A10 Defend 6 with aGalaxy 6
For training/certification requests or questions, contact: training@a10networks.com
Course Description
Instructs Network Operations, Development Operations, Network Security, and Architects on implementing an effective threat protection system for A10 ACOS deployments in data center environment.
Objectives
Students learn to:
- Deploy A10 Defend in different topologies
- Use aGalaxy to orchestrate A10 Defend devices
- Monitor traffic and detect attacks
- Configure and apply mitigation strategies against the following DDoS attacks:
- volumetric
- protocol
- reflection
- resource
- Configure a Zero-day Attack Pattern Recognition (ZAPR) solution
- Generate reports
- Examine network traffic at the packet level
Class Structure
- Classroom Discussion 50%
- Lab Exercises 50%
Prerequisites
- OSI reference model
- Network topology and administration
Audience
- Network Operations (NetOps)
- Development Operations (DevOps)
- Network Security (NetSec)
- Architects (Arch)
Outline
| TOPIC | LAB | TIME (Hours) |
|---|---|---|
Overview Types of DDoS Attacks | X | 1 |
Configuration Components of A10 Threat Protection System | X | 1 |
Attack Detection Zones | X | 1.5 |
Attack Mitigation Incident Creation | 0.5 | |
Traffic Rate Limiting GLIDs | X | 1 |
Layer 3/4 Security TCP Security Measures | X | 1 |
Layer 7 Security DNS Security Measures | X | 1.0 |
Zone Profiles Zone Service Protection Profiles | X | 1.0 |
ZAPR Configuring ZAPR | X | 1.0 |
Asymmetric Reactive Deployment A10 Defend Detector | X | 1.0 |
Threat Control Attack Map | X | 1.0 |
Reporting and Troubleshooting Reports | X | 1.0 |