The Module 1 of the Cyber Defence Monitoring Course is the Rule-Based Threat Detection Course. This course provides a throughout understanding of Suricata as an efficient tool for modern network security monitoring. Attendees gain practical experience on how to build up a scalable system and how challenging the security-engineering process can be. During hands-on exercises, students start from the basic single instance installation and end up implementing a distributed system with centralised command, analysis and visualisation solutions.
This intensive hands-on course concentrates on a single solution from a number of important Cyber defence monitoring techniques and solutions. We focus only on rule-based threat detection, more widely known as Intrusion Detection. We will use Suricata, an open-source free software tool, to build network security monitoring for different scales, from SOHO/SME up to enterprise level.
- Technical IT security staff in charge of the implementation of classified networks.
- Security and IT managers who want to get a real-life understanding of Suricata.
- Experienced network forensics practitioners are not the target audience for this course.
- Installing a single instance for small office network
- Building from source to get a custom set of required features
- Controlling the rule base
- Tweaking protocols and artefact extraction
- Tweaking outputs with scripting
- Controlling a large setup
- Gathering logs and extractions
- Visualising for humans
On this course we will work with network traffic from Locked Shields exercise, and so the traffic will have real intrusions. We will also use samples of existing botnets to analyse obfuscation techniques that are present in real world.
- Good understanding of TCP/IP networking and network and system administration
- Recent everyday network/system administrator’s work experience for at least 2 years in UNIX environments
- Previous detailed knowledge on the following topics:
- work principles of UNIX operating systems and UNIX file system layout
- common UNIX shells (e.g., sh, bash)
- common UNIX user tools (e.g., ls, ps, kill)
- common UNIX system administration utilities
- Scripting experience is required
- Previous programming experience is not required, but is helpful
- English language skill comparable to STANAG 6001, 184.108.40.206.
NB! We strongly discourage the participation of students who do not fulfil any part of these prerequisites, since the course contains advanced lab sessions assuming this knowledge. The presence of unskilled attendees is likely to hinder the overall progress of the course.
Pre-study e-Learning material
ADL 345 Network and Log Monitoring on the NATO e-Learning website
Registration opens on 19 November 2018. Applicants from CCDCOE member nations should use the registration code provided by their national Point of Contact. An email confirming the participation will be sent only after the registration has closed.
If you have any questions or issues with registration, please contact [email protected]