25,000+ Courses Nationwide
0203 908 2376

Securing Cisco Networks with Open Source Snort

Securing Cisco Networks with Open Source Snort is a lab-intensive course that introduces students to the open source Snort technology as well as rule writing. It is part of a portfolio of security courses designed to help businesses support and maintain their snort systems. The course begins by introducing the Snort technology and progresses through the installation and operation of Snort. You discover the various output types that Snort provides, automated rule management including how to deploy and configure Pulled Pork, inline operations, and how to create custom Snort rules, including advanced rule-writing techniques and OpenAppID. This course combines lecture materials and hands-on labs that give you practice in deploying and managing Snort.

Target Audience

This course is designed for technical professionals who need to know how to deploy open source intrusion detection systems (IDS) and intrusion prevention systems (IPS), and write Snort rules.

Select specific date to see price, venue and full details.

Learning Objectives

fter completing this course, you should be able to:

  • Describe Snort technology and identify the resources that are available for maintaining a Snort deployment
  • Install Snort on a Linux-based operating system
  • Describe the Snort operation modes and their command-line options
  • Describe the Snort intrusion detection output options
  • Download and deploy a new rule set to Snort
  • Describe and configure the snort.conf file
  • Configure Snort for inline operation and configure the inline-only features
  • Describe the Snort basic rule syntax and usage
  • Describe how traffic is processed by the Snort engine
  • Describe several advanced rule options used by Snort
  • Describe OpenAppID features and functionality
  • Describe how to monitor of Snort performance and how to tune rules

Pre-Requisites

Attendees should meet the following prerequisites:

  • Basic understanding of networking and network protocols - ICND1 Recommended
  • Basic knowledge of Linux command line utilities
  • Basic knowledge of text editing utilities commonly found in Linux
  • Basic knowledge of network security concepts - IINS Recommended

Course Content

Module 1: Introduction to Snort Technology

Module 2: Snort Installation

Moudle 3: Snort Operation

Module 4: Snort Intrusion Detection Output

Module 5: Rule Management

Module 6: Snort Configuration

Module 7: Inline Operation and Configuration

Module 8: Snort Rule Syntax and Usage

Module 9: Traffic Flow Through Snort Rules

Module 10: Advanced Rule Options

Module 11: OpenAppID Detection

Module 12: Tuning Snort

Labs

  • Lab 1: Connecting to the Lab Environment
  • Lab 2: Snort Installation
  • Lab 3: Snort Operation
  • Lab 4: Snort Intrusion Detection Output
  • Lab 5: Pulled Pork Installation
  • Lab 6: Configuring Variables
  • Lab 7: Reviewing Preprocessor Configurations
  • Lab 8: Inline Operations
  • Lab 9: Basic Rule Syntax and Usage
  • Lab 10: Advanced Rule Options
  • Lab 11: OpenAppID
  • Lab 12: Tuning Snort

Exams & Certification

  • There are no exams currently aligned to this course

Related Courses

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the requested service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.

 

We work with the best