See how Insoft Services is responding to COVID-19

SSFSNORT v2.1 – Securing Cisco Networks with Open Source Snort

X

Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

Subscribe

I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.


Upcoming Dates


Oct 18 - Oct 21, 2021
09:00 - 17:00
Online

Nov 15 - Nov 18, 2021
09:00 - 17:00
Online

Dec 13 - Dec 16, 2021
09:00 - 17:00
Online

Jan 10 - Jan 13, 2022
09:00 - 17:00
Online

 Feb 7 - Feb 10, 2022
09:00 - 17:00
Online

 Mar 7 - Mar 10, 2022
09:00 - 17:00
Online

SSFSNORT v2.1 – Securing Cisco Networks with Open Source Snort
4 days  (Instructor Led Online)  |  Network Security

Course Details

The Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1 course shows you how to deploy a network intrusion detection system based on Snort. Through a combination of expert instruction and hands-on practice, you will learn how to install, configure, operate, and manage a Snort system, rules writing with an overview of basic options, advanced rules writing, how to configure Pulled Pork, and how to use OpenAppID to provide protection of your network from malware. You will learn techniques of tuning and performance monitoring, traffic flow through Snort rules, and more.

This course will help you:

  • Learn how to implement Snort, an open-source, rule-based, intrusion detection and prevention system
  • Gain leading-edge skills for high-demand responsibilities focused on security

Objectives

After taking this course, you should be able to:

  • Describe Snort technology and identify resources available for maintaining a Snort deployment
  • Install Snort on a Linux-based operating system
  • Describe the Snort operation modes and their command-line options
  • Describe the Snort intrusion detection output options
  • Download and deploy a new rule set to Snort
  • Describe and configure the snort.conf file
  • Configure Snort for inline operation and configure the inline-only features
  • Describe the Snort basic rule syntax and usage
  • Describe how traffic is processed by the Snort engine
  • Describe several advanced rule options used by Snort
  • Describe OpenAppID features and functionality
  • Describe how to monitor Snort performance and how to tune rules

Outline

  • Introduction to Snort Technology
  • Snort Installation
  • Snort Operation
  • Snort Intrusion Detection Output
  • Rule Management
  • Snort Configuration
  • Inline Operation and Configuration
  • Snort Rule Syntax and Usage
  • Traffic Flow Through Snort Rules
  • Advanced Rule Options
  • OpenAppID Detection
  • Tuning Snort

Lab outline

  • Connecting to the Lab Environment
  • Snort Installation
  • Snort Operation
  • Snort Intrusion Detection Output
  • Pulled Pork Installation
  • Configuring Variables
  • Reviewing Preprocessor Configurations
  • Inline Operations
  • Basic Rule Syntax and Usage
  • Advanced Rule Options
  • OpenAppID
  • Tuning Snort

Target Audience

This course is for technical professionals who need to know how to deploy open source, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), and how to write Snort rules.

  • Security administrators
  • Security consultants
  • Network administrators
  • System engineers
  • Technical support personnel
  • Channel partners and resellers

Prerequisites

To fully benefit from this course, you should have:

  • Technical understanding of TCP/IP networking and network architecture
  • Proficiency with Linux and UNIX text editing tools (vi editor is suggested but not required)