Gain Valuable Access Policy Manager Knowledge with an F5 BIG-IP APM Course

Download Course Contents

F5 BIG-IP APM: Access Policy Manager Course Overview

F5 BIG-IP APM (Access Policy Manager) is a software-based solution that enables organizations to secure employee and customer access to critical applications, data, and network devices. It helps protect users, data and applications from threats, helps to ensure the availability of critical resources, and delivers a secure, reliable and streamlined user experience. By employing advanced authentication methods, the manager is able to authenticate users and control their access while providing robust policy enforcement.
The F5 BIG-IP APM course is designed to help IT professionals and DevOps engineers understand how to install, configure, maintain, and troubleshoot F5 Access Policy Manager deployments. Topics covered in the course include topics such as how to deploy Access Policy Manager to protect applications, how to configure remote access and RADIUS for users, how to deploy AAA and 2FA for user access, and how to troubleshoot issues and resolvers.

This is a Rare Course and it can be take up to 3 weeks to arrange the training.


The 1-on-1 Advantage

Get 1on-1 session with our expert trainers at a date & time of your convenience.

Flexible Dates

Start your session at a date of your choice-weekend & evening slots included, and reschedule if necessary.

4-Hour Sessions

Training never been so convenient- attend training sessions 4-hour long for easy learning.

Destination Training

Attend trainings at some of the most loved cities such as Dubai, London, Delhi(India), Goa, Singapore, New York and Sydney.

You will learn:

Module 1: Setting Up the BIG-IP System
  • Introducing the BIG-IP System
  • Initially Setting Up the BIG-IP System
  • Archiving the BIG-IP Configuration
  • Leveraging F5 Support Resources and Tools
  • Review of BIG-IP LTM
  • Introduction to the Access Policy
  • Web Access Application Configuration Overview
  • Web Application Access Configuration in Detail
  • Navigating the Access Policy
  • BIG-IP APM Sessions and Access Licenses
  • Session Variables and sessiondump
  • Session Cookies
  • Access Policy General Purpose Agents List
  • Introduction to Access Policy Authentication
  • Active Directory AAA Server
  • One-Time Password
  • Local User Database
  • Introduction to Portal Access
  • Portal Access Configuration Overview
  • Portal Access Configuration
  • Portal Access in Action
  • Concurrent User Licensing
  • VPN Concepts
  • Network Access Configuration Overview
  • Network Access Configuration
  • Network Access in Action
  • Access Policy Macros
  • Configuring Macros
  • An Access Policy is a Flowchart
  • vAccess Policy Logon Agents
  • Configuring Logon Agents
  • Client-Side Endpoint Security
  • Server-Side Endpoint Security Agents List
  • Server-Side and Client-Side Checks Differences
  • Fibre Channel Communication
  • Virtualization in Fibre Channel SAN
  • Active Directory Query
  • Active Directory Nested Groups
  • Configuration in Detail
  • Application Access
  • Remote Desktop
  • Network Access Optimized Tunnels
  • Landing Page Bookmarks
  • Introduction to Access Control Lists
  • Configuration Overview
  • Dynamic ACLs
  • Portal Access ACLs
  • Remote Desktop Single Sign-On
  • Portal Access Single Sign-On
  • iRules Introduction
  • Basic TCL Syntax
  • iRules and Advanced Access Policy Rules
  • Customization Overview
  • BIG-IP Edge Client
  • Advanced Edit Mode Customization
  • Landing Page Sections
  • SAML Conceptual Overview
  • SAML Configuration Overview
  • BIG-IP Edge Client for Windows Installation
  • BIG-IP Edge Client in Action
Live Online Training (Duration : 24 Hours) Fee On Request
We Offer :
  • 1-on-1 Public - Select your own start date. Other students can be merged.
  • 1-on-1 Private - Select your own start date. You will be the only student in the class.

4 Hours
8 Hours
Week Days

Start Time : At any time

12 AM
12 PM

1-On-1 Training is Guaranteed to Run (GTR)
Group Training
Date On Request
Course Prerequisites

The following prerequisites are recommended before attending an F5 BIG-IP APM: Access Policy Manager Training:
• Working knowledge of networking concepts such as ports, IP addresses, hostnames, and DNS
• Basic understanding of security concepts such as authentication, authorization and encryption
• Familiarity with RADIUS, LDAP, and Kerberos
• Understanding of web application security and secure web development
• Ability to interpret and interpret policy settings and configurations

Target Audience

The target audience for F5 BIG-IP APM: Access Policy Manager training is IT professionals responsible for managing and controlling application access in their organizations
These include system administrators, IT planners and architects, business analysts, IT executives, application security professionals and risk managers
This training module provides an overview on how to design, configure, maintain and troubleshoot access policies with F5's Access Policy Manager
It also teaches how to deploy and enforce business-driven access control models that fulfill an organization’s needs for managing compliance, security, user experience and identity management
Participants will gain knowledge on how to configure and design secure single-sign-on (SSO) authentication approaches, as well as how to use powerful activities like adaptors, detach/reattach, resource filtering, and enforcement of device posture before granting access to sensitive applications

