Programme

    1. Identity

    2. Portfolio

    3. End

    4. Support Area - Introduction

    5. Support Area - Support Access

    6. Support Area -Customer Area

    7. Support Area - No Account

    8. Support Area - My First Ticket

    9. Support Area - My First Ticket (2)

    10. Support Area - My First Ticket (3)

    11. Support Area - My First Ticket (4)

    12. Support Area - My First Ticket (5)

    13. Support Area - My First Ticket (6)

    14. Support Area - My First Answer

    15. Support Area - Support Type

    16. Support Area - End

    1. Introduction

    2. Agenda

    3. HTTP Basics - Introduction

    4. HTTP Basics - HTTP Protocol

    5. HTTP Basics - HTTP Evolution

    6. HTTP Basics - HTTP Evolution (2)

    7. HTTP Basics - HTTP Evolution (3)

    8. HTTP Basics - HTTP Evolution (4)

    9. HTTP Basics - HTTP Transactions

    10. HTTP Basics - URL

    11. HTTP Basics - HTTP Request Syntax

    12. HTTP Basics - HTTP Methods

    13. HTTP Basics - HTTP Methods (2)

    14. HTTP Basics - HTTP Methods (3)

    15. HTTP Basics - HTTP Methods (4)

    16. HTTP Basics - HTTP Methods (5)

    17. HTTP Basics - GET vs POST

    18. HTTP Basics - HTTP Header

    19. HTTP Basics - HTTP Request Headers

    20. HTTP Basics - HTTP Request Headers (2)

    21. HTTP Basics - HTTP Response Headers

    22. HTTP Basics - HTTP Response Headers (2)

    23. HTTP Basics - HTTP Response Status Code

    24. HTTP Basics - Main HTTP Response Status

    25. HTTP Basics - Main HTTP Response Status (2)

    26. HTTP Basics - Main HTTP Response Status (3)

    27. HTTP Basics - End

    28. HTTP Transactions - Introduction

    29. HTTP Transactions - Important Transactions

    30. HTTP Transactions - Basic Transaction

    31. HTTP Transactions - Redirection

    32. HTTP Transactions - Authentication

    33. HTTP Transactions - TCP Connection

    34. HTTP Transactions - TCP Connection

    35. HTTP Transactions - Data Persistency

    36. HTTP Transactions - Data Compression

    37. HTTP Transactions - HTTP Caching

    38. HTTP Transactions - HTTP No Caching

    39. HTTP Transactions - HTTP Cache: Refresh Data

    40. HTTP Transactions - Cache-Control Header

    41. HTTP Transactions - Useful Tools

    42. HTTP Transactions - Useful Tools (2)

    43. HTTP Transactions - Useful Tools (3)

    44. HTTP Transactions - End

    45. SSL Concepts - Introduction

    46. SSL Concepts - SSL/TLS

    47. SSL Concepts - SSL Transaction

    48. SSL Concepts - How It Works

    49. SSL Concepts - Encryption Algorithms

    50. SSL Concepts - Encryption Algorithms (2)

    51. SSL Concepts - Diffie-Hellman

    52. SSL Concepts - RSA

    53. SSL Concepts - PKI & Certificate

    54. SSL Concepts - Server Certificates

    55. SSL Concepts - Client Certificates

    56. SSL Concepts - Simple TLS Handshake

    57. SSL Concepts - Simple TLS Handshake (2)

    58. SSL Concepts - Client-Auth TLS

    59. SSL Concepts - TLS 1.3 Handshake

    60. SSL Concepts TLS 1.3 vs 1.2

    61. SSL Concepts - SSL Architecture

    62. SSL Concepts - SSL Architecture (2)

    63. SSL Concepts - End

    64. Regexp - Introduction

