F5 ASM (Application Security Manager)

Course Summary

F5 ASM (Application Security Manager) is an advanced, hands-on training program designed to equip network security professionals, DevSecOps engineers, and system administrators with the knowledge and skills to deploy, configure, and manage web application firewalls using the F5 BIG-IP ASM module.

This course offers in-depth coverage of application-layer security, threat protection, and secure application delivery using F5’s market-leading WAF (Web Application Firewall) technology. Whether you’re aiming to protect enterprise-grade applications or meet compliance requirements such as PCI-DSS, this course empowers you with the expertise to secure your applications in real-time.


Why Learn F5 ASM?

As cyber threats grow increasingly complex, traditional firewalls are no longer enough. F5 ASM provides powerful protection at the application layer, defending against OWASP Top 10 threats, bots, Layer 7 DDoS attacks, zero-day vulnerabilities, and more.

Learning F5 ASM gives you the ability to:

  • Mitigate real-world application-layer attacks

  • Enforce compliance and data protection policies

  • Secure web applications with minimal impact on performance

  • Manage WAF policies in dynamic, multi-application environments

  • Enhance the security posture of enterprise applications


Who This Course Is For

  • Security Engineers and Analysts managing enterprise firewalls and WAFs

  • Network and System Administrators looking to expand into application-layer security

  • DevSecOps Engineers integrating security into CI/CD pipelines

  • Web Application Architects responsible for secure deployments

  • IT Professionals preparing for F5 certification (F5-CTS: ASM)

  • Organizations deploying F5 BIG-IP platforms for web security


What You Will Learn

Introduction to F5 ASM:

  • Overview of the BIG-IP platform and modules

  • Positioning ASM in the network infrastructure

Core Features:

  • Policy creation and tuning

  • Automatic and manual policy building

  • Attack signature enforcement

  • Positive and negative security models

Threat Protection:

  • Defending against OWASP Top 10 vulnerabilities

  • Cross-site scripting (XSS), SQL injection, CSRF, and more

  • IP intelligence, geolocation-based blocking

Traffic Handling:

  • Understanding request/response inspection

  • Enforcing HTTP protocol compliance

  • Configuring cookie and parameter protection

Advanced Security Configurations:

  • Layer 7 DDoS mitigation strategies

  • Brute force and bot protection

  • Web scraping and anomaly detection

Logging and Reporting:

  • Event logging and alerting setup

  • Interpreting violation logs

  • Integration with SIEM tools

Deployment Strategies:

  • Inline, reverse proxy, and transparent modes

  • Policy lifecycle and best practices

  • Application templates and rapid deployment techniques


Hands-On Learning

This course combines theoretical concepts with lab-based simulations. Learners will work with real-world scenarios involving traffic inspection, attack prevention, and WAF tuning. You’ll practice:

  • Creating and managing ASM security policies

  • Analyzing attack signatures

  • Mitigating live application vulnerabilities

  • Using traffic learning for accurate policy tuning

  • Configuring logging and alerting mechanisms


Course Benefits

  • Comprehensive: Learn the full scope of ASM capabilities

  • Real-world focused: Practice with enterprise-grade use cases

  • Certification-ready: Aligns with F5 Certified Technology Specialist (CTS) – ASM exam

  • Security-centric: Enhance your knowledge of application security

  • Hands-on: Build and test real WAF rules and policies


Career & Certification Advantage

Professionals with F5 ASM expertise are in high demand due to the increasing focus on secure application delivery. This course prepares you for roles such as:

  • Application Security Engineer

  • Network Security Analyst

  • DevSecOps Engineer

  • F5 Engineer or Consultant

It also provides a strong foundation for pursuing the F5 Certified Technology Specialist – ASM certification.


Conclusion

The F5 ASM (Application Security Manager) course is your complete guide to mastering web application firewall configuration and management. By combining advanced protection techniques with hands-on lab experience, this course ensures you’re equipped to defend modern web applications from evolving security threats.

If you’re serious about application-layer security and working in an environment that leverages F5 BIG-IP, this course is essential to boost your skills, your resume, and your organization’s defense posture.

F5 ASM (Application Security Manager) Syllabus

Modules

Describe the role of the BIG-IP system as a full proxy device in an application delivery network

Provision the Application Security Manager

Define a web application firewall

Describe how ASM protects a web application by securing file types, URLs, and parameters

Deploy ASM using the Rapid Deployment template (and other templates) and define the security checks included in each

Define learn, alarm, and block settings as they pertain to configuring ASM

Define attack signatures and explain why attack signature staging is important

Deploy Threat Campaigns to secure against CVE threats

Contrast positive and negative security policy implementation and explain benefits of each

Configure security processing at the parameter level of a web application

Deploy ASM using the Automatic Policy Builder

Tune a policy manually or allow automatic policy building

Integrate third party application vulnerability scanner output into a security policy

Configure login enforcement for flow control

Mitigate credential stuffing

Configure protection against brute force attacks

Deploy Advanced Bot Defense against web scrapers, all known bots, and other automated agents

Deploy DataSafe to secure client-side data

Topics Covered

Provisioning ASM

Resource provisioning for ASM

Traffic processing with BIG-IP Local Traffic Manager (LTM)

Web application concepts

Mitigating the OWASP Top 10 and other vulnerabilities

Security policy deployment

Security policy tuning

Deploying Attack Signatures and Threat Campaigns

Positive security building

Securing cookies and other headers

Reporting and logging

Advanced parameter handling

Using Automatic Policy Builder

Integrating with web vulnerability scanners

Login enforcement for flow control

Brute force and credential stuffing mitigation

Session tracking for client reconnaissance

Using Parent and Child policies

Layer 7 DoS protection
Transaction Per Second-based DoS protection

Layer 7 Behavioral DoS Protection
Configuring Advanced Bot Defense
Web Scraping and other Microservice Protection
Working with Bot Signatures
Using DataSafe to Secure the client side of the Document Object Model