Detailed Course Outline
Chapter 1: Setting Up the BIG-IP System
- Introducing the BIG-IP System
 - Initially Setting Up the BIG-IP System
 - Archiving the BIG-IP System Configuration
 - Leveraging F5 Support Resources and Tools
 
Chapter 2: Traffic Processing with BIG-IP
- Identifying BIG-IP Traffic Processing Objects
 - Understanding Profiles
 - Overview of Local Traffic Policies
 - Visualizing the HTTP Request Flow
 
Chapter 3: Web Application Concepts
- Overview of Web Application Request Processing
 - Web Application Firewall: Layer 7 Protection
 - Layer 7 Security Checks
 - Overview of Web Communication Elements
 - Overview of the HTTP Request Structure
 - Examining HTTP Responses
 - How F5 Advanced WAF Parses File Types, URLs, and Parameters
 - Using the Fiddler HTTP Proxy
 
Chapter 4: Web Application Vulnerabilities
- A Taxonomy of Attacks: The Threat Landscape
 - Common Exploits Against Web Applications
 
Chapter 5: Security Policy Deployment
- Defining Learning
 - Comparing Positive and Negative Security Models
 - The Deployment Workflow
 - Assigning Policy to Virtual Server
 - Deployment Workflow: Using Advanced Settings
 - Configure Server Technologies
 - Defining Attack Signatures
 - Viewing Requests
 - Security Checks Offered by Rapid Deployment
 - Defining Attack Signatures
 
Chapter 6: Policy Tuning and Violations
- Post-Deployment Traffic Processing
 - How Violations are Categorized
 - Violation Rating: A Threat Scale
 - Defining Staging and Enforcement
 - Defining Enforcement Mode
 - Defining the Enforcement Readiness Period
 - Reviewing the Definition of Learning
 - Defining Learning Suggestions
 - Choosing Automatic or Manual Learning
 - Defining the Learn, Alarm and Block Settings
 - Interpreting the Enforcement Readiness Summary
 - Configuring the Blocking Response Page
 
Chapter 7: Attack Signatures and Threat Campaigns
- Defining Attack Signatures
 - Attack Signature Basics
 - Creating User-Defined Attack Signatures
 - Defining Simple and Advanced Edit Modes
 - Defining Attack Signature Sets
 - Defining Attack Signature Pools
 - Understanding Attack Signatures and Staging
 - Updating Attack Signatures
 - Defining Threat Campaigns
 - Deploying Threat Campaigns
 
Chapter 8: Positive Security Policy Building
- Defining and Learning Security Policy Components
 - Defining the Wildcard
 - Defining the Entity Lifecycle
 - Choosing the Learning Scheme
 - How to Learn: Never (Wildcard Only)
 - How to Learn: Always
 - How to Learn: Selective
 - Reviewing the Enforcement Readiness Period: Entities
 - Viewing Learning Suggestions and Staging Status
 - Defining the Learning Score
 - Defining Trusted and Untrusted IP Addresses
 - How to Learn: Compact
 
Chapter 9: Securing Cookies and Other Headers
- The Purpose of F5 Advanced WAF Cookies
 - Defining Allowed and Enforced Cookies
 - Securing HTTP headers
 
Chapter 10: Visual Reporting and Logging
- Viewing Application Security Summary Data
 - Reporting: Build Your Own View
 - Reporting: Chart based on filters
 - Brute Force and Web Scraping Statistics
 - Viewing Resource Reports
 - PCI Compliance: PCI-DSS 3.0
 - Analyzing Requests
 - Local Logging Facilities and Destinations
 - Viewing Logs in the Configuration Utility
 - Defining the Logging Profile
 - Configuring Response Logging
 
Chapter 11: Lab Project 1
Chapter 12: Advanced Parameter Handling
- Defining Parameter Types
 - Defining Static Parameters
 - Defining Dynamic Parameters
 - Defining Parameter Levels
 - Other Parameter Considerations
 
Chapter 13: Automatic Policy Building
- Overview of Automatic Policy Building
 - Defining Templates Which Automate Learning
 - Defining Policy Loosening
 - Defining Policy Tightening
 - Defining Learning Speed: Traffic Sampling
 - Defining Track Site Changes
 
Chapter 14: Web Application Vulnerability Scanner Integration
- Integrating Scanner Output
 - Importing Vulnerabilities
 - Resolving Vulnerabilities
 - Using the Generic XML Scanner XSD file
 
Chapter 15: Deploying Layered Policies
- Defining a Parent Policy
 - Defining Inheritance
 - Parent Policy Deployment Use Cases
 
Chapter 16: Login Enforcement and Brute Force Mitigation
- Defining Login Pages for Flow Control
 - Configuring Automatic Detection of Login Pages
 - Defining Brute Force Attacks
 - Brute Force Protection Configuration
 - Source-Based Brute Force Mitigations
 - Defining Credential Stuffing
 - Mitigating Credential Stuffing
 
Chapter 17: Reconnaissance with Session Tracking
- Defining Session Tracking
 - Configuring Actions Upon Violation Detection
 
Chapter 18: Layer 7 DoS Mitigation
- Defining Denial of Service Attacks
 - Defining the DoS Protection Profile
 - Overview of TPS-based DoS Protection
 - Creating a DoS Logging Profile
 - Applying TPS Mitigations
 - Defining Behavioral and Stress-Based Detection
 
Chapter 19: Advanced Bot Defense
- Classifying Clients with the Bot Defense Profile
 - Defining Bot Signatures
 - Defining F5 Fingerprinting
 - Defining Bot Defense Profile Templates
 - Defining Microservices protection
 
Chapter 20: Form Encryption using DataSafe
- Targeting Elements of Application Delivery
 - Exploiting the Document Object Model
 - Protecting Applications Using DataSafe
 - The Order of Operations for URL Classification
 
Chapter 21: Review and Final Labs
- Final Lab Project (Option 1) – Production Scenario
 - Final Lab Project (Option 2) – Managing Traffic with Layer 7 Local Traffic Policies