1 - Course Outline
Introduction To Snort TechnologySnort InstallationSnort OperationSnort Intrusion Detection OutputRule ManagementSnort ConfigurationInline Operation And ConfigurationSnort Rule Syntax And UsageTraffic Flow Through Snort RulesAdvanced Rule OptionsOpenappid DetectionTuning Snort
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
This course is designed for security administrators and consultants, network administrators, systems engineers, and technical support personnel who need to know how to deploy open-source intrusion detection systems (IDS) and intrusion prevention systems (IPS), and how to write Snort rules.
The knowledge and skills necessary before attending this course are:
Basic understanding of networking and network protocols
Basic knowledge of Linux command-line utilities and text-editing utilities commonly found in Linux
Basic knowledge of network security concepts