Companies Home Search Profile

Complete F5 Bootcamp (LTM,ASM,DNS) - P1 (ASM

Focused View

GIANT Labs

8:29:41

91 View
  • 1 - 1-Introduction.pdf
  • 1 - Introduction.mp4
    45:48
  • 2 - 2-ASM-LTM-Relationship.pdf
  • 2 - ASM LTM Relationship.mp4
    05:37
  • 3 - 3-Web-Application-Firewall-Concepts.pdf
  • 3 - Web Application Firewall Concepts.mp4
    22:08
  • 4 - 4-Attacks-Types-OWASP-Top-10.pdf
  • 4 - Attacks Types OWASP Top 10.mp4
    14:58
  • 5 - 5-ASM-Deployment-Main-Concepts.pdf
  • 5 - ASM Deployment Main Concepts.mp4
    32:23
  • 6 - 6 ASM Deployment Modes.mp4
    05:09
  • 7 - 1.2-Manual-Learning-Policy-Tuning.pdf
  • 7 - Manual Learning Policy Tuning P1.mp4
    29:19
  • 8 - 1.2-Manual-Learning-Policy-Tuning.pdf
  • 8 - Manual Learning Policy Tuning P2.mp4
    16:01
  • 9 - 2-Attack-Signatures.pdf
  • 9 - Attack Signatures.mp4
    13:17
  • 10 - 3.4-Positive-Policy-Building.pdf
  • 10 - Positive Policy Building Overview.mp4
    17:57
  • 11 - 3.4-Positive-Policy-Building.pdf
  • 11 - Learning Methods.mp4
    13:54
  • 12 - 3.4-Positive-Policy-Building.pdf
  • 12 - Staging Enforced.mp4
    09:05
  • 13 - Compact Learning.mp4
    08:23
  • 14 - Automatic Policy Building.mp4
    22:27
  • 15 - 1-Securing-Headers.pdf
  • 15 - Securing Headers.mp4
    19:19
  • 16 - 2-Logining-Enforcement.pdf
  • 16 - Logining Enforcement.mp4
    12:41
  • 17 - 3-Brute-Force-Mitigation.pdf
  • 17 - Brute Force Mitigation.mp4
    16:45
  • 18 - 4-Session-Tracking.pdf
  • 18 - Session Tracking.mp4
    12:13
  • 19 - 5-IP-Addresses-Handling.pdf
  • 19 - IP Addresses Handling.mp4
    05:42
  • 20 - 6-Parameters-Handling.pdf
  • 20 - Parameters Handling.mp4
    25:33
  • 21 - 7-DOS-Mitigation.pdf
  • 21 - DOS Mitigation.mp4
    13:10
  • 22 - 1-Policy-Operations.pdf
  • 22 - Policy Operations.mp4
    19:35
  • 23 - 2-Vulnerability-Scanner-Integration.pdf
  • 23 - Vulnerability Scanner Integration.mp4
    03:44
  • 24 - 3-Layered-Policies.pdf
  • 24 - Layered Policies.mp4
    02:22
  • 25 - 4-iRules-With-ASM.pdf
  • 25 - iRules With ASM.mp4
    02:42
  • 26 - 1-Lab-1-Building-A-Comprehensive-Policy.pdf
  • 26 - Lab 1 Building A Comprehensive Policy.mp4
    43:31
  • 27 - 2-Lab-2-Injections-Mitigated.pdf
  • 27 - Lab 2 Injections Mitigated.mp4
    20:44
  • 28 - 3-Lab-3-Securing-Web-Server-Resources.pdf
  • 28 - Lab 3 Securing Web Server Resources.mp4
    20:48
  • 29 - Lab 4 Protection From Session Tampering Techniques.mp4
    22:08
  • 30 - Lab 5 Brute Force Attacks Prevention.mp4
    12:18
  • 31 - 1-Logging-Reporting.pdf
  • 31 - Logging Reporting.html
  • Description


    Complete F5 Technical & Practical Training For The Main Three Modules Of F5 ( LTM , ASM & DNS "GTM" ) .

    What You'll Learn?


    • Take a complete overview of f5 bigip asm module and how it works
    • Define the main components of security policy and how to configure it
    • Identify the differences between learning and blocking settings
    • Take a complete real world project scenario
    • Make a real world penetration testing scenarios using kali linux

    Who is this for?


  • Application Security Engineers
  • Penetrations Testers
  • Networks Security Engineers
  • IT Systems Engineers
  • What You Need to Know?


  • Basic Networking
  • Basic Systems Administration
  • Basic Cybersecurity Terminology
  • LTM Basics
  • More details


    Description

    In this first portion of this course ( Complete F5 Technical & Practical Training For The Main Three Modules Of F5 ( LTM , ASM & DNS "GTM" ) we will tackle the main needed topics to secure a web application through ASM "Application Security Manager" of f5 .

    In the first section we will speak about an overview of ASM module and the theory of web application firewall , what are the main attack types that we can secure against and finally we'll tackle the main owasp top 10 vunlerabilities of any web application .

    With the section section , we'll be familiar with how ASM learning methodolgy works and how we can tune the policy according to the learning results .

    In the third section , we'll understand deeply the concept of automatic learning and how we can create a policy in an automatic mode to automatically enable our asm to accept learning suggestion without any intervention from the administrator .

    Then , we'll take a deep look into the main objects to secure related to the web application against some popular attacks like ( brute force attacks , DOS attacks , bot attacks and others ) .

    After that , we'll see how to work with parameters with all their types inside the web application ( static parameters and dynamic parameters ) .

    Finally , we'll configure some features related to the administration of this module "ASM" and how to configure logging and also how to generate reports .

    Who this course is for:

    • Application Security Engineers
    • Penetrations Testers
    • Networks Security Engineers
    • IT Systems Engineers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    IT security professional with experience of designing and implementing security solutions in high-availability environments. Worked on a bunch of multiple vendor security solutions ( Fortigate , PaloAlto NGFW , Kaspersky Endpoint Solutions , Fortimail , F5 [LTM , ASM] , Pulse Secure , Cisco FTD ,  Cisco ISE , ... ) . Experience in troubleshooting , solving and recovering problems and crashings of security devices for different kinds of systems and networks .
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 30
    • duration 8:29:41
    • Release Date 2023/06/24

    Courses related to Network Security

    Courses related to Computer Network

    Courses related to Network Engineering

    Subtitle
    TCP Sockets in C#
    SkillShareTCP Sockets in C#
    32:22
    English subtitles
    01/14/2024
    CCDE v3
    Orhan ErgunCCDE v3
    65:45:06
    11/19/2023

    Courses related to Network Monitoring

    Courses related to 4G-5G

    Courses related to Wireless Networking