Module 2: Initial setup of BIG-IP Module 3: Basic traffic processing components on F5 Module 4: HTTP header and explanation of OWASP Top 10 Module 5: Security Model Module 6: Ways to deploy initial security policy on ASM. Module 7: Tuning of your policy Module 8: Attack Signatures Module 9: Approach towards building a positive security policy Module 10: Securing Cookies and other headers. Module 11: Reporting and Logging Functionalities on ASM Module 12: Static and Dynamic Parameter Handling Module 13: Comparing Security Policies Module 14: ASM deployment types Module 15: Use of Templates for policy creation .Module 16: Process of Automatic Policy building .Module 17: Integration of ASM with Vulnerability Scanners Module 18: Use of Layered policies Module 19: Enforce login and protection of application from Brute Force Module 20: Details of Session tracking and Web Scraping. Module 21: Protecting your application against DOS.