Académique Documents
Professionnel Documents
Culture Documents
2017
EN
Summary
Training for DenyAll products
DenyAll offers customers and partners a range of certified trainings covering the
implementation cycle of its products. Students will be certified at the end of each
class. They can also improve their applications security knowledge, by following a
course on recent web application attacks.
It is critical that the IT engineers and security administrators managing the DenyAll
products, be they-end-users or partners, are properly trained on the products in
order to design effective security policies for their Web applications. The classes
are designed for security architects, implementation engineers and system
administrators. They will also be useful for application developpers wishing
to increase the security of the applications they deliver to end-users.
The training classes described in this catalog are delivered in English. A similar
catalog is available for trainings in French. They cover all the DenyAll products, from
implementation, to daily operations and administration. DenyAll trainings
are a great way to enhance general knowledge about security, by understanding the
recent Web Application attacks and the security solutions to identify the malicious
behavior of hackers. Deepening of ones knowledge on regular expression syntax
is often very useful. Finally, training on Vulnerability Management & Penetration
Testing, is a useful complement for WAF administrators.
The training classes in this catalog are delivered by experts in DenyAlls headquarters
office in Svres, France. They can also be tailored to a customers specific needs and
delivered on customer premises. The trainings can be delivered in English, German
and French.
June
April
March
August
January
October
2017
February
December
November
September
Number of days
De
ny
5
De All
n W
De yAl eb
23/24/25/26/27
10/11/12/13/14
ny l W Ap
2017 Planning
Al eb pli
l W S ca
eb erv tion
Ac ice Fi
ce s F re
De ss ir wa
ny M ew ll
1
Al an al
lV ag l
ul er
ne
ra
bi
lit
y
M
an
ag
De er
ny
3 Al
lr
W
eb
4
Pre-requirements
EQUIPMENT
The trainee must bring the following equipment (adequate network access will be
provided):
Computer 64-bit laptop with 4GB of RAM minimum
A Recent browser is required with software or an extension to the HTTP trace
-----connector (HttpFox, HttpWatch, TamperData, Wireshark, ...)
A Virtualization solution (VMware, VirtualBox, ...)
TECHNICAL PRE-REQUIREMENTS
5
Web Application Firewall / Web Access Manager / Web Services Firewall
Duration: 5 days
Price: 5.000
Audience: Security Engineers/Administrators
Support: 50% Slide / 50% practical exercices
GOALS
TECHNICAL PRE-REQUIREMENTS
CERTIFIED TRAINING
6
Web Application Firewall / Web Access Manager / Web Services Firewall
DESCRIPTION
This training is carried out on the latest stable version of the product, its contents
are therefore regularly updated to incorporate the latest features and innovations.
Therefore, thebelow schedule reflects only the outline that will be covered during
the training. Each module consists of a theoretical part at first followed by a second
portion oriented practice through various workshops.
- Getting Started
- Security attacks and defenses (ICX, workflow, forensic...)
- Reliability and continuity of traffic (high-availability, load balancing...)
- Performance and optimization (caching, compression, SSL acceleration...)
- Administration (maintenance, log management, monitoring...)
- Troubleshooting and Diagnostics
- Compliance scheme
- Encryption
- Signature
- Workflow Workshops
- Perimeter authentication
- Web SSO
- Authorization Policies
- Management of logs
- Customization
- Troubleshooting and Diagnostics
7
Vulnerability Manager
Duration: 1 day
Price: 1.000
Audience: Security Engineers/Administrators
Support: 50% Slide / 50% practical exercices
GOALS
TECHNICAL PRE-REQUIREMENTS
DESCRIPTION
This training is carried out on the latest stable version of the product, its contents
are therefore regularly updated to incorporate the latest features and innovations.
Therefore, thebelow schedule reflects only the outline that will be covered during
the training. Each module consists of a theoretical part at first followed by a second
portion oriented practice through various workshops.
- Introduction Exclusively
- Scan network and system delivered at
customer site
- Scan Web Applications
on an individual
- How to exploit vulnerability reports basis
- Vulnerability Management
- Automation
- Administration
CERTIFIED TRAINING
8
rWeb
Duration: 3 days
Price: 3.000
Audience: Security Engineers/Administrators
Support: 50% Slide / 50% practical exercices
GOALS
TECHNICAL PRE-REQUIREMENTS
DESCRIPTION
This training is carried out on the latest stable version of the product, its contents
are therefore regularly updated to incorporate the latest features and innovations.
Therefore, thebelow schedule reflects only the outline that will be covered during
the training. Each module consists of a theoretical part at first followed by a second
portion oriented practice through various workshops.
With over 15 years of experience DenyAll will answer your questions about the
protection of Web applications as well as through its specialized training team.
10
TERMS OF REGISTRATION / PAYMENT
Payment is made by bank transfer. Our team will be at your disposal after
your registration.
11
Svres, France Montpellier, France Rohde & Schwarz Cybersecurity GmbH
(Headquarters) Munich, Allemagne
Tel: +33 (0)1 46 20 96 00 Tel: +33 (0)1 46 20 96 00 Tel: +49 (0)89 41 29 - 206 000
Fax: +33 (0)1 46 20 96 02 Fax: +33 (0)1 46 20 96 02 Tel: +49 (0) 30 65 884 - 223
info@denyall.com - www.denyall.com