Intrusion Detection Using Snort, Hands-on

Location Duration  
Brussels, February 25, 2013 3 days Request information  Register for this course
Lancelot Institute In- Company and Customized Training Services Request information
Partner with the Lancelot Institute Request information
This class provides a rock solid foundation for the intrusion detection practitioner. It describes the background and basics of IDS/IPS, how they work, how they are commonly deployed, and such. It then uses extensive hands-on labs to demonstrate to the students how to install and configure the popular open source Snort IDS/IPS engine. Hands-on labs include attacking a Snort equipped virtual machine with commonly used attack tools and methods. The attacks include both operating system and application level methods. The Snort IDS is used to detect the attacks, the results of which are then checked and discussed. Students also learn how to create customized Snort rules. Lastly, common pitfalls and how to avoid them, along with practical tips for how to deploy an IDS network are discussed.

The ideal student for this class is a hands-on IT security practitioner, with a solid working knowledge of TCP/IP networking and common operating systems

After attending this training they will:

  • Have gained a thorough understanding of the capabilities in today’s cutting edge Intrusion Detection and Prevention technologies
  • Have built a working knowledge of how to design an effective intrusion detection architecture in today’s complex data processing environments
  • Have learned first-hand how systems and applications are commonly attacked today, and what difficulties these attacks present to detection
  • Understand the vital role that applications and web application firewalls can and must play in effective intrusion detection
  • Appreciate how an intrusion detection program has to interface with an incident response program, and the difficulties faced by incident investigations
  • Be able to develop an IDS/IPS architecture that meets the needs of a modern enterprise data processing environment;
  • Have a solid foundational understanding of the modern system and application vulnerabilities, their attacks, and how these can be detected;
  • Be able to effectively work together with an enterprise incident response program
01: Understanding the problem 
02: Survey of today’s product space
03: Attacks and attack tools hands-on exercises – Network and System level
04: Attacks and attack tools hands-on exercises – Application level
05: Application-level considerations
06: Real world pitfalls to understand and avoid
07: Incident response considerations
08: Next steps to take in building an enterprise grade IDS/IPS program
sluiten

Interested?



Name:  
Company:  
Position:  
E-mail:  
Address:  
Zip Code / City:  
Cell Phone:  
Country:  
 
Course:   Intrusion Detection Using Snort, Hands-on
Date & Location:  
Comments:  
sluiten

Tell a friend



Name:  
E-mail:  
Friend's name:  
Friend's email:  
sluiten

Book our experts for events, consultancy and congresses


 


Name:  
Company:  
Position:  
E-mail:  
Address:  
Zip Code / City:  
Cell Phone:  
Country:  
 
Interested in:   Additional information
Personal contact
Area of interest:  
Question/remark:  
Comments:  
sluiten

In house training at your location



Name:  
Company:  
Position:  
E-mail:  
Address:  
Zip Code / City:  
Cell Phone:  
Country:  
 
Interested in:   Additional information
Personal contact
Area of interest:  
Question/remark: