<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="33955" language="de" source="https://portal.flane.ch/swisscom/xml-course/f5networks-xc-waap" lastchanged="2025-09-10T08:19:10+02:00" parent="https://portal.flane.ch/swisscom/xml-courses"><title>Securing Applications and APIs with F5 Distributed Cloud Services</title><productcode>XC-WAAP</productcode><vendorcode>F5</vendorcode><vendorname>F5 Networks</vendorname><fullproductcode>F5-XC-WAAP</fullproductcode><version>1.0</version><objective>&lt;p&gt;By the end of this course, you will be able to:   &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Deploy and manage F5XC WAAP to mitigate the OWASP Top 10 - via WAF Policy and via Service Policy&lt;/li&gt;&lt;li&gt;Deploy F5XC WAAP to mitigate bot traffic&lt;/li&gt;&lt;li&gt;Deploy F5XC WAAP to mitigate DDoS attacks at layers 3, 4, and 7&lt;/li&gt;&lt;li&gt;Use F5XC WAAP to automatically discover and secure APIs&lt;/li&gt;&lt;/ul&gt;</objective><essentials>&lt;p&gt;Administering Applications in F5 Distributed Cloud Services&lt;/p&gt;</essentials><audience>&lt;p&gt;The course is designed for DevOps, SecOps, NetOps, and application developers who have foundational knowledge of F5 Distributed Cloud services.&lt;/p&gt;</audience><contents>&lt;ul&gt;
&lt;li&gt;Module 1: Introduction to Distributed Cloud WAAP and WAF Deployment&lt;/li&gt;&lt;li&gt;Module 2: Setting the Stage: Analyzing Web Applications and HTTP&lt;/li&gt;&lt;li&gt;Module 3: Exploiting Web Application Vulnerabilities&lt;/li&gt;&lt;li&gt;Module 4: Mitigating Threats with Web Application Firewall Policies&lt;/li&gt;&lt;li&gt;Module 5: Manage Security Events with Exclusion Rules&lt;/li&gt;&lt;li&gt;Module 6: Mitigating Threats with Service Policies&lt;/li&gt;&lt;li&gt;Module 7: Bot Defense&lt;/li&gt;&lt;li&gt;Module 8: Mitigate Threats using Machine Learning and Artificial Intelligence&lt;/li&gt;&lt;li&gt;Module 9: Protecting Your Public APIs&lt;/li&gt;&lt;li&gt;Module 10: API Automation using Postman&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;h5&gt;Intro&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Overview of how F5XC WAAP protects web apps in any cloud, edge, or on-premises environment&lt;/li&gt;&lt;li&gt;Defining the core features: WAF, bot defense, DDoS protection, and securing APIs&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 1: Introduction to Distributed Cloud WAAP and WAF Deployment&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Exploring the security flow through application proxy&lt;/li&gt;&lt;li&gt;Lab: Deploy Juice Shop (target application) on an HTTP load balancer and configure API endpoint discover
&lt;ul&gt;
&lt;li&gt;Create load balancer and connect origin pool to expose Juice Shop application&lt;/li&gt;&lt;li&gt;Enable API discovery (so that we can discuss API protection and have ready examples)&lt;/li&gt;&lt;li&gt;Run some traffic and review request log&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 2: Setting the Stage: Analyzing Web Applications and HTTP&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Overview of web application communication elements&lt;/li&gt;&lt;li&gt;Overview of HTTP message structure (headers and methods)&lt;/li&gt;&lt;li&gt;Parsing HTTP requests&lt;/li&gt;&lt;li&gt;Lab: Exploring the target application&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 3: Exploiting Web Application Vulnerabilities&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;A taxonomy of attacks: the threat landscape&lt;/li&gt;&lt;li&gt;Common exploits against web applications (OWASP Top 10, OWASP API)&lt;/li&gt;&lt;li&gt;Lab: Exploiting web application vulnerabilities
&lt;ul&gt;
&lt;li&gt;SQL injection&lt;/li&gt;&lt;li&gt;Cross-site scripting&lt;/li&gt;&lt;li&gt;Poison byte&lt;/li&gt;&lt;li&gt;Forceful browsing&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 4: Mitigating Threats with Web Application Firewall Policies&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Defining web application firewall processing at layer 7&lt;/li&gt;&lt;li&gt;Applying different protections to a load balancer&lt;/li&gt;&lt;li&gt;Defining violations and false positives&lt;/li&gt;&lt;li&gt;Reviewing RFC 2616 as it drives protocol compliance&lt;/li&gt;&lt;li&gt;Differentiating positive and negative security&lt;/li&gt;&lt;li&gt;Differentiating blocking and monitoring actions&lt;/li&gt;&lt;li&gt;Reviewing security event logging&lt;/li&gt;&lt;li&gt;Defining Threat Campaigns&lt;/li&gt;&lt;li&gt;Defining Attack Signatures&lt;/li&gt;&lt;li&gt;Lab: Create App Firewall, enable blocking mode, attach to load balancer
