Course Offering
- Digital Transformation
- Featured Vendors
- Amazon Web Services»
- Arista
- Aruba
- Cisco Systems»
- Citrix»
- Google Cloud
- Microsoft
- NetApp»
- Red Hat»
- SUSE
- VMware»
-
Additional Vendors»
- Azeti
- Barracuda
- Brocade
- Checkpoint
- Cloudera
- CWNP
- Cybersecurity First Responder
- Davra Networks
- EMC
- EnterpriseDB
- F5 Networks
- Fast Lane
- Fortinet
- Gigamon
- IAPP
- IBM
- (ISC)²
- ITIL
- Juniper Networks
- Kaspersky Lab
- Linux Foundation
- NCTA
- NotSoSecure
- Oracle
- Palo Alto Networks
- Pivotal
- Project Management
- PRINCE2
- Pulse Secure
- Red Hat
- Relayr
- Ruckus
- Salesforce
- Scrum
- SUSE
- Veritas
- Voss
- Fast Lane LIVE
- E-Learning
- Training by Technology
- Big Data & Analytics
- Blockchain
- Cloud Computing
- Collaboration
- Data Center
- Enterprise Mobility
- FlexPod
- GDPR Program
- Internet of Things (IoT)
- IPv6
- OpenStack
- Optical Technology
- Security
- VersaStack
- Virtualization
- Wireshark / Packet Analysis
CI-SSFSNORT
Classroom Training
Modality: G
Duration 4 days
Price (excl. VAT)
- Eastern Europe: US$ 4,000.-
Currently no training dates Enquire a date
Online Training
Modality: L
Price (excl. VAT)
- Eastern Europe: US$ 4,000.-
Currently no online training dates

Securing Cisco Networks with Open Source Snort (SSFSNORT)
Course Description | Schedule | Course Outline |
![]() |
Lab Topology |
Lab Topology
- Lab 1:Install Snort and Its Components (Module 3)
- Lab 2: Barnyard2 Installation (Module 4)
- Lab 3: Barnyard and Snorby Configuration (Module 4)
- Lab 4: Operating Snort (Module 5)
- Lab 5: Configuring Your IDS/IPS Installation (Module 6)
- Lab 6: Portscan Configuration (Module 7)
- Lab 7: Stream Reassembly (Module 7)
- Lab 8: Pulled Pork Installation, Configuration, and Usage (Module 8)
- Lab 9: Building a Distributed Snort Installation (Module 9)
- Lab 10: Wrighting Custom Rules (Module 10)
- Lab 11: Building an Inline IPS (Module 11)
- Lab 12: Using the Drop Action (Module 11)
- Lab 13: Using the Replace Action (Module 11)
- Lab 14: Optimizing Rules (Module 12)
- Lab 15: Using and Testing PCRE in Rules (Module 13)
- Lab 16: Using Event Filtering (Module 14)
- Lab 17: Using Supression (Module 14)
- Lab 18: Configuring Rule Profiling (Module 14)
- Lab 19: Detecting SADMIND Trust with Byte_Jump and Byte_Test (Module 15)
- Lab 20: Using the Bitwise AND Operation in Byte_Test (Module 15)
- Lab 21: Detecting ZenWorks Directory Traversal with Byte_Extract (Module 15)
- Lab 22: Writing Flowbits Rules (Module 16)
- Lab 23: Research and Packet Analysis (Module 17)
- Lab 24: Revisiting the Kaminsky Vulnerability (Module 17)