Securing Cisco Networks with Open Source Snort
- Course Code SSFSNORT
- Days Access 180 days
- Version 2.1
Course Delivery
Additional Payment Options
-
GTC 42 inc. VAT
GTC, Global Knowledge Training Credit, please contact Global Knowledge for more details
Jump to:
Course Delivery
This course is available in the following formats:
-
Company Event
Event at company
-
Elearning (Self-paced)
Self paced electronic learning
-
Public Classroom
Traditional Classroom Learning
-
Virtual Learning
Learning that is virtual
Request this course in a different delivery format.
Course Overview
TopSecuring Cisco Networks with Open Source Snort is a lab-intensive course that introduces students to the open source Snort technology as well as rule writing. It is part of a portfolio of security courses designed to help businesses support and maintain their snort systems. The course begins by introducing the Snort technology and progresses through the installation and operation of Snort. You discover the various output types that Snort provides, automated rule management including how to deploy and configure Pulled Pork, inline operations, and how to create custom Snort rules, including advanced rule-writing techniques and OpenAppID. This course combines lecture materials and hands-on labs that give you practice in deploying and managing Snort.
Duration: The SSFSNORT Training on Demand course consists of 12 modules, totaling more than 10 hours of video instruction along with 12 hands-on lab exercises
Target Audience
TopThis course is designed for technical professionals who need to know how to deploy open source intrusion detection systems (IDS) and intrusion prevention systems (IPS), and write Snort rules.
Course Objectives
TopAfter completing this course, you should be able to:
- Describe Snort technology and identify the resources that are available for maintaining a Snort deployment
- Install Snort on a Linux-based operating system
- Describe the Snort operation modes and their command-line options
- Describe the Snort intrusion detection output options
- Download and deploy a new rule set to Snort
- Describe and configure the snort.conf file
- Configure Snort for inline operation and configure the inline-only features
- Describe the Snort basic rule syntax and usage
- Describe how traffic is processed by the Snort engine
- Describe several advanced rule options used by Snort
- Describe OpenAppID features and functionality
- Describe how to monitor of Snort performance and how to tune rules
Course Content
TopModule 1: Introduction to Snort Technology
Module 2: Snort Installation
Moudle 3: Snort Operation
Module 4: Snort Intrusion Detection Output
Module 5: Rule Management
Module 6: Snort Configuration
Module 7: Inline Operation and Configuration
Module 8: Snort Rule Syntax and Usage
Module 9: Traffic Flow Through Snort Rules
Module 10: Advanced Rule Options
Module 11: OpenAppID Detection
Module 12: Tuning Snort
Labs
- Lab 1: Connecting to the Lab Environment
- Lab 2: Snort Installation
- Lab 3: Snort Operation
- Lab 4: Snort Intrusion Detection Output
- Lab 5: Pulled Pork Installation
- Lab 6: Configuring Variables
- Lab 7: Reviewing Preprocessor Configurations
- Lab 8: Inline Operations
- Lab 9: Basic Rule Syntax and Usage
- Lab 10: Advanced Rule Options
- Lab 11: OpenAppID
- Lab 12: Tuning Snort
Course Prerequisites
TopAttendees should meet the following prerequisites:
- Basic understanding of networking and network protocols - ICND1 or CCNA Recommended
- Basic knowledge of Linux command line utilities
- Basic knowledge of text editing utilities commonly found in Linux
- Basic knowledge of network security concepts
Test Certification
TopRecommended as preparation for exams:
- There are no exams currently aligned to this course