1 - Course Outline
Introduction To Snort TechnologySnort InstallationSnort OperationSnort Intrusion Detection OutputRule ManagementSnort ConfigurationInline Operation And ConfigurationSnort Rule Syntax And UsageTraffic Flow Through Snort RulesAdvanced Rule OptionsOpenappid DetectionTuning Snort
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
This course is designed for security administrators and consultants, network administrators, systems engineers, and technical support personnel who need to know how to deploy open-source intrusion detection systems (IDS) and intrusion prevention systems (IPS), and how to write Snort rules.
To fully benefit from this course, you should have the following knowledge and skills:
Technical understanding of TCP/IP networking and network architecture
Basic familiarity with firewall and IPS concepts