This video covers the process of installing and configuring Snort 2 for the purpose of intrusion detection. An IDS is a system/host planted within a network to capture traffic and identify malicious activity based on predefined rules, after which, this malicious activity is logged, and a notification is sent to the relevant parties informing them of an intrusion. You can register for part 2 of this series for free here: //LINKS Snort Website: Snorpy Rule Generator: Video Slides: Register For Part 2 Of This Series: Get 100$ In Free Linode Credit: //PLATFORMS BLOG ►► FORUM ►► ACADEMY ►► //SOCIAL NETWORKS TWITTER ►► DISCORD ►► INSTAGRAM ►► LINKEDIN ►► PATREON ►► MERCHANDISE ►► //BOOKS Privilege Escalation Techniques ►► Docker Security Essentials (FREE) ►► //SUPPORT THE CHANNEL NordVPN Affiliate Link (73% Off) ►► Get $100 In Free Linode Credit ►► Get started with Intigriti: //CYBERTALK PODCAST Spotify ►► Apple Podcasts ►► //WE VALUE YOUR FEEDBACK We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms. //THANK YOU! Thanks for watching! Благодарю за просмотр! Kiitos katsomisesta Danke fürs Zuschauen! 感谢您观看 Merci d'avoir regardé Obrigado por assistir دیکھنے کے لیے شکریہ देखने के लिए धन्यवाद Grazie per la visione Gracias por ver شكرا للمشاهدة ----------------------------------------------------------------------------------- #Cybersecurity#BlueTeam











