YoVDO

Intrusion Detection with Suricata - Blue Team Series with Hackersploit

Offered By: Linode via YouTube

Tags

Blue Team Courses Cybersecurity Courses Configuration Management Courses Log Analysis Courses Intrusion Detection Courses Suricata Courses

Course Description

Overview

Dive into the world of intrusion detection with this comprehensive 52-minute video tutorial on Suricata, a free and open-source threat detection engine. Learn how to install, configure, and utilize Suricata for Blue Team security operations. Explore the fundamentals of Suricata, including its functionality, network placement, and integration with other security tools. Follow along with practical demonstrations covering installation, configuration, custom rule creation, log analysis, and integration with Wazuh. Gain hands-on experience in running intrusion tests and interpreting results. Perfect for cybersecurity professionals and enthusiasts looking to enhance their network security monitoring capabilities using IDS, IPS, and advanced threat detection techniques.

Syllabus

Introduction
What We’ll Be Covering
Pre Requisites
Introduction to Suricata
How Does Suricata Work?
Where is Suricata Placed In a Network?
About our Lab Environment
Practical Demo
How to Download Suricata
How to Start Suricata
How to Configure Suricata
Specifying Your Own Sources
Adding Rulesets to Your Configuration
How to Test the Configuration File
Loading Suricata with the New Configuration
How to Run an Intrusion Test with Suricata
How to Check the Logs
How to Us Custom Rules
Examining Suricata Log Files
Integrating Suricata with Wazuh
Conclusion


Taught by

Linode

Related Courses

Blue Team Tools: Defense against Adversary Activity Using MITRE Techniques
Pluralsight
Privilege Escalation with UACMe
Pluralsight
Splunk Security Event Monitoring - Blue Team Series with Hackersploit
Linode via YouTube
Intrusion Detection with Wazuh - Blue Team Series with Hackersploit
Linode via YouTube
Blue Team Hacking - Intrusion Detection with Snort
Linode via YouTube