Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

SSFSNORT - Securing Cisco Networks with Open Source Snort®

Learn how to build and manage a Snort® system using open source tools, plug-ins, as well as the Snort rule language to help manage, tune, and deliver feedback on suspicious network activity.

GK# 5826

Course Overview

TOP

This lab-intensive course introduces you to the open source Snort technology, as well as rule writing. Among other powerful features, you become familiar with: 

  • How to build and manage a Snort system
  • How to update rules
  • Snort rules language
  • The capabilities of Snort when deployed passively and inline 

The course begins by introducing the Snort technology and progresses through the installation and operation of Snort. You will discover the various output types that Snort provides and learn about automated rule management including how to deploy and configure Pulled Pork, inline operations, and how to create custom Snort rules, including advanced rule-writing techniques and OpenAppID.

This course combines lecture materials and hands-on labs that give you practice in deploying and managing Snort.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP
  • Snort technology and identify the resources that are available for maintaining a Snort deployment
  • Install Snort on a Linux-based operating system
  • Snort operation modes and their command-line options
  • Snort intrusion detection output options
  • Download and deploy a new rule set to Snort
  • Configure the snort.conf file
  • Configure Snort for inline operation and configure the inline-only features
  • Snort basic rule syntax and usage
  • How traffic is processed by the Snort engine
  • Several advanced rule options used by Snort
  • OpenAppID features and functionality
  • How to monitor of Snort performance and how to tune rules

Outline

TOP
Viewing outline for:

Classroom Live Outline

  1. Introduction to Snort Technology
  2. Snort Installation
  3. Snort Operation
  4. Snort Intrusion Detection Output
  5. Rule Management
  6. Snort Configuration
  7. Inline Operation and Configuration
  8. Snort Rule Syntax and Usage
  9. Traffic Flow Through Snort Rules
  10. Advanced Rule Options
  11. OpenAppID Detection
  12. Tuning Snort

Labs

TOP
Viewing labs for:

Classroom Live Labs

Lab 1: Connecting to the Lab Environment

Lab 2: Snort Installation

Lab 3: Snort Operation

Lab 4: Snort Intrusion Detection Output

Lab 5: Pulled Pork Installation

Lab 6: Configuring Variables

Lab 7: Reviewing Preprocessor Configurations

Lab 8: Inline Operations

Lab 9: Basic Rule Syntax and Usage

Lab 10: Advanced Rule Options

Lab 11: OpenAppID

Lab 12: Tuning Snort

Prerequisites

TOP

Basic understanding of:

  • Networking and network protocols
  • Linux command line utilities
  • Text-editing utilities commonly found in Linux
  • Network security concepts

Who Should Attend

TOP
  • Security administrators
  • Security consultants
  • Network administrators
  • System engineers
  • Technical support personnel using open source IDS and IPS
  • Channel partners and resellers

Vendor Credits

TOP

This course can be purchased with Cisco Learning Credits (CLCs).

Course Delivery

This course is available in the following formats:

Classroom Live

Receive face-to-face instruction at one of our training center locations.

Duration: 4 day

Virtual Classroom Live

Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 4 day

Request this course in a different delivery format.
Enroll