Skip to main Content

Securing Cisco Networks with Open Source Snort

  • Course Code SSFSNORT
  • Duration 4 days
  • Version 2.1

Additional Payment Options

  • GTC 49 inc. VAT

    GTC, Global Knowledge Training Credit, please contact Global Knowledge for more details

  • CLC 36 excl. VAT

Public Classroom Price

£3,095.00

excl. VAT

Request Group Training Add to Cart

Course Delivery

This course is available in the following formats:

  • Company Event

    Event at company

  • Elearning (Self-paced)

    Self paced electronic learning

  • Public Classroom

    Traditional Classroom Learning

  • Virtual Learning

    Learning that is virtual

Request this course in a different delivery format.

Course Overview

Top

The Securing Cisco Networks with Open Source Snort course shows you how to deploy a network intrusion detection system based on Snort. Through a combination of expert instruction and hands-on practice, you will learn how to install, configure, operate, and manage a Snort system, rules writing with an overview of basic options, advanced rules writing, how to configure Pulled Pork, and how to use OpenAppID to provide protection of your network from malware. You will learn techniques of tuning and performance monitoring, traffic flow through Snort rules, and more.

Course Schedule

Top
    • Delivery Format: Virtual Learning
    • Date: 18-21 February, 2025
    • Location: Virtual

    £3,095.00

    • Delivery Format: Virtual Learning
    • Date: 06-09 October, 2025
    • Location: Virtual

    £3,095.00

Target Audience

Top

This course is designed for technical professionals who need to know how to deploy open source intrusion detection systems (IDS) and intrusion prevention systems (IPS), and write Snort rules.

 

Course Objectives

Top

After completing this course, you should be able to:

  • Describe Snort technology and identify the resources that are available for maintaining a Snort deployment
  • Install Snort on a Linux-based operating system
  • Describe the Snort operation modes and their command-line options
  • Describe the Snort intrusion detection output options
  • Download and deploy a new rule set to Snort
  • Describe and configure the snort.conf file
  • Configure Snort for inline operation and configure the inline-only features
  • Describe the Snort basic rule syntax and usage
  • Describe how traffic is processed by the Snort engine
  • Describe several advanced rule options used by Snort
  • Describe OpenAppID features and functionality
  • Describe how to monitor of Snort performance and how to tune rules

Course Content

Top

Module 1: Introduction to Snort Technology

Module 2: Snort Installation

Moudle 3: Snort Operation

Module 4: Snort Intrusion Detection Output

Module 5: Rule Management

Module 6: Snort Configuration

Module 7: Inline Operation and Configuration

Module 8: Snort Rule Syntax and Usage

Module 9: Traffic Flow Through Snort Rules

Module 10: Advanced Rule Options

Module 11: OpenAppID Detection

Module 12: Tuning Snort

Labs

  • Lab 1: Connecting to the Lab Environment
  • Lab 2: Snort Installation
  • Lab 3: Snort Operation
  • Lab 4: Snort Intrusion Detection Output
  • Lab 5: Pulled Pork Installation
  • Lab 6: Configuring Variables
  • Lab 7: Reviewing Preprocessor Configurations
  • Lab 8: Inline Operations
  • Lab 9: Basic Rule Syntax and Usage
  • Lab 10: Advanced Rule Options
  • Lab 11: OpenAppID
  • Lab 12: Tuning Snort

Course Prerequisites

Top

Attendees should meet the following prerequisites:

  • Technical understanding of TCP/IP networking and network architecture
  • Proficiency with Linux and UNIX text editing tools (vi editor is suggested but not required)

Test Certification

Top

Recommended as preparation for exams:

  • There are no exams currently aligned to this course
Cookie Control toggle icon