OS Analysis with Artillery
Offered By: Pluralsight
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Artillery is a combination of a honeypot, monitoring tool, and alerting system. In this course, you will learn OS analysis using Artillery.
Are you looking for a multi-function tool to help with endpoint monitoring and alerts? In this course, OS Analysis with Artillery, you’ll learn about Artillery and its main functions. You’ll apply how to detect and mitigate these techniques Exploit Public-Facing Application T1190 and Brute Force T1110. When you’re finished with this course, you’ll have the skills and knowledge to detect attempts to exploit public facing applications, and brute force SSH attacks in an enterprise environment.
Are you looking for a multi-function tool to help with endpoint monitoring and alerts? In this course, OS Analysis with Artillery, you’ll learn about Artillery and its main functions. You’ll apply how to detect and mitigate these techniques Exploit Public-Facing Application T1190 and Brute Force T1110. When you’re finished with this course, you’ll have the skills and knowledge to detect attempts to exploit public facing applications, and brute force SSH attacks in an enterprise environment.
Syllabus
- Course Overview 1min
- Detecting Different Attacks with Artillery 13mins
- Resources 1min
Taught by
Matt Glass
Related Courses
Spam Prevention TechniquesLaracasts Data-Driven Network Security Essentials
LinkedIn Learning Ethical Hacking: Evading IDS, Firewalls, and Honeypots
LinkedIn Learning Ethical Hacking: Evading IDS, Firewalls, and Honeypots
LinkedIn Learning Ethical Hacking: Evading IDS, Firewalls, and Honeypots
Pluralsight