The Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES) version 2.0 Cisco Training on Demand course provides you with technical training in the concepts of Snort rule development and the Snort rule language. You also learn about standard and advanced rule options, OpenAppID, and how to tune Snort rules.


* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

After taking this course, you should be able to:
- Describe the Snort rule development process
- Describe the Snort basic rule syntax and usage
- Describe how traffic is processed by Snort
- Describe several advanced rule options used by Snort
- Describe OpenAppID features and functionality
- Describe how to monitor the performance of Snort and how to tune rules

  • Course Outline

  • Introduction to Snort Rule Development
    Snort Rule Syntax and Usage
    Traffic Flow Through Snort Rules
    Advanced Rule Options
    OpenAppID Detection
    Tuning Snort

  • Lab outline

  • Connecting to the Lab Environment
    Introducing Snort Rule Development
    Basic Rule Syntax and Usage
    Advanced Rule Options
    Tuning Snort


This course is for technical professionals to gain skills in writing rules for Snort-based intrusion detection systems (IDS) and intrusion prevention systems (IPS). The primary audience includes: - Security administrators - Security consultants - Network administrators - System engineers - Technical support personnel using open-source IDS and IPS - Channel partners and resellers




To fully benefit from this course, you should have: - Basic understanding of networking and network protocols - Basic knowledge of Linux command-line utilities - Basic knowledge of text editing utilities commonly found in Linux - Basic knowledge of network security concepts - Basic knowledge of a Snort-based IDS/IPS system


Length: 3.0 days (24 hours)


Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.