This track is designed for customers who are relatively new to the F5 product portfolio and are looking to take the first step on the path to F5 Certified Big-IP Administrator. This training will encompass networking basics, discuss where application calls are made in the TCP/IP stack and help the end user prepare for the F5 Certified Professional 101 exam on Application Delivery Fundamentals. Attendees are highly encouraged to create an account on F5 University (It’s Free!) and take the “Getting Started” series on F5 University and download and read the 101 study guide.
  • Registration & Breakfast
  • Welcome & Keynote Address
  • Coffee & Networking
  • Breakout Session #1

    Preparation class for the F5 101 test. Topics include OSI model, networking essentials, F5 portfolio overview.

  • Breakout Session #2

    F5 Boot Camp 101 Continued.

  • Lunch
  • Breakout Session #3

    F5 Boot Camp 101 Continued.

  • Networking Break
  • Breakout Session #4

    F5 Boot Camp 101 Continued.

  • Final Keynote
  • Networking Happy Hour

The 200 level education track is for F5 administrators who have had some hands on experience with the Big IP Platform and who wish to finish getting their Certified Big IP Administrator certification by taking the 201 exam. This track will focus on TMOS (Traffic Management Operating System) Administration and LTM (Local Traffic Manager) Fundamentals. As a prerequisite, attendees should have either successfully passed the 101 exam, and/or have a minimum of 6 months of hands on experience with the Big IP Platform.

  • Registration & Breakfast
  • Welcome & Keynote Address
  • Coffee & Networking
  • Breakout Session #1

    Preparation class for the F5 201 test. Topics include LTM essentials, troubleshooting, TMOS commands.

  • Breakout Session #2

    F5 Boot Camp 201 Continued.

  • Lunch
  • Breakout Session #3

    F5 Boot Camp 201 Continued.

  • Networking Break
  • Breakout Session #4

    F5 Boot Camp 201 Continued.

  • Final Keynote
  • Networking Happy Hour

This track will provide a 2 day hands-on lab for customers seeking to understand the basics of setting up a Web Application Firewall to protect their mission critical applications. Day one will start off with an overview of the top 10 OWASP attacks by setting up a vulnerable application in the cloud and using real world techniques to hack that site. We will then set up WAF rules to block those attacks one by one. Day 2 will focus on advanced WAF techniques, blocking bot nets and using DataSafe to protect sensitive fields from attack.

  • Registration & Breakfast
  • Welcome & Keynote Address
  • Coffee & Networking
  • Breakout Session #1

    Understanding the basics of setting up a Web Application Firewall. This course will be a hands-on lab! Attendees will be required to bring a latop to access the cloud-based lab environment we have. The course will include an overview of basic Web Application Vulnerabilities using a lab environment with exposed applications and learning how to create Web Application Firewall rules to mitigate those vulnerabilities.

  • Lunch
  • Breakout Session #2

    Understanding the basics of setting up a Web Application Firewall continued.

  • Networking Break
  • Breakout Session #3

    Understanding the basics of setting up a Web Application Firewall continued.

  • Final Keynote
  • Networking Happy Hour

This track will focus on the Zero Trust Model, implementing Authentication techniques for both on Premise and in the Cloud to ensure that the users who are accessing your applications are who they say they are. This course will focus on multiple areas - On Premise, Cloud, Office 365, and using WAF solutions for public-facing applications to protect them from unauthorized access.

  • Registration & Breakfast
  • Welcome & Keynote Address
  • Coffee & Networking
  • Breakout Session #1

    The Zero Trust Model - This course will provide a basic understanding of the Zero Trust Model and using F5 Access Policy Manager to help implement.

  • Breakout Session #2

    MultiLayered DDOS Protection - Implementing DDOS protection at layers 3-7 of the OSI model to protect against advanced DDOS attacks from Automated tools (BOTS), Hackers or Nation States.

  • Lunch
  • Breakout Session #3

    Office 365 - Understand the latest use case of leveraging F5 to harden or replace ADFS and reduce your O365 server footprint.

  • Networking Break
  • Breakout Session #4

    Ansible | F5 Deep Dive - The name Ansible comes from a science fiction story. It was a technology that allowed the user to command and control all the starships in the galaxy. Do you want to command and control all the BIG-IPs in your galaxy?

    Come to this session to learn:
    • How to onboard and operate a BIG-IP device or VE through automation
    • F5’s support of our Ansible modules
    • Future state and roadmap for the F5 modules
    • How to participate in this user driven open source project

  • Final Keynote
  • Networking Happy Hour

This track will be primarily geared for F5 partners, and any government employees that are interested, in taking a deeper dive into some of the common use cases that our customers are demanding of technology professionals. We will cover multiple use cases through the day, with each session lasting 30-45 minutes with time to network with your F5 Account team at the end to discuss how this applies to Federal agencies. This will be a 1 day session.

