> > > SSFRULES Lab Topology

Securing Cisco Networks with Snort Rule Writing Best Practices (SSFRULES)

Course Description Schedule Course Outline Lab Topology
 

Lab Topology

  • Lab 1: Writing Custom Rules
  • Lab 2: Drop Rules
  • Lab 3: Replacing Content
  • Lab 4: SSH Rule Scenerio
  • Lab 5: Optimizing Rules
  • Lab 6: Using PCRE test to Test Regex Options
  • Lab 7:Use PCREtest to Test Custom Regular Expressions
  • Lab 8: Writing Rules That Contain PCRE
  • Lab 9: Detecting SADMIND Trust with Byte_Jump and Byte_test
  • Lab 10: Using the Bitwise AND Operation in Byte_Test Rule Option
  • Lab 11: Detecting ZenWorks Directory Traversal Using Byte_Extract
  • Lab 12: Writing a Flowbit Rule
  • Lab 13: Extra Flowbits Challenge
  • Lab 14: Strengthen Your Brute-Force Rule with Flowbits
  • Lab 15: Research and Packet Analysis
  • Lab 16: Revisiting the Kaminsky Vulnerability
  • Lab 17: Configuring Rule Profiling
  • Lab 18: Testing Rule Performance
  • Lab 19: Configure Rule Profiling to View PCRE Performance
  • Lab 20: Preventing User Access to a Restricted Site
  • Lab 21: SQL Injection
  • Lab 22: The SQL Attack Revisited
 

Accessing our website tells us you are happy to receive all our cookies. However you can change your cookie settings at any time. Find out more.   Got it!