Chapter 2.2 - IDS/IPS: Signatures, Anomaly Detection & Evasion
Deploy and tune Snort and Suricata, write effective detection rules, understand evasion techniques, and map detections to MITRE ATT&CK.
Deploy and tune Snort and Suricata, write effective detection rules, understand evasion techniques, and map detections to MITRE ATT&CK.