Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Pluralsight

OS Analysis with Nagios

via Pluralsight

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
In this course, you will learn how to perform OS analysis
using Nagios XI from a security blue team perspective, to
effectively create better awareness around common MITRE
TTPs.

Would you like to be able to effectively detect the beginning stages of the most common attacks by identifying activity like powershell execution or monitor the status of constant services like your windows firewall? In this course, OS Analysis with Nagios, you’ll cover how to utilize Nagios XI to secure a live enterprise environment. First, you’ll explore the detection of command shells like Powershell. Next, you’ll apply alerts to detect if the Windows Firewall service is ever disabled. Finally, you’ll review some of the event logging capabilities to increase overall awareness. In addition to these main objectives, you will also explore some of the graphing and network visibility features of Nagios XI as well. When you’re finished with this course, you’ll have the skills and knowledge to detect Command and Scripting Interpreter: PowerShell (T1059.001), Impair Defenses: Disable or Modify Firewall (T1562.007), and File and Directory Discovery (T1083) using Nagios XI.

Syllabus

  • Course Overview 1min
  • Using Nagios for OS Analysis 18mins
  • Resources 1min

Taught by

Owen Dubiel

Reviews

3.8 rating at Pluralsight based on 12 ratings

Start your review of OS Analysis with Nagios

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.