F5 : Configure BIG-IP ASM | Application Security Manager
About Course
Course Highlights
Protection Against Web Application Threats: Learn how to shield web applications from common and emerging threats effectively.
Describe the role of the BIG-IP system as a full proxy device in an application delivery network.
Provision the Application Security Manager
Define a web application firewall.
Describe how ASM protects a web application by securing file types, URLs, and parameters.
Deploy ASM using the Rapid Deployment template (and other templates) and define the security checks included in each.
Define learn, alarm, and block settings of configuring ASM.
Define attack signatures and explain why attack signature staging is important.
Contrast positive and negative security policy implementation and explain the benefits of each.
Configure security processing at the parameter level of a web application
Use an application template to protect a commercial web application.
Deploy ASM using the Automatic Policy Builder.
Leadership in Web Application Security
These highlights encompass the essential areas of focus and learning outcomes in the Configuring BIG-IP ASM: Application Security Manager’ course.