Discover how to install and configure the Snort intrusion detection software.
Learning Objectives
CEHv10: Evading IDS, Firewalls, and Honeypots Part 2
- install Snort intrusion detection software
- configure Snort post-installation and describe the structure of a ruleset
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cyber Operations
- Cybersecurity Management
- Exploitation Analysis
- Vulnerability Assessment and Management
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.