Course Details
Course Outline
1 - Course outline
Introduction to Snort TechnologySnort InstallationSnort OperationSnort Intrusion Detection OutputRule ManagementSnort ConfigurationInline Operation and ConfigurationSnort Rule Syntax and UsageTraffic Flow Through Snort RulesAdvanced Rule OptionsOpenAppID DetectionTuning Snort
2 - Lab outline
Connecting to the Lab EnvironmentSnort InstallationSnort OperationSnort Intrusion Detection OutputPulled Pork InstallationConfiguring VariablesReviewing Preprocessor ConfigurationsInline OperationsBasic Rule Syntax and UsageAdvanced Rule OptionsOpenAppIDTuning Snort
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
This course is for technical professionals who need to know how to deploy open source intrusion detection systems (IDS) and intrusion prevention systems (IPS), and how to write Snort rules.
Security administrators
Security consultants
Network administrators
System engineers
Technical support personnel
Channel partners and resellers
Other Prerequisites
To fully benefit from this course, you should have the following knowledge and skills:
Technical understanding of TCP/IP networking and network architecture
Basic familiarity with firewall and IPS concepts
To fully benefit from this course, you should have:
Technical understanding of TCP/IP networking and network architecture
Proficiency with Linux and UNIX text editing tools (vi editor is suggested by not required)