    65. Regexp - The Notion

    66. Regexp - Useful Tools

    67. Regexp - Main Special Chars

    68. Regexp - Simple Examples

    69. Regexp - Use Cases

    70. Regexp - End

    71. Quiz HTTP

    1. Introduction

    2. Agenda

    3. Concepts & Architecture

    4. R&S®Cloud Protector? How different from on-prem WAF?

    5. Architecture

    6. Detailed Architecture and used tools

    7. 3 steps to set up R&S®Cloud Protector

    8. 3 security levels

    9. 3 possible reactions in case of an attack

    10. 3 dashboards

    11. 3 management roles

    12. Administrator Account Creation & Initial Setup

    13. Registration on R&S®Cloud Protector

    14. Account Creation & First Application Configuration

    15. Feature Plan Details

    1. R&S®Cloud Protector GUI configuration

    2. Agenda

    3. APPLICATION MANAGEMENT

    4. MANAGE APPLICATIONS

    5. APPLICATION CREATION

    6. APPLICATION CREATION (2)

    7. DNS REDIRECTION

    8. DNS REDIRECTION - TEST & PRODUCTION

    9. DNS REDIRECTION - PRODUCTION

    10. SECURITY CONFIGURATION

    11. SECURITY CONFIGURATION - SECURITY LEVEL

    12. SECURITY CONFIGURATION

    13. SECURITY CONFIGURATION (2)

    14. BEHAVIOUR ON ATTACK DETECTION

    15. SECURITY CONFIGURATION - SSL/TLS CONFIGURATION

    16. SSL/TLS CONFIGURATION

    17. SSL/TLS CONFIGURATION (2)

    18. SSL/TLS CONFIGURATION (3) - LET'S ENCRYPT

    19. SSL/TLS CONFIGURATION (3) - ACCESS CONTROL

    20. ACCESS CONTROL

    21. ACCESS CONTROL - BASED ON AN IP ADDRESS

    22. ACCESS CONTROL - BASED ON A GEOLOCATION

    23. ACCESS CONTROL - BASED ON AN IP REPUTATION

    24. ACCESS CONTROL - RATE LIMIT

    25. REVERSE-PROXY FEATURES

    26. URL REWRITING

    27. URL REWRITING

    28. CACHE

    29. CACHE

    30. CUSTOM RESPONSE PAGES

    31. ERROR PAGE

    32. MAINTENANCE PAGE

    33. MAINTENANCE PAGE (2)

    34. ERROR 503 PAGE

    35. BLOCKING PAGE

    36. CHALLENGES

    37. LOGS MANAGEMENT

    38. LOGS

    39. AUDIT LOG

    40. ALERT / TRAFFIC LOGS

    41. FALSE POSITIVES MANAGEMENT

    42. FALSE POSITIVES MANAGEMENT

    43. FALSE POSITIVES MANAGEMENT (2)

    44. FALSE POSITIVES MANAGEMENT (3)

    45. FALSE POSITIVES MANAGEMENT (4)

    46. CHALLENGES

    47. REPORTING

    48. ACCOUNT MANAGEMENT

    49. ACCOUNT MANAGEMENT

    50. REPORTING

    51. CUSTOMER ACCOUNT ROLES

    52. CUSTOMER ACCOUNT CREATION

    53. CUSTOMER ACCOUNT REMOVAL

    54. CHALLENGES

    1. R&S®Cloud Protector API configuration

    2. AGENDA

    3. API CONFIGURATION

    4. USING R&S®CLOUD PROTECTOR API

    5. API KEYS

    6. CONFIGURATION FOR ACCESSING THE API

    7. CONFIGURATION FOR ACCESSING THE API (2)

    8. EXAMPLES

    9. ACCOUNT CREATION

    10. ACCOUNT CREATION (2)

    11. WEBSITES CREATION

    12. WEBSITES CREATION (2)

    13. QUIZZ API

    14. CHALLENGE

    15. Avant de finir...

A propos de cette formation

  • 171 leçons

Pré-requis

  • Connaissances des protocoles HTTP/HTTPS et des réseaux TCP/IP

  • Connaissance du top10 de l’OWASP

  • Connaissances de base sur la technologie reverses proxy

  • Connaissances de base sur les expressions régulières