Course title

Intrusion Detection System (IDS) Log Analysis with Suricata

This course is designed for new or experienced Network Analysts to automate some of the detections of malicious network traffic.

Course summary

This course is designed for new or experienced Network Analysts to automate some of the detections of malicious network traffic. It begins with the basics of network ingestion and Suricata configuration to ingest data into the Elastic Stack. Next, you will learn the various components of a Suricata rule. Finally, we learn how to use Regular expressions to write more effective rules.


This course is part of the Elastic Network Security Analyst Learning Path. Please review the pre-reqs section for additional information.

Download Outline

Topics

  • Getting traffic to Suricata via common traffic capture methods
  • Suricata overview
  • Configuration and setup of Suricata
  • Suricata rule structure and options
  • Suricata rule writing using common protocols
  • Using Regular Expressions (REGEX) and Perl Compatible Regular Expressions in Suricata

Topics

Audience

Duration

Requirements

See full, ,Intrusion Detection System log analysis with Suricata, ,schedule

Course type

On-Demand

Course details

Language
English
Cost
$800 USD