We may earn an affiliate commission when you visit our partners.
Matt Glass

Artillery is a combination of a honeypot, monitoring tool, and alerting system. In this course, you will learn OS analysis using Artillery.

Read more

Artillery is a combination of a honeypot, monitoring tool, and alerting system. In this course, you will learn OS analysis using Artillery.

Are you looking for a multi-function tool to help with endpoint monitoring and alerts? In this course, OS Analysis with Artillery, you’ll learn about Artillery and its main functions. You’ll apply how to detect and mitigate these techniques Exploit Public-Facing Application T1190 and Brute Force T1110. When you’re finished with this course, you’ll have the skills and knowledge to detect attempts to exploit public facing applications, and brute force SSH attacks in an enterprise environment.

Enroll now

What's inside

Syllabus

Course Overview
Detecting Different Attacks with Artillery
Resources

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops skills and knowledge highly relevant to the enterprise environment
Teaches OS analysis, a core skill for security analysts
Uses Artillery, a multi-function tool for endpoint monitoring and alerts
Taught by Matt Glass, an experienced instructor in security
Covers topics such as detecting and mitigating public-facing application exploits and brute force attacks
Provides hands-on labs and interactive materials for practical learning

Save this course

Save OS Analysis with Artillery to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in OS Analysis with Artillery with these activities:
Collect Resources on Artillery
Having a variety of resources on hand will help you learn more about Artillery.
Show steps
  • Search for online articles and tutorials
  • Join online forums and discussion groups
Review Basic Networking Concepts
A strong understanding of networking concepts will help you get the most out of this course.
Browse courses on TCP/IP
Show steps
  • Review a networking textbook
  • Take a practice quiz
Follow Twitter's Guide to Artillery
This Twitter guide provides information on how to analyze OS events using Artillery.
Show steps
  • Go to the Twitter guide
  • Read through the guide
Four other activities
Expand to see all activities and additional details
Show all seven activities
Practice Detecting Attacks with Artillery
These practice drills will help you apply your skills in detecting attacks using Artillery.
Show steps
  • Set up a test environment
  • Simulate attacks
  • Use Artillery to detect the attacks
  • Analyze the results
Join a Study Group
Studying with others can help you learn more effectively.
Show steps
  • Find a study group
  • Attend study group meetings
  • Participate in discussions
Create a Presentation on Artillery
This presentation will give you an opportunity to demonstrate your understanding of Artillery and how it can be used to detect attacks in an enterprise environment.
Browse courses on OS Analysis
Show steps
  • Gather information on Artillery
  • Write a script for your presentation
  • Create slides
  • Practice your presentation
Create a Honeypot Using Artillery
Building a honeypot will give you practical experience with Artillery.
Browse courses on network security
Show steps
  • Set up a test environment
  • Install Artillery
  • Configure Artillery
  • Deploy the honeypot
  • Monitor the honeypot

