Course Details
Course Outline
1 - Course Outline
Introduction to Snort Rule Development Snort Rule Syntax and UsageTraffic Flow Through Snort Rules Advanced Rule OptionsOpenAppID DetectionTuning Snort
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
This course is designed for technical professionals who need to write rules for use with Snort-based intrusion detection systems (IDS) and intrusion prevention systems (IPS). The primary audience for this course is security administrators, security consultants, network administrators, systems engineers, and technical support personnel using open-source IDS and IPS.
Other Prerequisites
The knowledge and skills necessary before attending this course is:
Basic understanding of networking and network protocols
Basic knowledge of command-line and text-editing utilities commonly found in Linux
Basic knowledge of network security concepts
Basic knowledge of a Snort-based IDS/IPS system