Simple play icon Course
Skills

OS Analysis with Nagios

by Owen Dubiel

In this course, you will learn how to perform OS analysis using Nagios XI from a security blue team perspective, to effectively create better awareness around common MITRE TTPs.

What you'll learn

Would you like to be able to effectively detect the beginning stages of the most common attacks by identifying activity like powershell execution or monitor the status of constant services like your windows firewall? In this course, OS Analysis with Nagios, you’ll cover how to utilize Nagios XI to secure a live enterprise environment. First, you’ll explore the detection of command shells like Powershell. Next, you’ll apply alerts to detect if the Windows Firewall service is ever disabled. Finally, you’ll review some of the event logging capabilities to increase overall awareness. In addition to these main objectives, you will also explore some of the graphing and network visibility features of Nagios XI as well. When you’re finished with this course, you’ll have the skills and knowledge to detect Command and Scripting Interpreter: PowerShell (T1059.001), Impair Defenses: Disable or Modify Firewall (T1562.007), and File and Directory Discovery (T1083) using Nagios XI.

Table of contents

Course Overview
1min
Using Nagios for OS Analysis
18mins
Resources
1min

About the author

Owen is a security practitioner at heart, who also enjoys being able to teach others about cyber security best practices and techniques. He has recently found that doing online teaching has been one of the most fulfilling experiences in his working life. He loves being able to spread the good word of security to any and all that are willing to learn it!

Ready to upskill? Get started