&lt;ul&gt;
&lt;li&gt;Lab: Launch XSS attack and observe security processing in the log&lt;/li&gt;&lt;li&gt;Lab: Launch SQL injection attack and observe security processing in the log&lt;/li&gt;&lt;li&gt;Lab: Launch poison null byte attack and observe security processing in the log&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 5: Manage Security Events with Exclusion Rules&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Defining exclusion rules&lt;/li&gt;&lt;li&gt;Analyzing elements and contexts of exclusion rules&lt;/li&gt;&lt;li&gt;Lab: Create an Exclusion Rule for Two Attack Signature IDs&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 6: Mitigating Threats with Service Policies&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Differentiating protections at namespace vs. load balancer levels&lt;/li&gt;&lt;li&gt;Exploring service policy rules, policies, and policy sets&lt;/li&gt;&lt;li&gt;Handling traffic flow&lt;/li&gt;&lt;li&gt;Enforcing layer 7 elements of HTTP processing&lt;/li&gt;&lt;li&gt;Lab: Practicing service policy protections for geolocation enforcement, file types enforcement, method and path enforcement, and IP address enforcement.&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 7: Bot Defense&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Classifying and categorizing bots (good/suspicious/malicious)&lt;/li&gt;&lt;li&gt;Reviewing bot signatures&lt;/li&gt;&lt;li&gt;Configuring bot defense on the XC load balancer&lt;/li&gt;&lt;li&gt;Lab: Mitigating an attack from an automated agent (python scripts for bad traffic and credential stuffing/brute force)&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 8: Mitigate Threats using Machine Learning and Artificial Intelligence&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Defining Malicious User Detection
&lt;ul&gt;
&lt;li&gt;TLS fingerprinting&lt;/li&gt;&lt;li&gt;JavaScript challenges/client side defense&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Lab: Deploying Machine Learning&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 9: Protecting Your Public APIs&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Defining an API&lt;/li&gt;&lt;li&gt;Defining API specifications&lt;/li&gt;&lt;li&gt;Defining a RESTful API&lt;/li&gt;&lt;li&gt;Recognizing API endpoints&lt;/li&gt;&lt;li&gt;Defining Shadow APIs&lt;/li&gt;&lt;li&gt;Defining OpenAPI 3.0 and the Swagger specification&lt;/li&gt;&lt;li&gt;Analyzing API routing in F5XC&lt;/li&gt;&lt;li&gt;Analyzing API protection in F5XC
&lt;ul&gt;
&lt;li&gt;App firewall (OWASP vulnerabilities)&lt;/li&gt;&lt;li&gt;CAPTCHA/JS challenges&lt;/li&gt;&lt;li&gt;Network firewall&lt;/li&gt;&lt;li&gt;API usage characterizations&lt;/li&gt;&lt;li&gt;User anomaly detection&lt;/li&gt;&lt;li&gt;API rate limiting (threshold configuration)&lt;/li&gt;&lt;li&gt;API Learning&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Endpoint learning&lt;/li&gt;&lt;li&gt;Schema learning&lt;/li&gt;&lt;li&gt;Behavioral firewall/business logic markup&lt;/li&gt;&lt;li&gt;Lab: Machine Learning Lab
&lt;ul&gt;
&lt;li&gt;Review discovered APIs&lt;/li&gt;&lt;li&gt;Configure malicious users mitigation&lt;/li&gt;&lt;li&gt;Configure user identification&lt;/li&gt;&lt;li&gt;Configure load balancer&lt;/li&gt;&lt;li&gt;Test XSS (without WAF policy)&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 10: API Automation using Postman&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction to Postman
&lt;ul&gt;
&lt;li&gt;Defining environments&lt;/li&gt;&lt;li&gt;Defining collections&lt;/li&gt;&lt;li&gt;Reviewing variables&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;Lab: Use a postman collection to create a WAF policy for a namespace&lt;/li&gt;&lt;li&gt;Lab: Use a postman collection to create service policies for a shared namespace&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>By the end of this course, you will be able to:   


