devilbones wrote: » It depends. Are you going to be installing and configuring? Are you going to be writing rules to evaluate traffic? Are you going to be analyzing the results? You can set up a lab with snort, attack one of your vulnerable VMs and then see what pops up.