Completed
Examining Suricata Log Files
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Intrusion Detection with Suricata - Blue Team Series with Hackersploit
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 What We’ll Be Covering
- 3 Pre Requisites
- 4 Introduction to Suricata
- 5 How Does Suricata Work?
- 6 Where is Suricata Placed In a Network?
- 7 About our Lab Environment
- 8 Practical Demo
- 9 How to Download Suricata
- 10 How to Start Suricata
- 11 How to Configure Suricata
- 12 Specifying Your Own Sources
- 13 Adding Rulesets to Your Configuration
- 14 How to Test the Configuration File
- 15 Loading Suricata with the New Configuration
- 16 How to Run an Intrusion Test with Suricata
- 17 How to Check the Logs
- 18 How to Us Custom Rules
- 19 Examining Suricata Log Files
- 20 Integrating Suricata with Wazuh
- 21 Conclusion