- Deploy and manage F5XC WAAP to mitigate the OWASP Top 10 - via WAF Policy and via Service Policy
- Deploy F5XC WAAP to mitigate bot traffic
- Deploy F5XC WAAP to mitigate DDoS attacks at layers 3, 4, and 7
- Use F5XC WAAP to automatically discover and secure APIs</objective_plain><essentials_plain>Administering Applications in F5 Distributed Cloud Services</essentials_plain><audience_plain>The course is designed for DevOps, SecOps, NetOps, and application developers who have foundational knowledge of F5 Distributed Cloud services.</audience_plain><contents_plain>- Module 1: Introduction to Distributed Cloud WAAP and WAF Deployment
- Module 2: Setting the Stage: Analyzing Web Applications and HTTP
- Module 3: Exploiting Web Application Vulnerabilities
- Module 4: Mitigating Threats with Web Application Firewall Policies
- Module 5: Manage Security Events with Exclusion Rules
- Module 6: Mitigating Threats with Service Policies
- Module 7: Bot Defense
- Module 8: Mitigate Threats using Machine Learning and Artificial Intelligence
- Module 9: Protecting Your Public APIs
- Module 10: API Automation using Postman</contents_plain><outline_plain>Intro


- Overview of how F5XC WAAP protects web apps in any cloud, edge, or on-premises environment
- Defining the core features: WAF, bot defense, DDoS protection, and securing APIs
Module 1: Introduction to Distributed Cloud WAAP and WAF Deployment


- Exploring the security flow through application proxy
- Lab: Deploy Juice Shop (target application) on an HTTP load balancer and configure API endpoint discover

- Create load balancer and connect origin pool to expose Juice Shop application
- Enable API discovery (so that we can discuss API protection and have ready examples)
- Run some traffic and review request log
Module 2: Setting the Stage: Analyzing Web Applications and HTTP


- Overview of web application communication elements
- Overview of HTTP message structure (headers and methods)
- Parsing HTTP requests
- Lab: Exploring the target application
Module 3: Exploiting Web Application Vulnerabilities


- A taxonomy of attacks: the threat landscape
- Common exploits against web applications (OWASP Top 10, OWASP API)
- Lab: Exploiting web application vulnerabilities

- SQL injection
- Cross-site scripting
- Poison byte
- Forceful browsing
Module 4: Mitigating Threats with Web Application Firewall Policies


- Defining web application firewall processing at layer 7
- Applying different protections to a load balancer
- Defining violations and false positives
- Reviewing RFC 2616 as it drives protocol compliance
- Differentiating positive and negative security
- Differentiating blocking and monitoring actions
- Reviewing security event logging
- Defining Threat Campaigns
- Defining Attack Signatures
- Lab: Create App Firewall, enable blocking mode, attach to load balancer

- Lab: Launch XSS attack and observe security processing in the log
- Lab: Launch SQL injection attack and observe security processing in the log
- Lab: Launch poison null byte attack and observe security processing in the log
Module 5: Manage Security Events with Exclusion Rules


- Defining exclusion rules
- Analyzing elements and contexts of exclusion rules
- Lab: Create an Exclusion Rule for Two Attack Signature IDs
Module 6: Mitigating Threats with Service Policies


- Differentiating protections at namespace vs. load balancer levels
- Exploring service policy rules, policies, and policy sets
- Handling traffic flow
- Enforcing layer 7 elements of HTTP processing
- Lab: Practicing service policy protections for geolocation enforcement, file types enforcement, method and path enforcement, and IP address enforcement.
Module 7: Bot Defense


- Classifying and categorizing bots (good/suspicious/malicious)
- Reviewing bot signatures
- Configuring bot defense on the XC load balancer
- Lab: Mitigating an attack from an automated agent (python scripts for bad traffic and credential stuffing/brute force)
Module 8: Mitigate Threats using Machine Learning and Artificial Intelligence


- Defining Malicious User Detection

- TLS fingerprinting
- JavaScript challenges/client side defense
- Lab: Deploying Machine Learning
Module 9: Protecting Your Public APIs


- Defining an API
- Defining API specifications
- Defining a RESTful API
- Recognizing API endpoints
- Defining Shadow APIs
- Defining OpenAPI 3.0 and the Swagger specification
- Analyzing API routing in F5XC
- Analyzing API protection in F5XC

- App firewall (OWASP vulnerabilities)
- CAPTCHA/JS challenges
- Network firewall
- API usage characterizations
- User anomaly detection
- API rate limiting (threshold configuration)
- API Learning
- Endpoint learning
- Schema learning
- Behavioral firewall/business logic markup
- Lab: Machine Learning Lab

- Review discovered APIs
- Configure malicious users mitigation
- Configure user identification
- Configure load balancer
- Test XSS (without WAF policy)
Module 10: API Automation using Postman


- Introduction to Postman

- Defining environments
- Defining collections
- Reviewing variables
- Lab: Use a postman collection to create a WAF policy for a namespace
- Lab: Use a postman collection to create service policies for a shared namespace</outline_plain><duration unit="d" days="3">3 Tage</duration><pricelist><price country="GB" currency="GBP">2460.00</price><price country="SI" currency="EUR">3630.00</price><price country="DE" currency="USD">3960.00</price><price country="CH" currency="USD">3960.00</price><price country="AT" currency="USD">3960.00</price></pricelist><miles/></course>