Your Growth, Our Mission
After completing this course, you should be able to:
This course is designed for:
Security professionals who need to know how to write rules and understand open source Snort language.
Module 1: Welcome to the Sourcefire Virtual Network
Module 2: Basic Rule Syntax and Usage
Module 3: Rule Optimization
Module 4: Using PCRE in Rules
Module 5: Using Byte Jump/Test/Extract Rule Options
Module 6: Protocol Modeling Concepts and Using Flow bits in Rule Writing
Module 7: Case Studies in Rule Writing and Packet Analysis
Module 8: Rule Performance Monitoring
Module 9: Rule Writing Practical Labs, Exercises, and Challenges
Labs
Lab 1: Writing Custom Rules
Lab 2: Drop Rules
Lab 3: Replacing Content
Lab 4: SSH Rule Scenerio
Lab 5: Optimizing Rules
Lab 6: Using PCR Etest to Test Regex Options
Lab 7:Use PCR Etest to Test Custom Regular Expressions
Lab 8: Writing Rules That Contain PCRE
Lab 9: Detecting SADMIND Trust with Byte Jump and Byte test
Lab 10: Using the Bitwise AND Operation in Byte Test Rule Option
Lab 11: Detecting Zen Works Directory Traversal Using Byte Extract
Lab 12: Writing a Flow bit Rule
Lab 13: Extra Flow bits Challenge
Lab 14: Strengthen Your Brute-Force Rule with Flow bits
Lab 15: Research and Packet Analysis
Lab 16: Revisiting the Kaminsky Vulnerability
Lab 17: Configuring Rule Profiling
Lab 18: Testing Rule Performance
Lab 19: Configure Rule Profiling to View PCRE Performance
Lab 20: Preventing User Access to a Restricted Site
Lab 21: SQL Injection
Lab 22: The SQL Attack Revisited
| Code | Date | Venue | Fees | Action |
|---|
Prices don't include VAT
Your Growth, Our Mission