Detailed Course Outline
- Setting up the BIG-IP system
- Traffic processing with BIG-IP Local Traffic Manager (LTM)
- Web application concepts
- Web application vulnerabilities
- Security policy deployment
- Attack signatures
- Positive security building
- Cookies and other headers
- Reporting
- User roles and administration
- Advanced parameter handling
- Application templates
- Real Traffic Policy Builder
- Vulnerability scanners
- Login enforcement and session tracking
- Anomaly detection
- ASM and iRules
- AJAX and JSON support
- XML and web services support