The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription

Course archive

The courses below were all published in 2015 or earlier. While we stand by pubishing them then, we’ve grown so much since. We recognize that these workshops don’t exactly meet our standards, as we understand them today. 

All classes are available within our premium membership, and have adjusted CPE awards to reflect their respective contents. If you join, please keep in mind that some of the information inside might be outdated or not relevant. We’ll be adding notes at the beginning of each course to let you know what’s worth checking out in each! 


The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription


Welcome to the workshop, in the first module we will be talking about what actually intrusion detection and prevention systems are and what role they play in these days of information security and increase in the events of hacking. We will also explore the types of these two systems and will also demonstrate Snort as an Intrusion detection System.

Certificate of completion, 1 CPE credit


Pre-requisites 

    • Sound knowledge of TCP/IP protocols
    • Prior strong experience in Linux operating system
    • Prior hands-on experience with iptables
    • Prior experience with any firewall [preferred is iptables]
    • OSI Layers and formation and deformations of TCP / IP Packets
    • Understands the general concepts exploits and how they works

What is covered?

We will cover the theoretical part on the IDS & IPS Systems and will demonstrate how to work with Snort as Intrusion detection and prevention system.


What is not covered?

This workshop will not cover end to end on the Intrusion detection & prevention systems; however, it will master you on the core concepts and a practical experience in working with Snort.


EBOOK WITH COURSE MATERIALS INCLUDED


Course format

    • The course is self-paced – you can visit the training whenever you want and your content will be there.
    • Once you’re in, you keep access forever, even when you finish the course. 
    • There are no deadlines, except for the ones you set for yourself. 

SYLLABUS


MODULE 1: INTRODUCTION

    • What is Intrusion Detection System [IDS]?
    • Intrusion Detection Methodology
    • The Types of Intrusion Detection & Prevention Systems 
    • What is Intrusion Prevention System?
    • Architecture of Intrusion Detection & Prevention Systems
    • What is usually logged or detect or IDS & IPS 

MODULE 2: UNDERSTANDING THE SNORT ARCHITECTURE 


MODULE 3: CONFIGURING SNORT AS AN INTRUSION DETECTION SYSTEM

    • Modes of Snort Operation 
    • Installing Fedora Core on Virtual Box
    • Download and Install Snort 
    • Snort Sample configuration  

MODULE 4: CONFIGURING SNORT AS AN INTRUSION PREVENTION SYSTEM 

    • Snort as Intrusion Prevention System (Inline Mode)
    • Practicing lab Scenario

MODULE 5: MONITORING THE HACKING ATTEMPTS WITH SNORT

    • Configuring BASE

FINAL QUIZ


If you have any questions about the course or the syllabus, please contact our training coordinator Marta Strzelec at [email protected]

If you would like to ask about payment options and installment plans, please drop Marta Sienicka a line at [email protected]


If you want to learn more about Snort and test your knowledge in more practice, check Snort IDS Blast Course for advanced users. In this course you will find video tutorials about Snort and exercises that will help you deepen your experience with Snort. 

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE
  • Premium Subscription Only
  • UNLIMITED ACCESS
  • Course Certificate
896 STUDENTS ENROLLED

Who’s Online

There are no users currently online

Certificate Code

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013