Learning Objectives of F5 BIG-IP APM: Access Policy Manager

1. Identify the features of the BIG-IP Access Policy Manager (APM).
2. Explain the purpose of APM and its features and capabilities.
3. Set up an APM policy, configure authentication and session policies, and maintain user accounts.
4. Describe how to integrate BIG-IP APM with other F5 products.
5. Utilize BIG-IP APM to secure enterprise systems with access control methods, such as two-factor authentication, endpoint posture validation, and role-based access.
6. Set up a secure gateway, such as a virtual private network, between enterprises and cloud infrastructures.
7. Manage external authentication services, such as LDAP, Radius, RSA SecurID, and SAML.
8. Design portal, resource, and network access profiles.
9. Configure, deploy, and troubleshoot BIG-IP APM.
10. Leverage oversight and reporting features to monitor the security of your remote environments.


After you submit your payment, you will land on the payment confirmation screen.It contains your payment confirmation message. You will likewise get a confirmation email after your transaction is submitted.
Buy-Now. Pay-Later option is available using credit card in USA and India only.
You will receive the digital certificate post training completion via learning enhancement tool after registration.
Yes you can.
Yes, we do. For details go to flexi
You can pay through debit/credit card or bank wire transfer.
Yes you can request your customer experience manager for the same.
We do accept all major credit cards from Visa, Mastercard, American Express, and Discover.
Credit card transactions normally take 48 hours to settle. Approval is given right away; however,it takes 48 hours for the money to be moved.
Yes, we do accept partial payments, you may use one payment method for part of the transaction and another payment method for other parts of the transaction.
Yes, if we have an office in your city.
Yes, we do offer corporate training More details
Yes, we do.
Yes, we also offer weekend classes.
Yes, Koenig follows a BYOL(Bring Your Own Laptop) policy.
It is recommended but not mandatory. Being acquainted with the basic course material will enable you and the trainer to move at a desired pace during classes.You can access courseware for most vendors.
Yes, this is our official email address which we use if a recipient is not able to receive emails from our email address.
1-on-1 Public - Select your start date. Other students can be merged.
1-on-1 Private - Select your start date. You will be the only student in the class.
Yes, course requiring practical include hands-on labs.
You can buy online from the page by clicking on "Buy Now". You can view alternate payment method on payment options page.
Yes, you can pay from the course page and flexi page.
Yes, the site is secure by utilizing Secure Sockets Layer (SSL) Technology. SSL technology enables the encryption of sensitive information during online transactions. We use the highest assurance SSL/TLS certificate, which ensures that no unauthorized person can get to your sensitive payment data over the web.
We use the best standards in Internet security. Any data retained is not shared with third parties.
You can request a refund if you do not wish to enroll in the course.
To receive an acknowledgment of your online payment, you should have a valid email address. At the point when you enter your name, Visa, and other data, you have the option of entering your email address. Would it be a good idea for you to decide to enter your email address, confirmation of your payment will be emailed to you.
Yes, fee excludes local taxes.
Yes, we do.
Schedule for Group Training is decided by Koenig. Schedule for 1-on-1 is decided by you.
In 1 on 1 Public you can select your own schedule, other students can be merged. Choose 1-on-1 if published schedule doesn't meet your requirement. If you want a private session, opt for 1-on-1 Private.
Duration of Ultra-Fast Track is 50% of the duration of the Standard Track. Yes(course content is same).

Prices & Payments

Yes of course.
Yes, We are

Travel and Visa

Yes we do after your registration for course.

Food and Beverages



Says our CEO-
“It is an interesting story and dates back half a century. My father started a manufacturing business in India in the 1960's for import substitute electromechanical components such as microswitches. German and Japanese goods were held in high esteem so he named his company Essen Deinki (Essen is a well known industrial town in Germany and Deinki is Japanese for electric company). His products were very good quality and the fact that they sounded German and Japanese also helped. He did quite well. In 1970s he branched out into electronic products and again looked for a German name. This time he chose Koenig, and Koenig Electronics was born. In 1990s after graduating from college I was looking for a name for my company and Koenig Solutions sounded just right. Initially we had marketed under the brand of Digital Equipment Corporation but DEC went out of business and we switched to the Koenig name. Koenig is difficult to pronounce and marketeers said it is not a good choice for a B2C brand. But it has proven lucky for us.” – Says Rohit Aggarwal (Founder and CEO - Koenig Solutions)
All our trainers are fluent in English . Majority of our customers are from outside India and our trainers speak in a neutral accent which is easily understandable by students from all nationalities. Our money back guarantee also stands for accent of the trainer.
Medical services in India are at par with the world and are a fraction of costs in Europe and USA. A number of our students have scheduled cosmetic, dental and ocular procedures during their stay in India. We can provide advice about this, on request.
Yes, if you send 4 participants, we can offer an exclusive training for them which can be started from Any Date™ suitable for you.