Screencast: Snort -- Tactics for basic network analysis
In this exclusive screencast step-by-step demo, Tom Bowers explains how the Snort open source IDS tool works and illustrates how it can help security pros assess network security.
![]() |
||||
|
![]() |
|||
![]() |
In this step-by-step demonstration, SearchSecurity.com contributor Tom Bowers offers a brief introduction and history of Snort, and explains what it can do for information security pros and how to use it for the first time.
![]() |
|
![]() |
![]() |
![]() |
Tom Bowers, managing director of security think tank and industry analyst firm Security Constructs, holds the CISSP, PMP and Certified Ethical Hacker certifications, and is a well-known expert on the topics of data leakage prevention, global enterprise information security architecture and ethical hacking. His areas of expertise include aligning business needs with security architecture, risk assessment and project management on a global scale. Bowers serves as the president of the 600-member Philadelphia chapter of Infragard, is a technical editor of Information Security magazine, and speaks regularly at events like Information Security Decisions.
Learn more about Snort:
- Snort Technical Guide
- Learn how to find Snort IDS rules
- News: Snort creator, Sourcefire seek fresh approach