VMware NSX Advanced Load Balancer: Web Application Firewall Security [V22.x]


E-Learning
Description
This three-day course provides comprehensive training to install, configure, and manage a VMware NSX Advanced Load Balancer Web Application Firewall (WAF) solution. This course covers key NSX Advanced Load Balancer WAF features and functionality offered in the NSX Advanced Load Balancer 22.1.3 release for web security and application attack protection. Features include security pipeline, application learning, policy tuning, false positive mitigation, virtual patching, threat intelligence, troubleshooting, logs, analytics, and solution monitoring. Hands-on labs provide access to an NSX Advanced Load Balancer environment to reinforce the skills and concepts presented in the course.
This three-day course provides comprehensive training to install, configure, and manage a VMware NSX Advanced Load Balancer Web Application Firewall (WAF) solution. This course covers key NSX Advanced Load Balancer WAF features and functionality offered in the NSX Advanced Load Balancer 22.1.3 release for web security and application attack protection. Features include security pipeline, application learning, policy tuning, false positive mitigation, virtual patching, threat intelligence, troubleshooting, logs, analytics, and solution monitoring. Hands-on labs provide access to an NSX Advanced Load Balancer environment to reinforce the skills and concepts presented in the course.
By the end of the course, you should be able to meet the following objectives:
Describe the NSX Advanced Load Balancer architecture, components, and main functions
Explain the key features and benefits of NSX Advanced Load Balancer
Explain and configure local load-balancing constructs such as virtual services, pools, health monitors, and related components
Recognize web application breaches and threats
Recognize multiple attack vectors such as web scraping, Layer 7 Denial of Service, brute force, and code injections
Explain the components of NSX Advanced Load Balancer WAF that build a security pipeline to protect a web application from being attacked
Describe how to configure the NSX Advanced Load Balancer WAF components
Describe an NSX Advanced Load Balancer WAF operational task such as setting up an application with WAF, tuning the WAF Policy, and working with logs and analytics
Explain the NSX Advanced Load Balancer WAF best practices for on-boarding a web application; configuring WAF settings for effective application security
Explain how to size the NSX Advanced Load Balancer WAF data plane
Explain the WAF Application learning feature, configuration of Application learning, Virtual Patching concepts, common caveats, and troubleshooting while deploying in any environment
Recognize NSX Advanced Load Balancer Cloud Services that include threat Intelligence services
Describe the Threat Intelligence service provided by NSX Advanced Load Balancer WAF and how the NSX Advanced Load Balancer WAF Threat Intelligence service receives live security threat feed for multiple attack vectors from Cloud Services (formerly Avi Pulse)
Describe the NSX Advanced Load Balancer DataScript capabilities for detecting and defending against advance and zero-day attacks.
Discuss the relevant NSX Advanced Load Balancer WAF logs and perform basic troubleshooting of applications that are protected by NSX Advanced Load Balancer WAF
Explain the NSX Advanced Load Balancer WAF capability to protect Personally Identifiable Information (PII)
Experienced system administrators and network administrators
| Lesson Id | Title | Description |
|---|---|---|
| 1 | Course Introduction |
Introduction and course logistics Course objectives |
| 2 | Introduction to NSX Advanced Load Balancer |
Illustrate NSX Advanced Load Balancer Explain NSX Advanced Load Balancer architecture and components Describe control plane clustering and high availability Describe data plane high availability mode Understand the common terminologies used with NSX Advanced Load Balancer Explain the NSX Advanced Load Balancer service elements Explain virtual service components and how to configure a virtual service Explain application profiles and network profiles Explain the pool configuration options and how to configure a pool Explain the available load-balancing algorithms Explain and configure SSL profiles and certificates Explain cloud connectors and cloud connector integration modes Explain multiple health monitor types Understand client logs |
| 3 | Introduction to Application Security |
