Mastering in Intrusion Detection System Snort Workshop by Raheel Ahmad.
You will learn how to work with iptables to integrate with SNORT and how to Installing & configuring the intrusion detection system as per your network requirement.
Welcome to the workshop, in the first module we will be talking about what actually intrusion detection and prevention systems are and what role they play in these days of information security and increase in the events of hacking. We will also explore the types of these two systems and will also demonstrate Snort as an Intrusion detection System.
This e-book contains text materials from the course.
>>CHECK THE COURSE<<
>>Table of Contents<<
MODULE 1
- INTRODUCTION
- What is Intrusion Detection System [IDS]?
- Intrusion Detection Methodology
- The Types of Intrusion Detection & Prevention SystemsÂ
- What is Intrusion Prevention System?
- Architecture of Intrusion Detection & Prevention Systems
- What is usually logged or detect or IDS & IPSÂ
MODULE 2Â
MODULE 3
-
- CONFIGURING SNORT AS AN INTRUSION DETECTION SYSTEM
-
- Modes of Snort Operation
- Installing Fedora Core on Virtual Box
- Download and Install SnortÂ
- Snort Sample configuration
-
- CONFIGURING SNORT AS AN INTRUSION DETECTION SYSTEM
MODULE 4Â
-
- CONFIGURING SNORT AS AN INTRUSION PREVENTION SYSTEM
-
- Snort as Intrusion Prevention System (Inline Mode)
- Practicing lab Scenario
-
- CONFIGURING SNORT AS AN INTRUSION PREVENTION SYSTEM
MODULE 5
-
-
Configuring BASE
-
(7 views)
Reviews
There are no reviews yet.