F5 Configuring Advanced WAF v14 (previously ASM)

In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks.

The course includes lecture, hands-on labs, and discussion about different F5 Advanced Web Application Firewall tools for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits.

This course is intended for security and network administrators who will be responsible for the installation, deployment, tuning, and day-to-day maintenance of the F5 Advanced Web Application Firewall.


There are no F5-technology-specific prerequisites for this course. However, completing the following before attending would be very helpful for students with limited BIG-IP administration and configuration experience:
•Administering BIG-IP instructor-led course

•F5 Certified BIG-IP Administrator

Goals for this course:

•Describe the role of the BIG-IP system as a full proxy device in an application delivery network
•Provision F5 Advanced Web Application Firewall resources
•Define a web application firewall
•Describe how F5 Advanced Web Application Firewall protects a web application by securing file types, URLs, and parameters
•Deploy F5 Advanced Web Application Firewall using the Rapid Deployment template (and other templates) and define the security checks included in each
•Define learn, alarm, and block settings as they pertain to configuring F5 Advanced Web Application Firewall
•Define attack signatures and explain why attack signature staging is important
•Contrast positive and negative security policy implementation and explain benefits of each
•Configure security processing at the parameter level of a web application
•Use an application template to protect a commercial web application
•Deploy F5 Advanced Web Application Firewall using the Automatic Policy Builder
•Tune a policy manually or allow automatic policy building
•Integrate third party application vulnerability scanner output into a security policy
•Configure login enforcement and session tracking
•Configure protection against brute force, web scraping, and Layer 7 denial of service attacks
•Implement iRules using specific F5 Advanced Web Application Firewall events and commands
•Use Content Profiles to protect JSON and AJAX-based applications
•Implement Bot Signatures
•Implement Proactive Bot Defense

This course is oraganized in co-operation wirh ArrowECS. Course materials and language is English.


• Resource provisioning for F5 Advanced Web Application Firewall
• Traffic processing with BIG-IP Local Traffic Manager (LTM)
• Web application concepts
• Web application vulnerabilities
• Security policy deployment
• Security policy tuning
• Attack signatures
• Positive security building
• Securing cookies and other headers
• Reporting and logging
• Policy Diff, merging, and exporting
• Advanced parameter handling
• Using application templates
• Using Automatic Policy Builder
• Integrating with web vulnerability scanners
• Login enforcement
• Brute force mitigation
• Session tracking
• Web scraping detection and mitigation
• Geolocation Enforcement and IP Address Exceptions
• Using Parent and Child policies
• Layer 7 DoS protection
• F5 Advanced Web Application Firewall and iRules
• Using Content Profiles for AJAX and JSON applications
• Advanced Bot Detection and Defense
• Proactive Bot Defense


ArrowECS vastaa kurssin järjestämisestä.

Ilmoittaudu kurssille


Palvelussa voidaan käsitellä Elisan tietosuojaperiaatteissa kuvattuja henkilötietoja, kuten esimerkiksi nimi, yhteystiedot ja palvelun käyttöön liittyvät tiedot. Elisa on palvelussa käsiteltävien henkilötietojen osalta tietosuojalainsäädännössä tarkoitettu henkilötietojen rekisterinpitäjä.

Elisa käsittelee rekisterinpitäjänä henkilötietoja kulloinkin voimassaolevien tietosuojaperiaatteiden mukaisesti (https://elisa.fi/sopimusehdot) ja (https://elisa.fi/tietosuoja).

Elisalla on oikeus käyttää palveluiden tuottamisessa ja henkilötietojen käsittelyssä alihankkijoita.


When using the service, the following types of personal information may be handled; name and contact information, employee information and other information from the client company, end user information, information related to use of the service and customer satisfaction information. This information is needed for the maintenance and development of the service. In terms of the personal information being handled, the customer is the controller as intended in information protection legislation and the service provider is the handler.

The customer's personal information is to be handled in the manner outlined in the agreement and this service description in order to provide and develop the services. Any other handling of the customer's personal information and its effect on costs in accordance with the General Data Protection Regulation are to be agreed upon separately between the parties to the agreement.

The provider or their subcontractor may collect data for the maintenance, improvement or analysis of the service. The provider reserves the right to use subcontractors in the production of their services and sub-handlers in the handling of personal information. The customer has the right to receive information on the provider's subcontractors and sub-handlers upon request.