD","taxrate":20,"price":3960}}},"lastchanged":"2025-09-10T08:19:10+02:00","parenturl":"https:\/\/portal.flane.ch\/swisscom\/json-courses","nexturl_course_schedule":"https:\/\/portal.flane.ch\/swisscom\/json-course-schedule\/33955","source_lang":"de","source":"https:\/\/portal.flane.ch\/swisscom\/json-course\/f5networks-xc-waap"}}