Intrusion Detection with Suricata - Blue Team Series with Hackersploit
Offered By: Linode via YouTube
Course Description
Overview
          Dive into the world of intrusion detection with this comprehensive 52-minute video tutorial on Suricata, a free and open-source threat detection engine. Learn how to install, configure, and utilize Suricata for Blue Team security operations. Explore the fundamentals of Suricata, including its functionality, network placement, and integration with other security tools. Follow along with practical demonstrations covering installation, configuration, custom rule creation, log analysis, and integration with Wazuh. Gain hands-on experience in running intrusion tests and interpreting results. Perfect for cybersecurity professionals and enthusiasts looking to enhance their network security monitoring capabilities using IDS, IPS, and advanced threat detection techniques.
        
Syllabus
 Introduction
 What We’ll Be Covering
 Pre Requisites
 Introduction to Suricata
 How Does Suricata Work?
 Where is Suricata Placed In a Network?
 About our Lab Environment
 Practical Demo
 How to Download Suricata
 How to Start Suricata
 How to Configure Suricata
 Specifying Your Own Sources
 Adding Rulesets to Your Configuration
 How to Test the Configuration File
 Loading Suricata with the New Configuration
 How to Run an Intrusion Test with Suricata 
 How to Check the Logs
 How to Us Custom Rules
 Examining Suricata Log Files
 Integrating Suricata with Wazuh
 Conclusion
Taught by
Linode
Related Courses
Deploying Applications with HerokuUdacity User Research and Design
University of Minnesota via Coursera Planning a Security Incident Response
Microsoft via edX Kubernetes Hands-On - Deploy Microservices to the AWS Cloud
Udemy Contact Center AI: Building a Dynamic Virtual Agent
Pluralsight
