Security Monitoring with Wazuh

Security Monitoring with Wazuh

Rajneesh Gupta

62,40 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2024
ISBN:
9781837632152
62,40 €
IVA incluido
Disponible
Añadir a favoritos

'This book equips you with the knowledge to effectively deploy and utilize Wazuh, helping your organization stay resilient against evolving cybersecurity threats.'- Santiago Bassett, Founder and CEO, WazuhKey Features:- Written by a cybersecurity expert recognized for his leadership and contributions in the industry- Gain practical insights on using Wazuh for threat protection and compliance- Implement security monitoring aligned with MITRE ATT&CK, PCI DSS, and GDPR- Deploy Wazuh in cloud environments for security and compliance- Purchase of the print or Kindle book includes a free PDF eBookBook Description:Strengthen your cybersecurity posture with Wazuh’s powerful security monitoring and compliance capabilities.Security Monitoring with Wazuh is a comprehensive, hands-on guide that helps you deploy, configure, and optimize Wazuh to detect threats, automate incident response, and enforce compliance. With real-world use cases, step-by-step configurations, and tool integrations, this book equips you to build an enterprise-grade defense system.You’ll begin by setting up an Intrusion Detection System (IDS) using Wazuh and integrating Suricata to monitor network and host-based threats. Moving forward, you’ll explore malware detection, vulnerability assessment, and security automation with SOAR. The book also covers threat intelligence, incident response, and proactive threat hunting, helping you detect and mitigate cybersecurity risks effectively.Beyond detection, you’ll enforce compliance with industry standards such as MITRE ATT&CK, PCI DSS, and GDPR, ensuring regulatory adherence and security best practices. By integrating Wazuh with TheHive, Cortex, MISP, and other security tools, you’ll streamline threat analysis and response.By the end of this book, you’ll master Wazuh’s full potential, enabling you to deploy, manage, and enhance security monitoring across your infrastructure-from on-premises to cloud environments.What You Will Learn:- Set up an intrusion detection system (IDS) using Wazuh and Suricata- Implement file integrity monitoring to detect unauthorized changes- Integrate MISP for automated threat intelligence and IOC detection- Leverage TheHive and Cortex for security automation and incident response- Deploy Wazuh for proactive malware detection and endpoint security- Use Shuffle to automate security operations and streamline responses- Hunt for threats with Osquery, log analysis, and MITRE ATT&CK mapping- Ensure compliance with PCI DSS, GDPR, and security best practicesWho this book is for:This book is designed for SOC analysts, security engineers, and security architects looking to deploy Wazuh for threat detection, incident response, and compliance monitoring. It provides practical guidance on setting up open-source SOC capabilities, including file integrity monitoring, security automation, and threat intelligence. Managed service providers seeking a scalable security monitoring system will also benefit. Basic knowledge of IT, cybersecurity, cloud, and Linux is recommended​.Table of Contents- Intrusion Detection System (IDS) Using Wazuh- Malware Detection Using Wazuh- Threat Intelligence and Analysis- Security Automation and Orchestration Using Shuffle- Incident Response with Wazuh- Threat Hunting with Wazuh- Vulnerability Detection and Configuration Assessment- Appendix- Glossary

Artículos relacionados

  • Linux Kernel Programming - Second Edition
    Kaiwan N Billimoria / Kaiwan N. Billimoria
    Gain a solid practical understanding and sufficient theoretical insight into Linux kernel internals while learning to write high-quality kernel module code and understanding the complexities of kernel synchronizationPurchase of the print or Kindle book includes a free eBook in PDF format.Key Features:- Discover how to write Linux kernel and module code for real-world products o...
    Disponible

    74,52 €

  • The Ultimate Kali Linux Book - Third Edition
    Glen D. Singh
    Master the art of ethical hacking, from setting up labs and exploiting security vulnerabilities, to implementing Command and Control (C2) operations, this hands-on guide is your ultimate real-world pentesting companion.Key Features:- Execute sophisticated real-world penetration tests, exposing hidden vulnerabilities in enterprise networks- Explore Kali Linux’s capabilities with...
    Disponible

    81,08 €

  • Real-World Edge Computing
    Robert High / Sanjeev Gupta
    Learn how to use Linux Foundation’s LF Edge Open Horizon project to scale the deployment of your edge application and workload solution in a production environmentKey Features:- Explore historical trends, industries, use cases, and the evolving ecosystem of edge computing- Build your skills to recognize common issues that can derail a successful edge project- Understand the sym...
    Disponible

    55,59 €

  • Zabbix 7 IT Infrastructure Monitoring Cookbook - Third Edition
    Brian van Baekel / Nathan Liefting
    Discover practical recipes to help you efficiently monitor enterprise IT infrastructure for Microsoft Windows, Linux, networking, and moreKey Features:- Master the redesigned frontend of Zabbix 7 with improved navigation and a streamlined menu structure- Automate alert workflows by integrating Zabbix with external services like Slack, Microsoft Teams, and OpsGenie- Perform prof...
    Disponible

    73,96 €

  • NFS Illustrated
    BRENT CALLAGHAN
    The Network File System (NFS) protocol that enables remote access to files is now a key element of any LAN. It is also currently and increasingly used as a key technology with the Web and wide area networks. Written for programmers creating NFS-based applications, network engineers creating new implementations of NFS, and network managers, NFS Illustrated promotes a thorough un...
    Disponible

    67,57 €

  • IDS and IPS with Snort 3
    Ashley Thomas
    Learn the essentials of Snort 3.0, including installation, configuration, system architecture, and tuning to develop effective intrusion detection and prevention solutions with this easy-to-follow guideKey Features:- Get to grips with the fundamentals of IDS/IPS and its role in network defense- Explore the architecture and key components of Snort 3 and get the most out of them-...
    Disponible

    55,14 €

Otros libros del autor

  • My Life
    Rajneesh Gupta
    The book is the journey of author from a ordinary employee to reaching the top management, through life altering philosophies, failures and learnings. The book is an inspiration for millions of people striving hard to achieve their professional goals and dreams. ...
    Disponible

    12,60 €

  • Hands-On Cybersecurity with Blockchain
    Rajneesh Gupta
    ...
    Disponible

    64,06 €