• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1

Securing Cisco Networks with Open Source Snort (SSFSNORT) v2.1

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online

  • 4 days

  • All levels

Description

Duration

4 Days

24 CPD hours

This course is intended for

The primary audience for this course is as follows:
Security administrators
Security consultants
Network administrators
System engineers
Technical support personnel
Channel partners and resellers

Overview

Upon completing this course, the learner will be able to meet these overall objectives:
Define the use and placement IDS/IPS components.
Identify Snort features and requirements.
Compile and install Snort.
Define and use different modes of Snort.
Install and utilize Snort supporting software.

Securing Cisco Networks with Open Source Snort (SSFSNORT) v3.0 is a 4-day course that shows you how to deploy Snort© in small to enterprise-scale implementations. You will learn how to install, configure, and operate Snort in Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) modes. You?ll practice installing and configuring Snort, utilize additional software tools and define rules to configure and improve the Snort environment, and more. The course qualifies for 32 Cisco Continuing Education credits (CE) towards recertification.This course will help you:Learning how to implement Snort, an open-source, rule-based, intrusion detection and prevention system. Gain leading-edge skills for high-demand responsibilities focused on security.

Module 1: Detecting Intrusions with Snort 3.0

  • History of Snort

  • IDS

  • IPS

  • IDS vs. IPS

  • Examining Attack Vectors

  • Application vs. Service Recognition

Module 2: Sniffing the Network

  • Protocol Analyzers

  • Configuring Global Preferences

  • Capture and Display Filters

  • Capturing Packets

  • Decrypting Secure Sockets Layer (SSL) Encrypted Packets

Module 3: Architecting Nextgen Detection

  • Snort 3.0 Design

  • Modular Design Support

  • Plug Holes with Plugins

  • Process Packets

  • Detect Interesting Traffic with Rules

  • Output Data

Module 4: Choosing a Snort Platform

  • Provisioning and Placing Snort

  • Installing Snort on Linux

Module 5: Operating Snort 3.0

  • Start Snort

  • Monitor the System for Intrusion Attempts

  • Define Traffic to Monitor

  • Log Intrusion Attempts

  • Actions to Take When Snort Detects an Intrusion Attempt

  • License Snort and Subscriptions

Module 6: Examining Snort 3.0 Configuration

  • Introducing Key Features

  • Configure Sensors

  • Lua Configuration Wizard

Module 7: Managing Snort

  • Pulled Pork

  • Barnyard2

  • Elasticsearch, Logstash, and Kibana (ELK)

Module 8: Analyzing Rule Syntax and Usage

  • Anatomy of Snort Rules

  • Understand Rule Headers

  • Apply Rule Options

  • Shared Object Rules

  • Optimize Rules

  • Analyze Statistics

Module 9: Use Distributed Snort 3.0

  • Design a Distributed Snort System

  • Sensor Placement

  • Sensor Hardware Requirements

  • Necessary Software

  • Snort Configuration

  • Monitor with Snort

Module 10: Examining Lua

  • Introduction to Lua

  • Get Started with Lua

About The Provider

Nexus Human, established over 20 years ago, stands as a pillar of excellence in the realm of IT and Business Skills Training and education in Ireland and the UK....

Read more about Nexus Human

Tags

Reviews