Главная
Study mode:
on
1
Introduction
2
What We’ll Be Covering
3
Pre Requisites
4
Introduction to Suricata
5
How Does Suricata Work?
6
Where is Suricata Placed In a Network?
7
About our Lab Environment
8
Practical Demo
9
How to Download Suricata
10
How to Start Suricata
11
How to Configure Suricata
12
Specifying Your Own Sources
13
Adding Rulesets to Your Configuration
14
How to Test the Configuration File
15
Loading Suricata with the New Configuration
16
How to Run an Intrusion Test with Suricata
17
How to Check the Logs
18
How to Us Custom Rules
19
Examining Suricata Log Files
20
Integrating Suricata with Wazuh
21
Conclusion
Description:
Dive into the world of intrusion detection with this comprehensive 52-minute video tutorial on Suricata, a free and open-source threat detection engine. Learn how to install, configure, and utilize Suricata for Blue Team security operations. Explore the fundamentals of Suricata, including its functionality, network placement, and integration with other security tools. Follow along with practical demonstrations covering installation, configuration, custom rule creation, log analysis, and integration with Wazuh. Gain hands-on experience in running intrusion tests and interpreting results. Perfect for cybersecurity professionals and enthusiasts looking to enhance their network security monitoring capabilities using IDS, IPS, and advanced threat detection techniques.

Intrusion Detection with Suricata - Blue Team Series with Hackersploit

Linode
Add to list
0:00 / 0:00