×

OS Analysis with Nagios

Add to wishlistAdded to wishlistRemoved from wishlist 0
Add to compare+
Duration

21m

level

Beginner

Course Creator

Owen Dubiel

Last Updated

01-Dec-22

In this course, you will learn how to perform OS analysis using Nagios XI from a security blue team perspective, to effectively create better awareness around common MITRE TTPs.

Add your review

Would you like to be able to effectively detect the beginning stages of the most common attacks by identifying activity like powershell execution or monitor the status of constant services like your windows firewall? In this course, OS Analysis with Nagios, you’ll cover how to utilize Nagios XI to secure a live enterprise environment. First, you’ll explore the detection of command shells like Powershell. Next, you’ll apply alerts to detect if the Windows Firewall service is ever disabled. Finally, you’ll review some of the event logging capabilities to increase overall awareness. In addition to these main objectives, you will also explore some of the graphing and network visibility features of Nagios XI as well. When you’re finished with this course, you’ll have the skills and knowledge to detect Command and Scripting Interpreter: PowerShell (T1059.001), Impair Defenses: Disable or Modify Firewall (T1562.007), and File and Directory Discovery (T1083) using Nagios XI.
Author Name: Owen Dubiel
Author Description:
Owen is a security practitioner at heart, who also enjoys being able to teach others about cyber security best practices and techniques. He has recently found that doing online teaching has been one of the most fulfilling experiences in his working life. He loves being able to spread the good word of security to any and all that are willing to learn it!

Table of Contents

  • Course Overview
    1min
  • Using Nagios for OS Analysis
    18mins
  • Resources
    1min

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “OS Analysis with Nagios”

Your email address will not be published. Required fields are marked *

OS Analysis with Nagios
OS Analysis with Nagios
Edcroma
Logo
Compare items
  • Total (0)
Compare
0
https://login.stikeselisabethmedan.ac.id/produtcs/
https://hakim.pa-bangil.go.id/
https://lowongan.mpi-indonesia.co.id/toto-slot/
https://cctv.sikkakab.go.id/
https://hakim.pa-bangil.go.id/products/
https://penerimaan.uinbanten.ac.id/
https://ssip.undar.ac.id/
https://putusan.pta-jakarta.go.id/
https://tekno88s.com/
https://majalah4dl.com/
https://nana16.shop/
https://thamuz12.shop/
https://dprd.sumbatimurkab.go.id/slot777/
https://dprd.sumbatimurkab.go.id/
https://cctv.sikkakab.go.id/slot-777/
https://hakim.pa-kuningan.go.id/
https://hakim.pa-kuningan.go.id/slot-gacor/
https://thamuz11.shop/
https://thamuz15.shop/
https://thamuz14.shop/
https://ppdb.smtimakassar.sch.id/
https://ppdb.smtimakassar.sch.id/slot-gacor/
slot777
slot dana
majalah4d
slot thailand
slot dana
rtp slot
toto slot
slot toto
toto4d
slot gacor
slot toto
toto slot
toto4d
slot gacor
tekno88
https://lowongan.mpi-indonesia.co.id/
https://thamuz13.shop/
https://www.alpha13.shop/
https://perpustakaan.smkpgri1mejayan.sch.id/
https://perpustakaan.smkpgri1mejayan.sch.id/toto-slot/
https://nana44.shop/
https://sadps.pa-negara.go.id/
https://sadps.pa-negara.go.id/slot-777/
https://peng.pn-baturaja.go.id/
https://portalkan.undar.ac.id/
https://portalkan.undar.ac.id/toto-slot/
https://penerimaan.ieu.ac.id/
https://sid.stikesbcm.ac.id/