OSQuery for Security Analyst

OSQuery for Security Analyst

Learn OSQuery to monitor, investigate, and secure your endpoints effectively. Unlock the power of OSQuery to detect security threats on your network and gain deeper visibility into your endpoints.
5/5

Course Description


This self-paced course is designed to equip Security Analysts with practical skills in OSQuery, a powerful open-source tool for endpoint monitoring and security. You’ll begin with OSQuery basics, learning how to set up and configure it, and progress to crafting advanced queries to monitor system events, analyze logs, and detect anomalies.

Through hands-on labs, you’ll simulate real-world security scenarios and build your capability in incident response and threat hunting. Ideal for SOC Analysts and IT security professionals, this course will empower you to utilize OSQuery for comprehensive endpoint visibility and proactive threat detection.

What You Will Learn

Pre-requisites

Course Content

  • What is Osquery?
  • How Osquery works?
  • Installing Osquery on Linux
  • Installing Osquery on Windows
  • SELECT Statement – Fetching Data from Tables
  • WHERE Clause – Filtering the Results
  • AND / OR – Combining Multiple Conditions
  • ORDER BY and LIMIT – Sorting and Trimming Results
  • LIKE and IN – Pattern and Value Matching
  • COUNT() and GROUP BY – Aggregating and Grouping Data
  • JOINs in Osquery – Combining Related Tables
  • Querying live data with osqueryi
  • Important Tables
  • Osquery config file
  • Osquery logs
  1. Setting up ELK
  2. Setting up Fleet Server
  3. Setting up Fleet Agent
  4. Getting started with Osquery
  • Detecting New Processes
  • Unusual Network Connections
  • Scheduled Tasks and Cron Jobs
  • USB/External Device Usage
  • New User Accounts Created
  • Threat Hunting Process
  • Hunt#1: PowerShell Abuse via Command Line
  • Hypothesis, Data Sources and Indicators
  • Attack Simulation
  • Hunting for PowerShell Abuse using Osquery
  • Hunt#2: Malicious Process from Temp Directory
  • Hypothesis, Data Sources and Indicators
  • Attack Simulation
  • Hunting for Malicious Process
  • Hunt#3: Suspicious Scheduled Tasks
  • Hypothesis, Data Sources and Indicators
  • Attack Simulation
  • Hunting for Suspicious Scheduled Tasks
  • Hunt#4: Persistence via Startup Items
  • Hypothesis, Data Sources and Indicators
  • Attack Simulation
  • Hunting for Persistence via Startup Items
  • Hunt#5: Reverse Shell Execution
  • Hypothesis, Data Sources and Indicators
  • Attack Simulation
  • Hunting for Reverse Shell Execution

Instructor

Rajneesh Gupta

Senior Security Consultant

This course includes:

Testimonial

What alumni say about us

Common Questions

Most Popular Questions

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

What exactly is Wireshark?

Wireshark is an open-source tool that captures and analyzes network traffic in real time. It allows security professionals to examine network packets and identify anomalies, suspicious behavior, and threats at the packet level.

Do I need any previous experience with Wireshark?

No prior experience with Wireshark is required. The course covers both the basics and advanced concepts, making it suitable for beginners and professionals looking to deepen their expertise.

How long does it take to complete the course?

This course is self-paced, so you can complete it at your own pace. On average, learners take 4-6 weeks to finish, but you have lifetime access to revisit any section.

What practical skills will I gain?

You'll gain hands-on skills in capturing, filtering, and analyzing network traffic to detect threats. By the end, you'll be able to use Wireshark to recognize various network attacks, identify suspicious patterns, and apply these skills to incident response scenarios.

Is the course content updated for the latest version of Wireshark?

Yes, we regularly update the content to ensure compatibility with the latest version of Wireshark, covering new features, improvements, and any relevant security techniques.

Will I receive a certificate of completion?

Yes, upon successful completion, you will receive a certificate from HaxSecurity that you can add to your resume and LinkedIn profile to showcase your Wireshark skills.

What resources will I need for this course?

You’ll need a computer with a stable internet connection to download Wireshark and capture network traffic. No additional software is required, and detailed setup instructions are provided within the course.

What support options are available during the course?

Throughout the course, you can reach out to our support team via email or join our discussion forums to interact with peers. Additionally, Rajneesh hosts periodic live Q&A sessions to address specific questions and provide guidance.

Featured Online Course

Stay ahead with content based on the latest industry trends and practices.