SavitarX
Ctrlk
LinkedinTryHackme
  • README
  • CERTIFICATIONS & notes
    • My Roadmap to Becoming a Penetration Tester & Red Team
    • Comp Network
    • Red Team
    • Blue Team
      • Defensive Security Analyst
        • Security Monitoring & SIEM Fundamentals
        • Windows Event Logs & Finding Evil
        • Introduction to Threat Hunting & Hunting With Elastic
        • Understanding Log Sources & Investigating with Splunk
        • Windows Attacks & Defense
        • Intro to Network Traffic Analysis
        • Intermediate Network Traffic Analysis
        • Working with IDS/IPS
          • Suricata FundamentalsP
          • Suricata Rule Development Part 1
          • Suricata Rule Development Part 2 (Encrypted Traffic)
          • Snort Fundamentals
          • Snort Rule Development
          • Zeek Fundamentals
          • Intrusion Detection With Zeek
          • Skills Assessment - Suricata
          • Skills Assessment - Snort
          • Skills Assessment - Zeek
        • Introduction to Malware Analysis
        • YARA & Sigma for SOC Analysts
        • Introduction to Linux Forensics
      • Digital Forensics and Incident Response
    • Web Pentesting
  • Writeups
    • Tryhackme
  • Machines to pratice for
    • CPTS Preparation
    • OSEP
  • The Computer Science and Engineering program
    • Read this
    • Computer Science
    • Security
Powered by GitBook
On this page
  1. CERTIFICATIONS & notes
  2. Blue Team
  3. Defensive Security Analyst

Working with IDS/IPS

Suricata FundamentalsPSuricata Rule Development Part 1Suricata Rule Development Part 2 (Encrypted Traffic)Snort FundamentalsSnort Rule DevelopmentZeek FundamentalsIntrusion Detection With ZeekSkills Assessment - SuricataSkills Assessment - SnortSkills Assessment - Zeek
PreviousStrange Telnet & UDP ConnectionsNextSuricata FundamentalsP