F5-ASM/WAF Certification Online Training

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

F5-ASM/WAF Certification Online Training

Module 1: Application Traffic Flow.


Module 2: Initial setup of BIG-IP
Module 3: Basic traffic processing components on F5
Module 4: HTTP header and explanation of OWASP Top 10
Module 5: Security Model
Module 6: Ways to deploy initial security policy on ASM.
Module 7: Tuning of your policy
Module 8: Attack Signatures
Module 9: Approach towards building a positive security policy
Module 10: Securing Cookies and other headers.
Module 11: Reporting and Logging Functionalities on ASM
Module 12: Static and Dynamic Parameter Handling
Module 13: Comparing Security Policies
Module 14: ASM deployment types
Module 15: Use of Templates for policy creation
.Module 16: Process of Automatic Policy building
.Module 17: Integration of ASM with Vulnerability Scanners
Module 18: Use of Layered policies
Module 19: Enforce login and protection of application from Brute Force
Module 20: Details of Session tracking and Web Scraping.
Module 21: Protecting your application against DOS.

You might also like