[FR] Cloud Protector
Cette offre de formation s'adresse aux personnes désirant acquérir les connaissances de bases et avancées pour l'administration de la solution WAF en mode SAAS Cloud Protector version Legacy.
Identity
Portfolio
End
Support Area - Introduction
Support Area - Support Access
Support Area -Customer Area
Support Area - No Account
Support Area - My First Ticket
Support Area - My First Ticket (2)
Support Area - My First Ticket (3)
Support Area - My First Ticket (4)
Support Area - My First Ticket (5)
Support Area - My First Ticket (6)
Support Area - My First Answer
Support Area - Support Type
Support Area - End
Introduction
Agenda
HTTP Basics - Introduction
HTTP Basics - HTTP Protocol
HTTP Basics - HTTP Evolution
HTTP Basics - HTTP Evolution (2)
HTTP Basics - HTTP Evolution (3)
HTTP Basics - HTTP Evolution (4)
HTTP Basics - HTTP Transactions
HTTP Basics - URL
HTTP Basics - HTTP Request Syntax
HTTP Basics - HTTP Methods
HTTP Basics - HTTP Methods (2)
HTTP Basics - HTTP Methods (3)
HTTP Basics - HTTP Methods (4)
HTTP Basics - HTTP Methods (5)
HTTP Basics - GET vs POST
HTTP Basics - HTTP Header
HTTP Basics - HTTP Request Headers
HTTP Basics - HTTP Request Headers (2)
HTTP Basics - HTTP Response Headers
HTTP Basics - HTTP Response Headers (2)
HTTP Basics - HTTP Response Status Code
HTTP Basics - Main HTTP Response Status
HTTP Basics - Main HTTP Response Status (2)
HTTP Basics - Main HTTP Response Status (3)
HTTP Basics - End
HTTP Transactions - Introduction
HTTP Transactions - Important Transactions
HTTP Transactions - Basic Transaction
HTTP Transactions - Redirection
HTTP Transactions - Authentication
HTTP Transactions - TCP Connection
HTTP Transactions - TCP Connection
HTTP Transactions - Data Persistency
HTTP Transactions - Data Compression
HTTP Transactions - HTTP Caching
HTTP Transactions - HTTP No Caching
HTTP Transactions - HTTP Cache: Refresh Data
HTTP Transactions - Cache-Control Header
HTTP Transactions - Useful Tools
HTTP Transactions - Useful Tools (2)
HTTP Transactions - Useful Tools (3)
HTTP Transactions - End
SSL Concepts - Introduction
SSL Concepts - SSL/TLS
SSL Concepts - SSL Transaction
SSL Concepts - How It Works
SSL Concepts - Encryption Algorithms
SSL Concepts - Encryption Algorithms (2)
SSL Concepts - Diffie-Hellman
SSL Concepts - RSA
SSL Concepts - PKI & Certificate
SSL Concepts - Server Certificates
SSL Concepts - Client Certificates
SSL Concepts - Simple TLS Handshake
SSL Concepts - Simple TLS Handshake (2)
SSL Concepts - Client-Auth TLS
SSL Concepts - TLS 1.3 Handshake
SSL Concepts TLS 1.3 vs 1.2
SSL Concepts - SSL Architecture
SSL Concepts - SSL Architecture (2)
SSL Concepts - End
Regexp - Introduction
Regexp - The Notion
Regexp - Useful Tools
Regexp - Main Special Chars
Regexp - Simple Examples
Regexp - Use Cases
Regexp - End
Quiz HTTP
Introduction
Agenda
Concepts & Architecture
R&S®Cloud Protector? How different from on-prem WAF?
Architecture
Detailed Architecture and used tools
3 steps to set up R&S®Cloud Protector
3 security levels
3 possible reactions in case of an attack
3 dashboards
3 management roles
Administrator Account Creation & Initial Setup
Registration on R&S®Cloud Protector
Account Creation & First Application Configuration
Feature Plan Details
R&S®Cloud Protector GUI configuration
Agenda
APPLICATION MANAGEMENT
MANAGE APPLICATIONS
APPLICATION CREATION
APPLICATION CREATION (2)
DNS REDIRECTION
DNS REDIRECTION - TEST & PRODUCTION
DNS REDIRECTION - PRODUCTION
SECURITY CONFIGURATION
SECURITY CONFIGURATION - SECURITY LEVEL
SECURITY CONFIGURATION
SECURITY CONFIGURATION (2)
BEHAVIOUR ON ATTACK DETECTION
SECURITY CONFIGURATION - SSL/TLS CONFIGURATION
SSL/TLS CONFIGURATION
SSL/TLS CONFIGURATION (2)
SSL/TLS CONFIGURATION (3) - LET'S ENCRYPT
SSL/TLS CONFIGURATION (3) - ACCESS CONTROL
ACCESS CONTROL
ACCESS CONTROL - BASED ON AN IP ADDRESS
ACCESS CONTROL - BASED ON A GEOLOCATION
ACCESS CONTROL - BASED ON AN IP REPUTATION
ACCESS CONTROL - RATE LIMIT
REVERSE-PROXY FEATURES
URL REWRITING
URL REWRITING
CACHE
CACHE
CUSTOM RESPONSE PAGES
ERROR PAGE
MAINTENANCE PAGE
MAINTENANCE PAGE (2)
ERROR 503 PAGE
BLOCKING PAGE
CHALLENGES
LOGS MANAGEMENT
LOGS
AUDIT LOG
ALERT / TRAFFIC LOGS
FALSE POSITIVES MANAGEMENT
FALSE POSITIVES MANAGEMENT
FALSE POSITIVES MANAGEMENT (2)
FALSE POSITIVES MANAGEMENT (3)
FALSE POSITIVES MANAGEMENT (4)
CHALLENGES
REPORTING
ACCOUNT MANAGEMENT
ACCOUNT MANAGEMENT
REPORTING
CUSTOMER ACCOUNT ROLES
CUSTOMER ACCOUNT CREATION
CUSTOMER ACCOUNT REMOVAL
CHALLENGES
R&S®Cloud Protector API configuration
AGENDA
API CONFIGURATION
USING R&S®CLOUD PROTECTOR API
API KEYS
CONFIGURATION FOR ACCESSING THE API
CONFIGURATION FOR ACCESSING THE API (2)
EXAMPLES
ACCOUNT CREATION
ACCOUNT CREATION (2)
WEBSITES CREATION
WEBSITES CREATION (2)
QUIZZ API
CHALLENGE
Avant de finir...
Connaissances des protocoles HTTP/HTTPS et des réseaux TCP/IP
Connaissance du top10 de l’OWASP
Connaissances de base sur la technologie reverses proxy
Connaissances de base sur les expressions régulières