Understand web application security breaches and the implication of breaches Explain common terminologies related to Web Application Security Understand the different teams involved to secure applications |
| 4 | Attacking Web Applications |
Understand the various web application security testing methodologies Understand the OWASP Top 10 vulnerabilities Understand the tools to generate a web application attack Describe a few types of web application attacks |
| 5 | Types of Transport |
Understand different web traffic transport modes Describe web traffic and API traffic |
| 6 | NSX Advanced Load Balancer WAF Components |
Understand the core design principles of NSX Advanced Load Balancer WAF Describe the NSX Advanced Load Balancer WAF components that build the WAF security pipeline Understand the NSX Advanced Load Balancer WAF configuration objects |
| 7 | NSX Advanced Load Balancer WAF Operations |
Examine how to set up an application with WAF Describe considerations for the WAF policy Work with WAF logs and analytics Describe WAF policy tuning Describe the options available to remediate false positive mitigation |
| 8 | NSX Advanced Load Balancer WAF Best Practices |
Describe technical and application considerations for onboarding an application front ended by WAF Describe best practices to remediate false positive mitigation. Describe how to manage a response from a back-end application server and client upload to the application server Describe the consideration for setting the rigidity of a WAF signature rule set Describe the options available to identify client traffic |
| 9 | NSX Advanced Load Balancer WAF Sizing | Understand how to do WAF data plane sizing in Greenfield and Brownfield deployments |
| 10 | NSX Advanced Load Balancer WAF Custom Rules |
Understand WAF custom rules Describe the need and recommendation for custom rules Describe ModSecurity rules Understand the ModSecurity rule structure and explain how to construct the rule Analyze a sample custom rule for the use-case scenario for in-depth understanding of a custom rule |
| 11 | NSX Advanced Load Balancer WAF Application Learning |
Understand the significance of Application Learning Explain the Positive Security Model architecture Describe the WAF multifaceted Application Learning technique to build an application model for creating positive security rules Describe how to view the data that is learned by the Application learning module Describe the WAF Virtual Patching technique to construct a WAF policy from Dynamic Application Security Testing (DAST) scanner results Understand the conditions for sharing WAF Learning Data and PSM Group in WAF Policy. |
| 12 | Malware Protection Through ICAP in NSX Advanced Load Balancer |
Understand Malicious File Upload Protection and ICAP workflow Describe ICAP configuration and log analytics |
| 13 | NSX Advanced Load Balancer IP Reputation |
Understand IP Reputation concepts and their integration with NSX Advanced Load Balancer Describe IP Reputation configuration, log analytics, and troubleshooting |
| 14 | DataScript for Application Security |
Describe DataScript events and reference Describe application security using DataScript Explain how to troubleshoot DataScript issues |
| 15 | Rate Limiting and DOS |
Describe and configure the NSX Advanced Load Balancer rate limiter technique Describe protection from denial of service (DoS) attacks and distributed DoS (DDoS) attacks in NSX Advanced Load Balancer Explain the Service Engine general advice and guidance for DDOS |
| 16 | Bot Management |
Understand Bots Describe the Bot Management mechanism in NSX Advanced Load Balancer Describe how to configure NSX Advanced Load Balancer Bot Management |
| 17 | Managing Personally Identifiable Information in NSX Advanced Load Balancer |
Understand Personally Identifiable Information (PII) Understand the scope of managing PII in NSX Advanced Load Balancer Describe how to configure the hidden PII in NSX Advanced Load Balancer logs using profiles and WAF rules. |
| 18 | Threat Intelligence |
Introduce the Threat Intelligence service Describe the Threat Intelligence live security threat feed for multiple attack vectors Describe how to configure Threat Intelligence in NSX Advanced Load Balancer |
| 19 | Application Programming Interface Security |
Define Application Programming Interface (API) Security Understand API authentication and authorization using virtual service authentication mechanisms used for a virtual service such as LDAP, SAML, JSON Web Token, and OAUTH Understand API Rate Limiting in NSX Advanced Load Balancer Understand the NSX Advanced Load Balancer WAF Protection for API |
Self-Paced
Free
This course includes: :
Full lifetime access