This track is designed for customers who are relatively new to the F5 product portfolio and are looking to take the first step on the path to F5 Certified Big-IP Administrator. This training will encompass networking basics, discuss where application calls are made in the TCP/IP stack and help the end user prepare for the F5 Certified Professional 101 exam on Application Delivery Fundamentals. Attendees are highly encouraged to create an account on F5 University (It’s Free!) and take the “Getting Started” series on F5 University and download and read the 101 study guide.
  • Registration and Breakfast
  • Keynote Address
  • Coffee and Networking
  • Breakout Session #1

    F5 Boot Camp 101-Preparation class for the F5 101 Test. Topics include OSI model, Networking essentials, F5 portfolio overview

  • Breakout Session #2

    F5 Boot Camp 101 continued

  • Lunch
  • Breakout Session #3

    F5 Boot Camp 101 continued

  • Break
  • Breakout Session #4

    F5 Boot Camp 101 continued

  • Final Keynote
  • Happy Hour

The 200 level education track is for F5 administrators who have had some hands on experience with the Big IP Platform and who wish to finish getting their Certified Big IP Administrator certification by taking the 201 exam. This track will focus on TMOS (Traffic Management Operating System) Administration and LTM (Local Traffic Manager) Fundamentals. As a prerequisite, attendees should have either successfully passed the 101 exam, and/or have a minimum of 6 months of hands on experience with the Big IP Platform.

  • Registration and Breakfast
  • Keynote Address
  • Coffee and Networking
  • Breakout Session #1

    F5 Boot Camp 201-Preparation class for the F5 201 Test. Topics include LTM essentials, Troubleshooting, TMOS commands- Instructor- Eric Mitchell, Secondary - Brad Otlin

  • Breakout Session #2

    F5 Boot Camp 201 continued

  • Lunch
  • Breakout Session #3

    F5 Boot Camp 201 continued

  • Break
  • Breakout Session #4

    F5 Boot Camp 201 continued

  • Final Keynote
  • Happy Hour

This track will provide a 2 day hands-on lab for customers seeking to understand the basics of setting up a Web Application Firewall to protect their mission critical applications. Day one will start off with an overview of the top 10 OWASP attacks by setting up a vulnerable application in the cloud and using real world techniques to hack that site. We will then set up WAF rules to block those attacks one by one. Day 2 will focus on advanced WAF techniques, blocking bot nets and using DataSafe to protect sensitive fields from attack.

  • Registration and Breakfast
  • Keynote Address
  • Coffee and Networking
  • Breakout Session #1

    Security Boot Camp 1 - Web Application Firewall - Understanding the Basics of setting up a Web application Firewall. This course will be a HANDS ON LAB- Attendees will be required to bring a latop to access the cloud based lab environment we have . The course will include an overview of basic Web Application Vulnerabilities using a lab environment with exposed applications and learning how to create Web Application Firewall rules to mitigate those vulnerabilities.

  • Lunch
  • Breakout Session #2

    Security Boot Camp 1 - Web Application Firewall - Understanding the Basics of setting up a Web application Firewall. This course will be a HANDS ON LAB- Attendees will be required to bring a latop to access the cloud based lab environment we have .

  • Break
  • Breakout Session #3

    Security Boot Camp 1 - Web Application Firewall - Understanding the Basics of setting up a Web application Firewall. This course will be a HANDS ON LAB- Attendees will be required to bring a latop to access the cloud based lab environment we have .

  • Final Keynote
  • Happy Hour

This track will focus on the Zero Trust Model, implementing Authentication techniques for both on Premise and in the Cloud to ensure that the users who are accessing your applications are who they say they are. This course will focus on multiple areas - On Premise, Cloud, Office 365, and using WAF solutions for public-facing applications to protect them from unauthorized access.

  • Registration and Breakfast
  • Keynote Address
  • Coffee and Networking
  • Breakout Session #1

    The Zero Trust Model- This course will provide a basic understanding of the Zero Trust model and using F5 Access Policy manager to help implement a Zero trust model

  • Breakout Session #2

    Implementing a Trust Model in the cloud. - Authentication techniques in both the AWS and Azure cloud.

  • Lunch
  • Breakout Session #3

    Office 365 - Authentication Techniques -Understand the latest use case of leveraging F5 to harden or replace ADFS and reduce your O365 server footprint. - Speaker Paul Deakin

  • Breakout Session #4

    Ansible – F5 Deep Dive Agenda: The name Ansible comes from a science fiction story. It was a technology that allowed the user to command and control all the starships in the galaxy. Do you want to command and control all the BIG-IPs in your galaxy? Come to this session to learn: • How to onboard and operate a BIG-IP device or VE through automation • F5’s support of our Ansible modules • Future state and roadmap for the F5 modules • How to participate in this user driven open source project Speaker- Lyle Marsh

  • Final Keynote
  • Happy Hour
This track will be primarily geared for F5 partners, and any government employees that are interested, in taking a deeper dive into some of the common use cases that our customers are demanding of technology professionals. We will cover multiple use cases through the day, with each session lasting 30-45 minutes with time to network with your F5 Account team at the end to discuss how this applies to Federal agencies . This will be a 1 day session.
  • Registration and Breakfast
  • Keynote Address
  • Coffee and Networking
  • Breakout Session #1

    Privilidged User Access (PUA) - Between Federal DOD mandates and the rise of IoT the need to have a secure multifactored authentication into critical systems has never been greater for our Federal Customers. This session will focus on this use case and our differentiators in this space. ( 30 minute session/ 30 minutes of account networking and Planning)

  • Breakout Session #2

    Cloud Access Point / TIC Access Point Use Case- a overview of how DHS is using F5 to control access to the cloud and how to potentially replicate that in your accounts ( 30 minutes of training/ 30 Minutes of Account and Opportunity Planning )

  • Lunch
  • Breakout Session #3

    Secure Cloud Computing Architecture- Understanding how F5 and Azure are teaming up to meeting DOD mandates around deploying in the cloud and how to leverage this in all of your Federal accounts

  • Break
  • Breakout Session #4

    Application Management - How to leverage the new BIQ IQ and it's built in analytics to drive application -cloud adoption and migrations ( 30 minutes of training and 30 minutes of account /opportunity planning).

