Securing Cisco Networks with Snort Rule Writing Best Practices is a lab-intensive course that introduces users of open source Snort or Sourcegire FIRESIGHT systems to the Snort rules language and rule-writing best practices. Users focus exclusively on the Snort rules language and rule writing. Starting from rule syntax and structure to advanced rule-option usage, you will analyze exploit packet captures and put the rule writing theories learned to workโimplementing rule-language features to trigger alerts on the offending network traffic.This course also provides instruction and lab exercises on how to detect certain types of attacks, such as buffer overflows, utilizing various rule-writing techniques. You will test your rule-writing skills in two challenges: a theoretical challenge that tests knowledge of rule syntax and usage, and a practical challenge in which we present an exploit for you to analyze and research so you can defend your installations against the attack.This course combines lecture materials and hands-on labs throughout to make sure that you are able to successfully understand and implement open source rules.
Module 1: Welcome to the Cisco and Sourcefire Virtual Network
Module 2: Basic Rule Syntax and Usage
Module 3: Rule Optimization
Module 4: Using Perl Compatible Regular Expressions (PCRE) in Rules
Module 5: Using Byte_Jump/Test/Extract Rule Options
Module 6: Protocol Modeling Concepts and Using Flowbits in Rule Writing
Module 7: Case Sudies in Rule Writing and Packet Analysis
Module 8: Rule Performance Monitoring
Module 9: Rule Writing Practiceal Labs, Exercises, and Challenges
Labs
After completing this course, you should be able to:
Attendees should meet the following prerequisites:
This course is designed for security professionals who need to know how to write rules and understand open source Snort language.
NOK 36.500
COURSE CONTENT: Chapter 1: Setting Up the BIG-IP System โข Introducing the BIG-IP System โข Initially Setting Up the BIG-IP System โข Archiving the BIG-IP System Configuration โข Leveraging…
COURSE CONTENT: Course Topics: โข Scalability and Hyperscaleย โข Maestro Security Groups and the Single Management Objectย โข Administrator Operationsย โข Traffic Flowย โข System Diagnostics and Tracking Changesย …
This core course covers the fundamentals needed to deploy, configure, and manage daily operations of Check Point Security Gateways and Management Software Blades that run on the Gaia operating…