The VMware NSX Advanced Load Balancer : Web Application Firewall Security course offers a comprehensive look at the NSX Advanced Load Balancer (NSX ALB), focusing on its Web Application Firewall (WAF) capabilities. It provides learners with an understanding of the NSX ALB's architecture, components, and the fundamental principles of Application security. The course explores various Attack vectors against web applications, such as XSS and SQL injection, and demonstrates how to defend against them using NSX ALB's WAF features.Through lessons on Virtual services configuration, Profiles and policies, and Advanced WAF components, learners gain hands-on experience in securing applications. They will also delve into Application learning, DDOS protection, Custom rules, and best practices. This course is valuable for IT professionals looking to enhance their skills in network security, Application delivery, and Web application protection. By the end of the course, participants will be proficient in deploying and managing NSX ALB's WAF to safeguard their organization’s applications.
Course Objectives
By the end of the course, you should be able to meet the following objectives:
-
Describe the architecture of the NSX Advanced Load Balancer.
-
Identify the components and main functions of the NSX Advanced Load Balancer.
-
Explain the key features and benefits of the NSX Advanced Load Balancer.
-
Describe the architecture of the NSX Advanced Load Balancer Web Application Firewall.
-
Identify the components and main functions of the Web Application Firewall.
-
Explain the key features and benefits of the Web Application Firewall.
-
Configure Local Load Balancing components, including Virtual Services, Pools, Health Monitors, and related elements.
-
Modify application behavior using Profiles, Policies, and DataScripts.
-
Configure and customize the Web Application Firewall.
-
Describe and utilize the NSX Advanced Load Balancer REST API for automation.
-
Monitor applications and infrastructure using the Web Application Firewall.
-
Gather information and perform basic troubleshooting of Web Application Firewall applications using NSX Advanced Load Balancer tools.
Who Can Benefit
Course Outline:
1. Course Introduction
2. Introduction to NSX Advanced Load Balancer
-
Introduce NSX Advanced Load Balancer
-
Discuss NSX Advanced Load Balancer use cases and benefits
-
Explain NSX Advanced Load Balancer architecture and components
-
Explain the management, control, data, and consumption planes and their respective functions
3. Introduction to NSX ALB Web Application Firewall
4. Virtual Services Configuration Concepts
-
Explain Virtual Service components
-
Explain Virtual Service types
-
Explain and configure basic virtual service components such as Application Profiles, Network Profiles, Pools, and Health Monitors
5. Attacking and Defending Web Applications
-
Introduce the processes and methodologies used when attacking and defending web applications
-
Introduce the tools used to attack web applications
-
Explain with examples terminology such as Reflected XSS and SQL injection
6. Profiles and Policies
-
Explain and deep dive on Advanced Virtual Service creation
-
Explain and deep dive on Application Profiles and Types such as L4, DNS, Syslog, and HTTP
-
Explain and configure advanced application HTTP Profile options
-
Deep dive on Network Profiles and Types
-
Explain and configure SSL Profiles and Certificates
-
Explain and configure HTTP and DNS policies
7. DDoS Protection
-
Introduce the NSX Advanced Load Balancer rate limiting functionality
-
Explain the NSX Advanced Load Balancer rate limiting functionality
-
Hands-on examples of rate limiting in action
8. Customizing Application Delivery with Datascripts
9. iWAF Deep Dive
-
Describe the building blocks of the iWAF implementation
-
Explain the various iWAF components
-
Introduce both Positive and Negative security models
-
Explain the iWAF Policies, profiles, and rule sets
10. iWAF Core Rule Set
11. iWAF Custom Rules
-
Describe the power and complexity available via custom rules
-
Explain the rule language
-
Implement various use cases
-
Explain common errors and possible solutions
12. iWAF Operations
-
Describe the iWAF application onboarding process
-
Tuning the iWAF policies
-
Working with iWAF logs and analytics
-
Explaining false positive mitigation tactics
13. iWAF Best Practices