  • Final Keynote
  • Happy Hour
This track is designed for customers who are relatively new to the F5 product portfolio and are looking to take the first step on the path to F5 Certified Big-IP Administrator. This training will encompass networking basics, discuss where application calls are made in the TCP/IP stack and help the end user prepare for the F5 Certified Professional 101 exam on Application Delivery Fundamentals. Attendees are highly encouraged to create an account on F5 University (It’s Free!) and take the “Getting Started” series on F5 University and download and read the 101 study guide.
  • Registration and Breakfast
  • Breakout Session #1

    F5 Boot Camp 101 continued- Day 2

  • Coffee and Networking
  • Breakout Session #2

    F5 Boot Camp 101 continued- Day 2

  • Lunch
  • Breakout Session #3

    iRules and iRulesLX - The Next Evolution of Network Programability-iRules LX is the next stage of evolution for network programmability that brings Node.js language support to the BIG-IP with version 12.1. Node.js allows JavaScript developers access to over 250,000 npm packages that makes code easier to write and maintain. Development teams can access and work on code with the new iRules LX Workspace environment and the new plug-in available for the Eclipse IDE and can be used for continuous integration builds. - Speaker- Adam Auerbach, Paul Deakin

  • Coffee and Networking
  • Breakout Session #4

    Vulnerability Remediation-his session will focus on how to harden the F5 to make it STIG compliant, and remediate application vulnerabilities. We will focus on how to patch / remediate (internally and externally), and how to Federate and combine attributes from multiple AAA’s (LocalAD, AD LDS, AKO, DMDC DS Logon, OAM) with CAC- Speaker Michael Coleman, Steve Lyon's assisting

The 200 level education track is for F5 administrators who have had some hands on experience with the Big IP Platform and who wish to finish getting their Certified Big IP Administrator certification by taking the 201 exam. This track will focus on TMOS (Traffic Management Operating System) Administration and LTM (Local Traffic Manager) Fundamentals. As a prerequisite, attendees should have either successfully passed the 101 exam, and/or have a minimum of 6 months of hands on experience with the Big IP Platform.

  • Registration and Breakfast
  • Breakout Session #1

    F5 Boot Camp 201 continued Day 2

  • Coffee and Networking
  • Breakout Session #2

    F5 Boot Camp 201 continued Day 2

  • Lunch
  • Breakout Session #3
  • Coffee and Networking
  • Breakout Session #4

    Vulnerability Remediation-his session will focus on how to harden the F5 to make it STIG compliant, and remediate application vulnerabilities. We will focus on how to patch / remediate (internally and externally), and how to Federate and combine attributes from multiple AAA’s (LocalAD, AD LDS, AKO, DMDC DS Logon, OAM) with CAC- Speaker Michael Coleman, Steve Lyon's assisting

This track will provide a 2 day hands-on lab for customers seeking to understand the basics of setting up a Web Application Firewall to protect their mission critical applications. Day one will start off with an overview of the top 10 OWASP attacks by setting up a vulnerable application in the cloud and using real world techniques to hack that site. We will then set up WAF rules to block those attacks one by one. Day 2 will focus on advanced WAF techniques, blocking bot nets and using DataSafe to protect sensitive fields from attack.

  • Registration and Breakfast
  • Breakout Session #1

    Security Bootcamp 1 - WAF -Continued

  • Coffee and Networking
  • Breakout Session #2

    Security Bootcamp 1 - WAF -Continued

  • Lunch
  • Breakout Session #3

    Security Bootcamp 1 - WAF -Continued

  • Coffee and Networking
  • Breakout Session #4

    Security Bootcamp 1 - WAF -Continued

This track will focus on the Zero Trust Model, implementing Authentication techniques for both on Premise and in the Cloud to ensure that the users who are accessing your applications are who they say they are. This course will focus on multiple areas - On Premise, Cloud, Office 365, and using WAF solutions for public-facing applications to protect them from unauthorized access.
  • Registration and Breakfast
  • Breakout Session #1

    "Access Policy Manager Essentials and Priviledge User Access (PUA) - Setting up a basic APM Policy, Creating a webtop, integrating with back end Authorities- AD, Kerberos, SAM for cloud architectures L - Bill Church, Mike Slavinsky- Proctor assistant ***This will be an interactive class and for the best experience end users should bring a laptop to be able to participate in the labs licy Manager Essentials- Setting up a basic APM Policy, Creating a webtop, integrating with back end Authorities- AD, Kerberos, SAML - Bill Church"

  • Coffee and Networking
  • Breakout Session #2

    Access Policy Manager Essentials and Priviledge User Access (PUA) for SCCA and other cloud architectures continued

  • Lunch
  • Breakout Session #3

    Cloud Sourcing to protect Web Applications - What's new in F5's Web Application Firewall- Peter Scheffler Speaker

  • Coffee and Networking
  • Breakout Session #4

    Cloud Sourcing to protect Web Applications - What's new in F5's Web Application Firewall- Continued- Peter Scheffler Speaker