Completed
Conclusion
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Blue Team Hacking - Intrusion Detection with Snort
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 What We’ll Be Covering
- 3 Prerequisites
- 4 What Are Intrusion Detection Systems?
- 5 Introduction to Snort
- 6 What are the Different Versions of Snort?
- 7 What are Snort Rules?
- 8 Snort Rule Syntax
- 9 How Does Snort Work?
- 10 Snort IDS Network Placement
- 11 About Our Lab Environment
- 12 On to the Practical Demo
- 13 Installing Snort
- 14 How to Enable Promiscuous Mode
- 15 How to Examine the Manual for Snort
- 16 Snort Configuration
- 17 Testing Our Configuration File
- 18 Creating Basic Rules
- 19 How to Run Snort
- 20 Writing Another Rule
- 21 Verifying Our New Rule
- 22 How to Use Snorpy
- 23 Let’s Examine Community Rules
- 24 How to use Logging in Snort
- 25 Conclusion