Course Details
Course Outline
1 - Course Outline
Introduction to Snort Rule Development Snort Rule Syntax and UsageTraffic Flow Through Snort Rules Advanced Rule OptionsOpenAppID DetectionTuning Snort
2 - Lab outline
Connecting to the Lab EnvironmentIntroducing Snort Rule DevelopmentBasic Rule Syntax and UsageAdvanced Rule OptionsOpenAppIDTuning Snort
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
This course is for technical professionals to gain skills in writing rules for Snort-based intrusion detection systems (IDS) and intrusion prevention systems (IPS). The primary audience includes:
Security administrators
Security consultants
Network administrators
System engineers
Technical support personnel using open source IDS and IPS
Channel partners and resellers
Other Prerequisites
To fully benefit from this course, you should have:
Basic understanding of networking and network protocols
Basic knowledge of Linux command-line utilities
Basic knowledge of text editing utilities commonly found in Linux
Basic knowledge of network security concepts
Basic knowledge of a Snort-based IDS/IPS system