Securing Cisco Networks with Open Source Snort (SSFSNORT)

Course Overview

This course is an instructor-led course offered by Cisco Learning Services High-Touch Delivery. It is a lab-intensive course that introduces students to the open source SNORT technology as well as rule writing. You will learn how to build and manage a SNORT system using open source tools, plug-ins, and the SNORT rule language to help manage, tune, and deliver feedback about suspicious network activity. This course combines lecture materials and hands-on labs throughout to make sure that you are able to construct a solid, secure SNORT installation and write SNORT rules using proper syntax and structure. This course prepares you for the 500-250 (SSFSNORT) Securing Cisco Networks with Open Source SNORT exam.

4 days
500-250 SSFSNORT
  • After completing this course, you should be able to:

    • Describe Snort technology and identify the resources that are available for maintaining a Snort deployment
    • Install Snort on a Linux-based operating system
    • Describe the Snort operation modes and their command-line options
    • Describe the Snort intrusion detection output options
    • Download and deploy a new rule set to Snort
    • Describe and configure the snort.conf file
    • Configure Snort for inline operation and configure the inline-only features
    • Describe the Snort basic rule syntax and usage
    • Describe how the Snort engine processes traffic
    • Describe several advanced rule options used by Snort
    • Describe OpenAppID features and functionality
    • Describe how to monitor Snort performance and how to tune rules
    • Module 1: Introduction to Snort Technology
    • Module 2: Snort Installation
    • Module 3: Snort Operation
    • Module 4: Snort Intrusion Detection Output
    • Module 5: Rule Management
    • Module 6: Snort Configuration
    • Module 7: Inline Operation and Configuration
    • Module 8: Snort Rule Syntax and Usage
    • Module 9: Traffic Flow Through Snort Rules
    • Module 10: Advanced Rule Options
    • Module 11: OpenAppID Detection
    • Module 12: Tuning Snort
    • Lab 1: Connecting to the Lab Environment
    • Lab 2: Snort Installation
    • Lab 3: Snort Operation
    • Lab 4: Snort Intrusion Detection Output
    • Lab 5: Pulled Pork Installation
    • Lab 6: Configuring Variables
    • Lab 7: Reviewing Preprocessor Configurations
    • Lab 8: Inline Operations
    • Lab 9: Basic Rule Syntax and Usage
    • Lab 10: Advanced Rules Options
    • Lab 11: OpenAppID
    •  Lab 12: Tuning Snort

    Lab Topology:

  • The knowledge and skills necessary before attending this course are:

    • Basic understanding of networking and network protocols
    • Basic knowledge of Linux command-line utilities and text-editing utilities commonly found in Linux
    • Basic knowledge of network security concepts
  • This course is designed for technical professionals who need to know how to deploy Open Source Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), as well as write Snort rules. The primary audience for this course includes:

    • Security Administrators
    • Security Consultants
    • Network Administrators
    • System Engineers
    • Technical Support Personnel using Open Source IDS and IPS
    • Resellers