  • Registration & Breakfast
  • Welcome & Keynote Address
  • Coffee & Networking
  • Breakout Session #1

    Cloud Access Point & Secure Cloud Computing Architecture

  • Break
  • Breakout Session #2

    AWAF

  • Break
  • Breakout Session #3

    SSLO

  • Lunch
  • Breakout Session #4

    Blue

  • Break
  • Breakout Session #5

    O365

  • Break
  • Breakout Session #6

    Privileged User Access - Between Federal DoD mandates and the rise of IoT, the need to have a secure multifactored authentication into critical systems has never been greater for our Federal Customers. This session will focus on this use case and our differentiators in this space.

  • Final Keynote
  • Networking Happy Hour

This track is designed for customers who are relatively new to the F5 product portfolio and are looking to take the first step on the path to F5 Certified Big-IP Administrator. This training will encompass networking basics, discuss where application calls are made in the TCP/IP stack and help the end user prepare for the F5 Certified Professional 101 exam on Application Delivery Fundamentals. Attendees are highly encouraged to create an account on F5 University (It’s Free!) and take the “Getting Started” series on F5 University and download and read the 101 study guide.

  • Registration, Networking & Breakfast
  • Breakout Session #1

    F5 Boot Camp 101 continued from Day 1.

  • Coffee & Networking
  • Breakout Session #2

    F5 Boot Camp 101 Continued.

  • Lunch
  • Breakout Session #3

    SSL Orchestration and Automation with SSLO version 5.0 LAB.

  • Coffee & Networking
  • Breakout Session #4

    SSL Orchestration and Automation with SSLO version 5.0 LAB continued.

The 200 level education track is for F5 administrators who have had some hands on experience with the Big IP Platform and who wish to finish getting their Certified Big IP Administrator certification by taking the 201 exam. This track will focus on TMOS (Traffic Management Operating System) Administration and LTM (Local Traffic Manager) Fundamentals. As a prerequisite, attendees should have either successfully passed the 101 exam, and/or have a minimum of 6 months of hands on experience with the Big IP Platform.

  • Registration, Networking, & Breakfast
  • Breakout Session #1

    F5 Boot Camp 201 continued from Day 1.

  • Coffee & Networking
  • Breakout Session #2

    F5 Boot Camp 201 Continued.

  • Lunch
  • Breakout Session #3

    Meeting SCCA/VDSS Requirements - In this session we will discuss the challenges of DoD cloud adoption and examine exciting solutions to meeting complex requirements of the Secure Cloud Computing Architecture.

    Specific areas we will explore are:
    • CAP/SCCA/VDSS requirements
    • The status of Azure Government and the programs in place to use it
    • How F5’s Virtual Data Security Stack helps you meet the SCCA mandates
    • Live demo of deploying a VDSS into Azure Government Cloud
    • Overview of a POC for a shared VDSS model for Cybersecurity Service Provider organizations
    • Solutions for a virtual, scalable way to meet O365 CAP/VDSS demands using Azure and F5

  • Coffee & Networking
  • Breakout Session #4

    AWS and F5 Integration Deep Dive - Understand how to deploy F5 in the AWS Gov or C2S cloud. Deploy a F5 Web Application Firewall, leverage autoprovisioning and auto scaling features, and review new pricing and licensing models.

This track will provide a 2 day hands-on lab for customers seeking to understand the basics of setting up a Web Application Firewall to protect their mission critical applications. Day one will start off with an overview of the top 10 OWASP attacks by setting up a vulnerable application in the cloud and using real world techniques to hack that site. We will then set up WAF rules to block those attacks one by one. Day 2 will focus on advanced WAF techniques, blocking bot nets and using DataSafe to protect sensitive fields from attack.

  • Registration, Networking & Breakfast
  • Breakout Session #1

    Security Boot Camp continued from Day 1.

  • Coffee & Networking
  • Breakout Session #2

    Security Boot Camp Continued.

  • Lunch
  • Breakout Session #3

    Security Boot Camp Continued.

  • Coffee & Networking
  • Breakout Session #4

    Security Boot Camp Continued.

This track will focus on the Zero Trust Model, implementing Authentication techniques for both on Premise and in the Cloud to ensure that the users who are accessing your applications are who they say they are. This course will focus on multiple areas - On Premise, Cloud, Office 365, and using WAF solutions for public-facing applications to protect them from unauthorized access.

  • Registration, Networking & Breakfast
  • Breakout Session #1

    Access Policy Manager Essentials and Priviledge User Access - Setting up a basic APM policy, creating a webtop, integrating with back end authorities.

    *This will be an interactive class, and for the best experience, end users should bring a laptop to be able to participate in the labs.

  • Coffee & Networking
  • Breakout Session #2

    Access Policy Manager Essentials and Priviledge User Access Continued.

  • Lunch
  • Breakout Session #3

    Tactical Identity Management - Identity management for forward deployed personnel. Understanding, securing, and optimizing access for overseas personnel who have multiple contraints on their ability to access remote systems. Lessons learnd from hands-on deployments in the field.

  • Coffee & Networking
  • Breakout Session #4

    Tactical Identity Management Continued.