Nux software solutions in coimbatore has excellent and advanced training programs that will give you better performance & hands on experience. Our industry's expert trainers offer a wide range of skills and experience in their graded areas. The Training center environment is too good for professional, individual, corporate, live project training and industrial training. Labs infrastructure is advanced, well managed and you can access LAB 24X7 from anywhere. Training center has international expert trainers and they have excellent knowledge, real time industry experience. Our Training programs combine with several innovative learning methods and delivery models. We understand your requirement and it will give you 100 percent growth for your career and provide the cost effective training programs and also work with flexibility for the trainees.
Achieve both security and performance. The F5 TMOS® architecture provides significant performance advantages, including SSL offload, caching, compression, TCP optimization, and more. BIG-IP ASM is part of the F5 application delivery firewall solution—a portfolio of networking and security modules designed to protect network and application infrastructure. Integration with BIG-IP® Advanced Firewall Manager™ enables protection from DDoS and other network attacks. BIG-IP® Local Traffic Manager™ integration ensures application infrastructure efficiency and peak network performance. And because BIG-IP ASM works on the same platform with other BIG-IP® modules, you can benefit from centralized, secure access control and even greater performance improvements.
COURSE INTRODUCTION :
Describe the role of the BIG-IP system as a full proxy device in an application delivery network
Provision the Application Security Manager
Define a web application firewall
Describe how ASM protects a web application by securing file types, URLs, and parameters
Deploy ASM using the Rapid Deployment template (and other templates) and define the security checks included in each
Define learn, alarm, and block settings as they pertain to configuring ASM
Define attack signatures and explain why attack signature staging is important
Deploy Threat Campaigns to secure against CVE threats
Contrast positive and negative security policy implementation and explain benefits of each
Configure security processing at the parameter level of a web application
Deploy ASM using the Automatic Policy Builder
Tune a policy manually or allow automatic policy building
Integrate third party application vulnerability scanner output into a security policy
Configure login enforcement for flow control
Mitigate credential stuffing
Configure protection against brute force attacks
Deploy Advanced Bot Defense against web scrapers, all known bots, and other automated agents
Deploy DataSafe to secure client-side data
Topics Covered
Provisioning ASM
Resource provisioning for ASM
Traffic processing with BIG-IP Local Traffic Manager (LTM)
Web application concepts
Mitigating the OWASP Top 10 and other vulnerabilities
Security policy deployment
Security policy tuning
Deploying Attack Signatures and Threat Campaigns
Positive security building
Securing cookies and other headers
Reporting and logging
Advanced parameter handling
Using Automatic Policy Builder
Integrating with web vulnerability scanners
Login enforcement for flow control
Brute force and credential stuffing mitigation
Session tracking for client reconnaissance
Using Parent and Child policies
Layer 7 DoS protection
Transaction Per Second-based DoS protection
Layer 7 Behavioral DoS Protection
Configuring Advanced Bot Defense
Web Scraping and other Microservice Protection
Working with Bot Signatures
Using DataSafe to Secure the client side of the Document Object Model