Главная
Study mode:
on
1
Introduction
2
What We’ll Be Covering
3
Wazuh Prerequisites
4
Introduction to Wazuh
5
Wazuh Features
6
How Does Wazuh Work?
7
About Our Lab Environment
8
Deploying Wazuh
9
Beginning the Practical Demo
10
Create Your Own Wazuh Server
11
How to Access Your Wazuh Server
12
Configuring Wazuh for the First Time
13
An Overview of Wazuh Modules
14
An Overview of the Management Area
15
How to Setup Wazuh Agents
16
What Events an Agent Display?
17
All About Integrity Monitoring
18
How to Stop the Brute Force
19
Back to Integrity Monitoring
20
How to use Filtering
21
About Vulnerabilities
22
Making Use of Mitre Intelligence
23
Conclusion
Description:
Dive into the world of intrusion detection with this comprehensive tutorial on Wazuh, an open-source security platform that unifies multiple security functions into a single agent and platform architecture. Learn how to protect public clouds, private clouds, and on-premise data centers using Wazuh's powerful features. Explore the platform's architecture, deployment process, and key modules through a practical demonstration. Set up your own Wazuh server, configure it for the first time, and understand how to manage agents effectively. Discover how to monitor events, implement integrity monitoring, prevent brute force attacks, and leverage filtering techniques. Gain insights into vulnerability management and learn how to utilize Mitre intelligence for enhanced security. By the end of this tutorial, you'll have a solid foundation in using Wazuh for robust intrusion detection and overall cybersecurity management.

Intrusion Detection with Wazuh - Blue Team Series with Hackersploit

Linode
Add to list