Getting Started with osquery
Offered By: Pluralsight
Course Description
Overview
Learn how to deploy, configure, and use osquery to improve security by increasing visibility, detecting suspicious activity, and implementing features like File Integrity Monitoring, using this great cross-platform tool.
Understanding how to leverage the power of osquery to solve security problems can seem complicated. In this course, Getting Started with osquery, you will gain the ability to not only install and configure osquery, but also to understand different aspects of using it in a real environment. First, you"ll learn how to install it on Linux and Windows. Next, you'll discover how the power of SQL can be used with it to solve security problems, like identifying what processes are being executed where, and real-time events will be leveraged so you can learn how to monitor activity between scheduled query intervals and implement File Integrity Monitoring. Finally, you'll explore how to plan for a real deployment of osquery, including the use of advanced options like TLS logging and extensions. When you're finished with this course, you'll have the skills and knowledge of osquery needed to plan a deployment and start writing queries that will help you get answers to your most important endpoint security questions. Software required: a Linux (Ubuntu, Debian, Redhat or CentOS) system with the latest version of osquery stable.
Understanding how to leverage the power of osquery to solve security problems can seem complicated. In this course, Getting Started with osquery, you will gain the ability to not only install and configure osquery, but also to understand different aspects of using it in a real environment. First, you"ll learn how to install it on Linux and Windows. Next, you'll discover how the power of SQL can be used with it to solve security problems, like identifying what processes are being executed where, and real-time events will be leveraged so you can learn how to monitor activity between scheduled query intervals and implement File Integrity Monitoring. Finally, you'll explore how to plan for a real deployment of osquery, including the use of advanced options like TLS logging and extensions. When you're finished with this course, you'll have the skills and knowledge of osquery needed to plan a deployment and start writing queries that will help you get answers to your most important endpoint security questions. Software required: a Linux (Ubuntu, Debian, Redhat or CentOS) system with the latest version of osquery stable.
Syllabus
- Course Overview 1min
- Understanding and Installing osquery 22mins
- SQL Basics for osquery 23mins
- Joining Tables 24mins
- Using Events for Continuous Monitoring 18mins
- File Events and File Integrity Monitoring (FIM) 14mins
- Next Steps in Your osquery Journey 9mins
Taught by
Guillaume Ross
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network