Skip to content

Commit 5b7aa62

Browse files
authored
Merge pull request #284 from f5devcentral/dev
Lab Updates
2 parents edfce57 + 7e73438 commit 5b7aa62

File tree

4 files changed

+11
-17
lines changed

4 files changed

+11
-17
lines changed

docs/class1/intro.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Accessing UDF (F5 Unified Demo Framework)
7474
+----------------------------------------------------------------------------------------------+
7575

7676
+----------------------------------------------------------------------------------------------+
77-
| The Lab environment window will now be displayed. Click on the **Documentation** tab in the |
77+
| The Lab environment window will now be displayed. Click on the **Deployment** tab in the |
7878
| horizontal navigation links. Locate and observe the state of **Client** system. |
7979
| |
8080
| In approximately 5-7 minutes the associated **yellow gear** starting icon will change to a |

docs/class2/intro.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ more prevalant, the ACME's Risk and Compliance organization has mandated that We
1111
Application Firewalls be deployed across all public facing applications within the next 30 days.
1212

1313
As the Network Security Engineer, you are tasked with evaluating how to securely
14-
deploy a WAF across your entire public application environment. At first you consider
14+
deploy a WAF across your entire public application environment. At first, you consider
1515
the traditional methods of deploying and managing your native WAFs in the Data Center, AWS, Azure,
16-
GCP but quickly realize that learning and managing multiple WAF technologies would be time-consuming
16+
GCP, but quickly realize that learning and managing multiple WAF technologies would be time-consuming
1717
and difficult to operate.
1818

1919
You recently saw a post on LinkedIn about a F5 SaaS product claiming to solve multi-cloud

docs/class3/intro.rst

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,20 +7,21 @@ Congratulations! You are a Network Security Engineer at ACME Corp.
77

88
ACME has an Application Team that supports internally developed traditional and
99
modern apps, vendor provided and SaaS applications. As security threats are becoming
10-
more prevalant, the ACME's Risk and Compliance organization has mandated that Web
11-
Application Firewalls be deployed across all public facing applications within the next 30 days.
10+
more prevalant, the ACME's Risk and Compliance organization has mandated that a segmentation program
11+
be configured as part of the organizations larger zero-trust program. ACME Corp would like to implement
12+
segmentation strategies to reduce their attack surface and enable faster response against zero-day attacks.
1213

1314
As the Network Security Engineer, you are tasked with evaluating how to securely
14-
deploy a WAF across your entire public application environment. At first you consider
15-
the traditional methods of deploying and managing your native WAFs in the Data Center, AWS, Azure,
16-
GCP but quickly realize that learning and managing multiple WAF technologies would be time-consuming
15+
extend segmentation controls out to the internet edge. At first you consider
16+
the traditional methods of deploying and managing your native ACLs and geo-blocks in the Data Center, AWS, Azure,
17+
GCP but quickly realize that learning and managing multiple segmentation technologies would be time-consuming
1718
and difficult to operate.
1819

1920
You recently saw a post on LinkedIn about a F5 SaaS product claiming to solve multi-cloud
2021
appplication security complexities. Given your current timeline and industry knowledge of F5 being a
2122
leader for decades, you decide to check it out and end up in the chair you are sitting in today:
22-
Taking a first-hand look at how F5 makes WAAP (Web Application and API Protection) simple, quick to deploy,
23-
and secure.
23+
Taking a first-hand look at how F5 makes automating security controls for segmentation and zero-day attacks
24+
simple, quick to deploy, and secure.
2425

2526

2627

docs/class6/intro.rst

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -129,13 +129,6 @@ step below to access the F5 Distributed Cloud Lab Tenant.
129129
| |intro009| |
130130
+----------------------------------------------------------------------------------------------+
131131

132-
|
133-
| **DO NOT CLICK STOP**. If you do so you will have to wait till it stops then restart |
134-
| |
135-
| your JumpHost for this lab. |
136-
+----------------------------------------------------------------------------------------------+
137-
| |intro011| |
138-
+------------------------------------------
139132

140133
.. |intro001| image:: _static/intro-001.png
141134
:width: 800px

0 commit comments

Comments
 (0)