|  
Beginning and Advanced Snort Training Building 
Open Source Security ToolsIntrusion Detection Systems and Intrusion 
Prevention SystemsA Hands-on Approach Dates: November 1st- 5th 2004 9-6 Daily
 Price: 300,000 yen
 Network intrusions have increased 
dramatically over the last 5 years requiring companies to deploy a defense-in-depth security strategy to 
protect sensitive company assets.  It 
is well known that a firewall is not sufficent by itself to insure company assets 
are protected. A second line of defense is required in this day and age. Intrusion 
Detection is another well established control in the fight to keep a companies 
most sentitve information private.  Intrusion 
detection is simply trying to detect the signs of a network intruder before damage 
can be done and determining when unauthorized people are attempting to break into 
your network.  This type of detection 
can be either for hackers, internal workers, worms, viruses or trojan applications.
 Beginning and Advanced Snort training is a 32-hour class which provides a 
conceptual understanding of current generation open source, intrusion detections 
systems, specifically the Snort 2.3 IDS sensor. This class is designed for new 
users of the Snort IDS platform, and is intended for organizations that wish to 
leverage open source IDS technology in lieu of expensive commercial IDS offerings. 
The course provides the student with an understanding of IDS technology and terminology, 
and progresses through advanced topics such as IDS architecture and deployment, 
protocol capture and analysis, custom signature creation, active intrusion prevention, 
and stealth network monitoring. Day 1: Installing a Snort 
IDS on OpenBSD and Fedora Core 2: Single Box Solution
 Designed for the 
beginner and advanced student alike, day one of the course is designed as a primer 
on IDS technology and technical terminology, and will bring the student up to 
speed on current IDS offerings, both open source and commercial in nature.
 
 Day one of the course is a detailed overview of the Snort 2.3 IDS sensor, 
and gives the student a hands on introduction to the platform including: system 
requirements, Snort 2.3 features, uses for Snort on a network, problems faced 
with monitoring switched networks, the quandary of false positives, and frequently 
asked questions about the Snort IDS sensor platform.
 
 The student will 
also actually install Snort IDS on OpenBSD and Fedora Core 2 using the following 
components:
 
 MySQL
 Zlib
 Libpng
 Apache
 Jgraph
 ADODB
 PCRE
 Libnet
 PHP
 ACID
 
 
 Day 2: Installing a SnortIPS on 
OpenBSD and Fedora Core 2: Single Box Solution
 
 Day two provides the student 
with an IPS machine on which to install Snort, and includes a step-by-step procedure 
for initial operating system configuration and hardening, packet capture library 
installation, retrieval of recent Snort sources, and a detailed walk-through on 
compiling the Snort package from scratch.
 
 The student will also actually 
install Snort IPS on OpenBSD and Fedora Core 2 using the following components:
 
 Snortsam
 Fwsnort
 Snort_line
 
 
 Day 3: Inside the Snort 
IDS- Snort Architecture Explanation
 The third day of instruction starts with 
an introduction to capturing network traffic and sniffing, and segues into a more 
advanced discussion on the inner workings of Snort, including: processing packets, 
packet preprocessors, rule parsing and the use of detection engines, rule formats 
and packet matching, configuration files, and rule headers.
 
 The second 
half of day three is understanding the characteristics of Snort rules, including 
IP options, TCP options, ICMP options, rule identifier options, and many other 
miscellaneous rule options specific to the Snort sensor engine, including custom 
logging options, unified logging facilities, understanding Snort output, exploration 
of third-party data analysis tools, and an introduction to third-party plugins 
and addon tools for the Snort 2.3 intrusion detection suite.
 
 Preprocessors
 Detection Engine
 Output Engine
 Snort Rules- HTTP Emphasis
 Barnyard
 Open Aanval
 Snort Swatch
 Snot
 Stick
 
 
 Day 4: Advanced 
Snort Training Topics: Distributed Installation of Snort IDS/IPS on OpenBSD and 
Fedora Core2 & Snort Troubleshooting
 
 By day four ofthe class, students 
will have a good understanding of IDS technology and architecture, and will have 
mastered the concepts surrounding initial installation and configuration of a 
Snort sensor. Advanced topics on Snort IDS deployments is presented to the student, 
including sessions on: Snort preprocessors, preprocessor options for reassembly 
of packets, IP fragment reassembly and attack detection, preprocessor options 
for normalization of network traffic, HTTP normalization, and an introduction 
to writing a custom preprocessor.
 
 The First halfof day four provides 
a fast track to understanding and implementing Snort plugins and Distributed Installation 
of Snort Using 2 Sensors for one Database.
 
 Topics include:
 SSH Tunneling 
between Sensor and Database
 MySQL Permissions
 Networking
 ACID Security 
Settings
 Database Archiving
 Scripts and Remote Monitoring
 
 The 
second half of the day finalizes the student's understanding of the Snort IDS/IPS 
engine, and provides the student with an exhaustive "Troubleshoot It Yourself" 
approach to solving the many installations problems with Snort, including:
 
 Common Database Problems
 SSH/SSL Problems
 Help! I lost my Database!
 Editing the .Conf files
 Connectivity Problems
 
 By the end of day four, 
the new found Snort adept will be armed with an arsenal of tools for implementing 
open source intrusion detection systems in high speed and high performance networking 
environments, while utilizing the Snort 2.3 IDS sensor as a virtual "Swiss Army 
Knife" for network and host attack mitigation.
 
 
 (IT 
Services are currently being displayed on the right.) |