Your Growth, Our Mission
After completing this course, you should be able to:
This course is designed for:
Technical professionals who need to know how to deploy open source intrusion detection systems (IDS) and intrusion prevention systems (IPS), and write Snort rules.
Module 1: Intrusion Sensing technology, Challenges, and Sensor Deployment
Module 2: Introduction to Snort Technology
Module 3: Snort Installation
Module 4: Configuring Snort for Database Output and Graphical Analysis
Module 5: Operating Snort
Module 6: Snort Configuration
Module 7: Configuring Snort Pre processors
Module 8: Keeping Rules Up to Date
Module 9: Building a Distributed Snort Installation
Module 10: Basic Rule Syntax and Usage
Module 11: Building a Snort IPS Installation
Module 12: Rule Optimization
Module 13: Using PCRE in Rules
Module 14: Basic Snort Tuning
Module 15: Using Byte Jump/Test/Extract Rule Options
Module 16: Protocol Modeling Concepts and Using Flow bits in Rule Writing
Module 17: Case Studies in Rule Writing and Packet Analysis
Labs
Lab 1: Install Snort and Its Components (Module 3)
Lab 2: Barnyard2 Installation (Module 4)
Lab 3: Barnyard and Snorby Configuration (Module 4)
Lab 4: Operating Snort (Module 5)
Lab 5: Configuring Your IDS/IPS Installation (Module 6)
Lab 6: Port scan Configuration (Module 7)
Lab 7: Stream Reassembly (Module 7)
Lab 8: Pulled Pork Installation, Configuration, and Usage (Module 8)
Lab 9: Building a Distributed Snort Installation (Module 9)
Lab 10: Weighting Custom Rules (Module 10)
Lab 11: Building an Inline IPS (Module 11)
Lab 12: Using the Drop Action (Module 11)
Lab 13: Using the Replace Action (Module 11)
Lab 14: Optimizing Rules (Module 12)
Lab 15: Using and Testing PCRE in Rules (Module 13)
Lab 16: Using Event Filtering (Module 14)
Lab 17: Using Suppression (Module 14)
Lab 18: Configuring Rule Profiling (Module 14)
Lab 19: Detecting SADMIND Trust with Byte Jump and Byte Test (Module 15)
Lab 20: Using the Bitwise AND Operation in Byte Test (Module 15)
Lab 21: Detecting Zen Works Directory Traversal with Byte Extract (Module 15)
Lab 22: Writing Flow bits Rules (Module 16)
Lab 23: Research and Packet Analysis (Module 17)
Lab 24: Revisiting the Kaminsky Vulnerability (Module 17)
| Code | Date | Venue | Fees | Action |
|---|
Prices don't include VAT
Your Growth, Our Mission