The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription

The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription


Welcome to the workshop, in the first module we will be talking about what actually intrusion detection and prevention systems are and what role they play in these days of information security and increase in the events of hacking. We will also explore the types of these two systems and will also demonstrate Snort as an Intrusion detection System.

Certificate of completion, 1 CPE credit


Pre-requisites 

    • Sound knowledge of TCP/IP protocols
    • Prior strong experience in Linux operating system
    • Prior hands-on experience with iptables
    • Prior experience with any firewall [preferred is iptables]
    • OSI Layers and formation and deformations of TCP / IP Packets
    • Understands the general concepts exploits and how they works

What is covered?

We will cover the theoretical part on the IDS & IPS Systems and will demonstrate how to work with Snort as Intrusion detection and prevention system.


What is not covered?

This workshop will not cover end to end on the Intrusion detection & prevention systems; however, it will master you on the core concepts and a practical experience in working with Snort.


EBOOK WITH COURSE MATERIALS INCLUDED


Course format

    • The course is self-paced – you can visit the training whenever you want and your content will be there.
    • Once you’re in, you keep access forever, even when you finish the course. 
    • There are no deadlines, except for the ones you set for yourself. 

SYLLABUS


MODULE 1: INTRODUCTION

    • What is Intrusion Detection System [IDS]?
    • Intrusion Detection Methodology
    • The Types of Intrusion Detection & Prevention Systems 
    • What is Intrusion Prevention System?
    • Architecture of Intrusion Detection & Prevention Systems
    • What is usually logged or detect or IDS & IPS 

MODULE 2: UNDERSTANDING THE SNORT ARCHITECTURE 


MODULE 3: CONFIGURING SNORT AS AN INTRUSION DETECTION SYSTEM

    • Modes of Snort Operation 
    • Installing Fedora Core on Virtual Box
    • Download and Install Snort 
    • Snort Sample configuration  

MODULE 4: CONFIGURING SNORT AS AN INTRUSION PREVENTION SYSTEM 

    • Snort as Intrusion Prevention System (Inline Mode)
    • Practicing lab Scenario

MODULE 5: MONITORING THE HACKING ATTEMPTS WITH SNORT

    • Configuring BASE

FINAL QUIZ


If you have any questions about the course or the syllabus, please contact our training coordinator Marta Strzelec at [email protected]

If you would like to ask about payment options and installment plans, please drop Marta Sienicka a line at [email protected]


If you want to learn more about Snort and test your knowledge in more practice, check Snort IDS Blast Course for advanced users. In this course you will find video tutorials about Snort and exercises that will help you deepen your experience with Snort. 

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE
  • Premium Subscription Only
  • UNLIMITED ACCESS
  • Course Certificate
816 STUDENTS ENROLLED

Who’s Online

There are no users currently online

Certificate Code

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013