Course Details
Course Outline
1 - Course Outline
Introduction To Snort TechnologySnort InstallationSnort OperationSnort Intrusion Detection OutputRule ManagementSnort ConfigurationInline Operation And ConfigurationSnort Rule Syntax And UsageTraffic Flow Through Snort RulesAdvanced Rule OptionsOpenappid DetectionTuning Snort
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
This course is designed for security administrators and consultants, network administrators, systems engineers, and technical support personnel who need to know how to deploy open-source intrusion detection systems (IDS) and intrusion prevention systems (IPS), and how to write Snort rules.
Other Prerequisites
To fully benefit from this course, you should have the following knowledge and skills:
Technical understanding of TCP/IP networking and network architecture
Basic familiarity with firewall and IPS concepts
To fully benefit from this course, you should have:
Technical understanding of TCP/IP networking and network architecture
Proficiency with Linux and UNIX text editing tools (vi editor is suggested by not required)