The topics presented in this course are organized around a simple customer scenario involving a photo-sharing website and its potential vulnerabilities to business logic abuse and other threats. You’ll learn how to identify common threats to such a web application, and then deploy ASM’s Real Traffic Policy Builder® to quickly eliminate most threats. You’ll see how ASM can apply its attack signatures to inspect user input and alert you if a violation is detected. And you’ll step through the process of using the Deployment Wizard to create, configure, and manage a basic application security policy using the automatic option.
Launch: Getting Started with BIG-IP Application Security Manager (ASM)