The Securing Cisco Networks with Open-Source Snort (SSFSNORT) v2.1 course shows you how to deploy a network intrusion detection system based on Snort. You’ll learn how to install, configure, operate, and manage a Snort system, rules writing with an overview of basic options, advanced rules writing, how to configure Pulled Pork, and how to use OpenAppID to provide protection of your network from malware. You will learn techniques of tuning and performance monitoring, traffic flow through Snort rules, and more

starstarstarstarstar_half

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

After completing this course, you should be able to:
- Describe Snort technology and identify the resources that are available for maintaining a Snort deployment
- Install Snort on a Linux-based operating system
- Describe the Snort operation modes and their command-line options
- Describe the Snort intrusion detection output options
- Download and deploy a new rule set to Snort
- Describe and configure the snort.conf file
- Configure Snort for inline operation and configure the inline-only features
- Describe the Snort basic rule syntax and usage
- Describe how the Snort engine processes traffic
- Describe several advanced rule options used by Snort
- Describe OpenAppID features and functionality
- Describe how to monitor Snort performance and how to tune rules

1
  • Course outline

  • Introduction to Snort Technology
    Snort Installation
    Snort Operation
    Snort Intrusion Detection Output
    Rule Management
    Snort Configuration
    Inline Operation and Configuration
    Snort Rule Syntax and Usage
    Traffic Flow Through Snort Rules
    Advanced Rule Options
    OpenAppID Detection
    Tuning Snort

1
  • Introduction to Snort Technology


2
  • Snort Installation


3
  • Snort Operation


4
  • Snort Intrusion Detection Output


5
  • Rule Management


6
  • Snort Configuration


7
  • Inline Operation and Configuration


8
  • Snort Rule Syntax and Usage


9
  • Traffic Flow Through Snort Rules


10
  • Advanced Rule Options


11
  • OpenAppID Detection


12
  • Tuning Snort


Audience

This course is designed for security administrators and consultants, network administrators, systems engineers, and technical support personnel who need to know how to deploy open-source intrusion detection systems (IDS) and intrusion prevention systems (IPS), and how to write Snort rules.

Language

English

Prerequisites

To fully benefit from this course, you should have the following knowledge and skills: - Technical understanding of TCP/IP networking and network architecture - Basic familiarity with firewall and IPS concepts - To fully benefit from this course, you should have: - Technical understanding of TCP/IP networking and network architecture - Proficiency with Linux and UNIX text editing tools (vi editor is suggested by not required)

Length: 180.0 days (32 hours)

Level:

Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.

Loading...