F5 ASM Training
F5 ASM Training
F5 ASM Training
The course includes lecture, hands-on labs, and discussion about different ASM
components for detecting and mitigating threats from multiple attack vectors such
web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero
day exploits.
Course Objectives
Describe the role of the BIG-IP system as a full proxy device in an application
delivery network
Describe how ASM protects a web application by securing file types, URLs,
and parameters
Deploy ASM using the Rapid Deployment template (and other templates) and
define the security checks included in each
Define learn, alarm, and block settings as they pertain to configuring ASM
Define attack signatures and explain why attack signature staging is important
Configure protection against brute force, web scraping, and Layer 7 denial of
service attacks
Course Topics
Provisioning ASM
Attack signatures
Login enforcement
Brute force mitigation
Session tracking