Problem solve Get help with specific problems with your technologies, process and projects.

Screencast: Snort -- Tactics for basic network analysis

In this exclusive screencast step-by-step demo, Tom Bowers explains how the Snort open source IDS tool works and illustrates how it can help security pros assess network security.

Can't see the screen?

Watch David Strom's UTM demonstration in a larger window.
Snort is a robust tool that can be used in a number of ways to assess the security posture of a network, but it takes time to learn and it can be tricky to obtain all the data that Snort can provide.

In this step-by-step demonstration, contributor Tom Bowers offers a brief introduction and history of Snort, and explains what it can do for information security pros and how to use it for the first time.

About the author:
Tom Bowers, managing director of security think tank and industry analyst firm Security Constructs, holds the CISSP, PMP and Certified Ethical Hacker certifications, and is a well-known expert on the topics of data leakage prevention, global enterprise information security architecture and ethical hacking. His areas of expertise include aligning business needs with security architecture, risk assessment and project management on a global scale. Bowers serves as the president of the 600-member Philadelphia chapter of Infragard, is a technical editor of Information Security magazine, and speaks regularly at events like Information Security Decisions.

Learn more about Snort:

  • Snort Technical Guide

  • Learn how to find Snort IDS rules

  • News: Snort creator, Sourcefire seek fresh approach

This was last published in October 2007

Dig Deeper on Open source security tools and software