Career center

Learners who complete OS Analysis with Artillery will develop knowledge and skills that may be useful to these careers:
Forensic Analyst
Forensic Analysts are responsible for investigating computer crimes and security incidents. They need to be able to collect and analyze evidence from computer systems, and to provide expert testimony in court. OS Analysis with Artillery can be a valuable tool for Forensic Analysts, as it can help them to detect and analyze evidence of attacks on operating systems. This course can help build a foundation in digital forensics and incident response, particularly in the analysis of operating system artifacts.
DevSecOps Engineer
DevSecOps Engineers are responsible for integrating security into the software development process. They need to be able to identify and assess security risks in software code, and to develop and implement security controls to mitigate these risks. OS Analysis with Artillery can be a valuable tool for DevSecOps Engineers, as it can help them to detect and mitigate a variety of attacks on operating systems. This course can help build a foundation in DevSecOps practices, with a focus on hardening systems against threats.
Incident Responder
Incident Responders are responsible for responding to security incidents. They need to be able to identify and assess the scope of an incident, and to take steps to mitigate the damage caused by the incident. OS Analysis with Artillery can be a valuable tool for Incident Responders, as it can help them to identify and mitigate a variety of attacks. This course can help build a foundation in detection, triage, and mitigation of security incidents, especially those involving operating system compromises.
Cloud Security Engineer
Cloud Security Engineers are responsible for designing, implementing, and maintaining security for cloud-based infrastructure. They need to be able to identify and assess security risks in cloud environments, and to develop and implement security controls to mitigate these risks. OS Analysis with Artillery can be a valuable tool for Cloud Security Engineers, as it can help them to detect and mitigate a variety of attacks on operating systems in cloud environments. This course can help build a foundation in cloud security and infrastructure protection, with an emphasis on threats to operating systems in cloud environments.
Malware Analyst
Malware Analysts are responsible for analyzing malware to identify its capabilities and to develop ways to detect and prevent it from infecting computer systems. They need to be able to understand the different types of malware and how they work. OS Analysis with Artillery can be a valuable tool for Malware Analysts, as it can help them to detect and analyze malware that targets operating systems. This course can help build a foundation in malware analysis and detection, especially in operating system-based malware.
Security Researcher
Security Researchers are responsible for developing new ways to protect computer systems and networks from security threats. They need to be able to identify and exploit vulnerabilities in these systems, and to develop new security controls to mitigate these vulnerabilities. OS Analysis with Artillery can be a valuable tool for Security Researchers, as it can help them to develop new ways to detect and mitigate attacks on operating systems. This course can help build a foundation in security research and design, with a focus on operating systems.
Threat Intelligence Analyst
Threat Intelligence Analysts are responsible for collecting and analyzing information about security threats. They need to be able to identify and assess the severity of these threats, and to provide recommendations on how to mitigate these threats. OS Analysis with Artillery can be a valuable tool for Threat Intelligence Analysts, as it can help them to identify and mitigate a variety of attacks. This course can help build a foundation in threat intelligence and analysis, especially in the domain of operating systems.
Information Security Analyst
Information Security Analysts are responsible for protecting an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They need to be able to identify and assess security risks, and to develop and implement security controls to mitigate these risks. OS Analysis with Artillery can be a valuable tool for Information Security Analysts, as it can help them to detect and mitigate a variety of attacks. This course can help build a foundation information security analysis and threat detection, particularly in detecting attempts to exploit public-facing applications, and brute-force SSH attacks in an enterprise environment..
Cybersecurity Analyst
Cybersecurity Analysts are responsible for protecting an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. They need to be able to identify and assess security risks, and to develop and implement security controls to mitigate these risks. OS Analysis with Artillery can be a valuable tool for Cybersecurity Analysts, as it can help them to detect and mitigate a variety of attacks. This course can help build a foundation in cybersecurity analysis and threat detection, especially in OS detection and mitigation.
Security Engineer
Security Engineers are responsible for designing, implementing, and maintaining security systems for organizations. They need to be able to identify and assess security risks, and to develop and implement security controls to mitigate these risks. OS Analysis with Artillery can be a valuable tool for Security Engineers, as it can help them to detect and mitigate a variety of attacks. This course can help build a foundation in security engineering and threat mitigation, with a specialization in operating system security.
Information Technology Auditor
Information Technology Auditors are responsible for auditing an organization's information technology systems and processes to ensure that they are secure and compliant with regulations. They need to be able to identify and assess security risks, and to develop and implement security controls to mitigate these risks. OS Analysis with Artillery can be a valuable tool for Information Technology Auditors, as it can help them to detect and mitigate a variety of attacks on operating systems. This course can help build a foundation in information technology auditing and compliance, with a specialization in operating system security.
Network Security Engineer
Network Security Engineers are responsible for designing, implementing, and maintaining network security systems. They need to be able to identify and assess security risks in network infrastructure, and to develop and implement security controls to mitigate these risks. OS Analysis with Artillery can be a valuable tool for Network Security Engineers, as it can help them to detect and mitigate a variety of attacks on operating systems. This course can help build a foundation in network security and infrastructure protection, especially in network-related operating system threats.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They need to be able to assess an organization's security risks, and to develop and implement security controls to mitigate these risks. OS Analysis with Artillery can be a valuable tool for Security Consultants, as it can help them to detect and mitigate a variety of attacks. This course can help build a foundation in security consulting and risk assessment, particularly with respect to operating systems.
Penetration Tester
Penetration Testers are responsible for testing the security of an organization's computer systems and networks. They need to be able to identify and exploit vulnerabilities in these systems, and to provide recommendations on how to fix these vulnerabilities. OS Analysis with Artillery can be a valuable tool for Penetration Testers, as it can help them to detect and exploit vulnerabilities in operating systems.
Security Architect
Security Architects are responsible for the design, implementation, and maintenance of a company's security systems. They need to be well-versed in the different types of security threats that organizations face and how to manage these risks. OS Analysis with Artillery can be a valuable tool for security architects, as it can help them to detect and mitigate a variety of attacks. This course can help build a foundation in security analysis and threat detection.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in OS Analysis with Artillery.
Provides a comprehensive guide to using Metasploit Pro and Armitage for penetration testing, covering the various modules and tools available in these platforms.
Provides a practical guide to penetration testing, covering the various techniques and tools used by hackers to exploit vulnerabilities in networks and systems.
Provides a hands-on guide to penetration testing, covering the various techniques and tools used by hackers to exploit vulnerabilities in networks and systems.
Provides a comprehensive guide to network security assessment, covering the various techniques and tools used to identify and mitigate vulnerabilities in networks.
Provides a comprehensive guide to web application security, covering the various techniques and tools used to protect web applications from unauthorized access and attack.
Provides a guide to building dependable distributed systems, covering the various security principles and practices used in this field.
Focuses on security monitoring and intrusion detection systems (IDSs), and provides an overview of the various types of IDSs and how they can be used to protect networks.
Provides a step-by-step guide to network security, covering the various techniques and tools used to protect networks from unauthorized access and attack.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to OS Analysis with Artillery.
Specialized Exploits: Stack Overflows and Bypasses
Most relevant
Application Analysis with ModSecurity
Most relevant
Burp Suite Mastery: From Beginner to Advanced
Most relevant
OS Analysis with osquery
Most relevant
Web Application Security Testing with Burp Suite
Most relevant
Application Analysis with PacketFence
Most relevant
Credential Access with Cain & Abel
Scanning for Vulnerabilities with Nmap 7 Scripting Engine...
Specialized Attacks: OT and ICS
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser