Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh Katowice

Strengthen your cybersecurity posture with Wazuh’s powerful security monitoring and compliance capabilities.Security Monitoring with Wazuh is a comprehensive, hands-on guide that helps you deploy, configure, and optimize Wazuh to detect threats, automate incident response, and enforce compliance. …

od 116,10 Najbliżej: 26 km

Liczba ofert: 1

Oferta sklepu

Opis

Strengthen your cybersecurity posture with Wazuh’s powerful security monitoring and compliance capabilities.Security Monitoring with Wazuh is a comprehensive, hands-on guide that helps you deploy, configure, and optimize Wazuh to detect threats, automate incident response, and enforce compliance. With real-world use cases, step-by-step configurations, and tool integrations, this book equips you to build an enterprise-grade defense system.Youll begin by setting up an Intrusion Detection System (IDS) using Wazuh and integrating Suricata to monitor network and host-based threats. Moving forward, youll explore malware detection, vulnerability assessment, and security automation with SOAR. The book also covers threat intelligence, incident response, and proactive threat hunting, helping you detect and mitigate cybersecurity risks effectively.Beyond detection, youll enforce compliance with industry standards such as MITRE ATT&CK, PCI DSS, and GDPR, ensuring regulatory adherence and security best practices. By integrating Wazuh with TheHive, Cortex, MISP, and other security tools, youll streamline threat analysis and response.By the end of this book, youll master Wazuhs full potential, enabling you to deploy, manage, and enhance security monitoring across your infrastructure—from on-premises to cloud environments. Spis treści: 1. Intrusion Detection System (IDS) Using Wazuh 2. Malware Detection Using Wazuh 3. Threat Intelligence and Analysis 4. Security Automation and Orchestration Using Shuffle 5. Incident Response with Wazuh 6. Threat Hunting with Wazuh 7. Vulnerability Detection and Configuration Assessment 8. Appendix 9. Glossary

Specyfikacja

Podstawowe informacje

Autor
  • Rajneesh Gupta, Santiago Bassett
Wydawnictwo
  • Packt Publishing
Format
  • PDF
  • EPUB
Ilość stron
  • 322
Rok wydania
  • 2024