top of page

Related Courses

DOWNLOAD | Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 Video

Price: 6.00 USD | Size: 962 MB | Duration : 2.40 Hours | 34 Video Lessons

 

You can Instant Download a PDF file 

After successful payment , 

This PDF File Contains Course Download links

You can Download This Course immediately from click that Links.

 

Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 Video Training Course

 

 

The Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 course shows you how to deploy Snort® in small to enterprise-scale implementations. You will learn how to install, configure, and operate Snort in Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) modes. You’ll practice installing and configuring Snort, utilize additional software tools and define rules to configure and improve the Snort environment, and more

 

 

This course will help you:

 

Learning how to implement Snort, an open-source, rule-based, intrusion detection and prevention system

Gain leading-edge skills for high-demand responsibilities focused on security

Who should enroll

Security administrators

Security consultants

Network administrators

System engineers

Technical support personnel

Channel partners and resellers

Technology areas

Security

Cyber Operations

 

Course details

Objectives

 

After taking this course, you should be able to:

 

Define the use and placement IDS/IPS components.

Identify Snort features and requirements.

Compile and install Snort.

Define and use different modes of Snort.

Install and utilize Snort supporting software.

Prerequisites

To fully benefit from this course, you should have the following knowledge and skills:

 

Technical understanding of TCP/IP networking and network architecture

Basic familiarity with firewall and IPS concepts

This is the recommended Cisco course that may help you meet these prerequisites:

 

Implementing and Administering Cisco Solutions (CCNA)

Outline

Detecting Intrusions with Snort 3.0

History of Snort

IDS

IPS

IDS vs. IPS

Examining Attack Vectors

Application vs. Service Recognition

Sniffing the Network

Protocol Analyzers

Configuring Global Preferences

Capture and Display Filters

Capturing Packets

Decrypting Secure Sockets Layer (SSL) Encrypted Packets

Architecting Nextgen Detection

Snort 3.0 Design

Modular Design Support

Plug Holes with Plugins

Process Packets

Detect Interesting Traffic with Rules

Output Data

Choosing a Snort Platform

Provisioning and Placing Snort

Installing Snort on Linux

Operating Snort 3.0

Topic 1: Start Snort

Monitor the System for Intrusion Attempts

Define Traffic to Monitor

Log Intrusion Attempts

Actions to Take When Snort Detects an Intrusion Attempt

License Snort and Subscriptions

Examining Snort 3.0 Configuration

Introducing Key Features

Configure Sensors

Lua Configuration Wizard

Managing Snort

Pulled Pork

Barnyard2

Elasticsearch, Logstash, and Kibana (ELK)

Analyzing Rule Syntax and Usage

Anatomy of Snort Rules

Understand Rule Headers

Apply Rule Options

Shared Object Rules

Optimize Rules

Analyze Statistics

Use Distributed Snort 3.0

Design a Distributed Snort System

Sensor Placement

Sensor Hardware Requirements

Necessary Software

Snort Configuration

Monitor with Snort

Examining Lua

Introduction to Lua

Get Started with Lua

 

Course content:

 

0 0Course Intro

1 2History of Snort

1 4IDS and IPS

1 5IDS vs IPS

1 6Examining Attack Vectors

1 7Application vs Service Recognition

2 2Protocol Analyzers

2 3Configuring Global Preferences

2 4Capture and Display Filters

2 5Capturing Packets

2 6Decrypting SSL Encrypted Packets

3 2Snort 30 Design and Modular Design Support

3 4Plug Holes with Plugins and Process Packets

3 7Detect Interesting Traffic with Rules and Output Data

4 2Provisioning and Placing Snort and Installing Snort on Linux

5 2Start Snort

5 3Monitor the System and Define Traffic to Monitor

5 5Log Intrusion Attempts

5 6Actions to Take and License Snort and Subscriptions

6 2Introducing Key Features

6 3Configure Sensor sand Lua Configuration Wizard

7 2Pulled Pork

7 3Barnyard2

7 4ELK

8 2Anatomy of Snort Rules

8 3Understand Rule Headers

8 4Apply Rule Options and Shared Object Rules

8 6Optimize Rules

8 7Analyze Statistics

9 3Design a Distributed System Sensor Placement and Sensor Hardware

9 6Necessary Software and Snort Configuration

9 7Monitor with Snort

10 2Introduction to Lua

10 3Get Started with Lua

DOWNLOAD | Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 Video

SKU: EXT2021-0212
$4.00Price
  • You can Instant Download a PDF file 

    After successful payment , 

    This PDF File Contains Course Download links

    You can Download This Course immediately from click that Links.

bottom of page