Universal Book Ratings
#431,502 in Books (See Top 100 in Books)
#175 in UNIX & Linux
#6,152 in Computer Science (Books)
Computing & Internet      Networking & Security

Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh

(0 reviews)
Condition
Quantity
(207 available)
Share
Book Details
Language
English
Publishers
Packt Publishing; 1st edition (12 April 2024)
Weight
0.55 KG
Publication Date
12/04/2024
ISBN-10
1837632154
Pages
322 pages
ISBN-13
9781837632152
Dimensions
23.5 x 19.1 x 1.71 cm
SKU
9781837632152
Author Name
Rajneesh Gupta (Author)
Rajneesh Gupta is a cybersecurity and blockchain expert with proven track record of helping organizations to build a strong cybersecurity solutions. He is an experienced innovator, creative & strategic thinker.Rajneesh is a co-founder & CEO of Tesseract Global and responsible to innovate & develop cybersecurity road-map for valued customers. Prior to Tesseract Global, Rajneesh was a senior consultant at HP, responsible to manage premium accounts.He has been Cited in InsightSuccess as the most trusted cybersecurity leaders and recognized by CIOReview as one of top 20 cybersecurity players. He is also a winner of International achiever of Cybersecurity by IAC, Bangkok 2017.Rajneesh is a keynote speaker and regularly speaks on several conferences over cybersecurity, blockchain, IoT, secure governance, cyberwarfare.Read more about this authorRead less about this author
Read More

Reviews & Ratings

4.6 out of 5.0
(0 reviews)
There have been no reviews for this product yet.
Learn how to set up zero-cost security automation, incident response, file integrity monitoring systems, and cloud security monitoring from scratchKey FeaturesGet a thorough overview of Wazuh's features and learn how to make the most of themDetect network and host-based intrusion, monitor for known vulnerabilities and exploits, and detect anomalous behaviorBuild a monitoring system for security compliance that adheres to frameworks such as MITRE ATT&CK, PCI DSS, and GDPRPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionExplore the holistic solution that Wazuh offers to improve your organization's cybersecurity posture with this insightful guide. Security Monitoring with Wazuh is a comprehensive resource, covering use cases, tool integration, and compliance monitoring to equip you with the skills you need to build an enterprise-level defense system.

The book begins by setting up an Intrusion Detection System (IDS), integrating the open-source tool Suricata with the Wazuh platform, and then explores topics such as network and host-based intrusion detection, monitoring for known vulnerabilities, exploits, and detecting anomalous behavior. As you progress, you'll learn how to leverage Wazuh's capabilities to set up Security Orchestration, Automation, and Response (SOAR).

The chapters will lead you through the process of implementing security monitoring practices aligned with industry standards and regulations. You'll also master monitoring and enforcing compliance with frameworks such as PCI DSS, GDPR, and MITRE ATT&CK, ensuring that your organization maintains a strong security posture while adhering to legal and regulatory requirements.

By the end of this book, you'll be proficient in harnessing the power of Wazuh and have a deeper understanding of effective security monitoring strategies. What you will learnFind out how to set up an intrusion detection system with WazuhGet to grips with setting up a file integrity monitoring systemDeploy Malware Information Sharing Platform (MISP) for threat intelligence automation to detect indicators of compromise (IOCs)Explore ways to integrate Shuffle, TheHive, and Cortex to set up security automationApply Wazuh and other open source tools to address your organization's specific needsIntegrate Osquery with Wazuh to conduct threat huntingWho this book is forThis book is for SOC analysts, security architects, and security engineers who want to set up open-source SOC with critical capabilities such as file integrity monitoring, security monitoring, threat intelligence automation, and cloud security monitoring.

Managed service providers aiming to build a scalable security monitoring system for their clients will also find valuable insights in this book. Familiarity with basic IT, cybersecurity, cloud, and Linux concepts is necessary to get started.

Table of ContentsIntrusion Detection System (IDS) Using WazuhMalware Detection Using WazuhThreat Intelligence and AnalysisSecurity Automation and Orchestration Using ShuffleIncident Response with WazuhThreat Hunting with WazuhVulnerability Detection and Configuration AssessmentAppendixGlossary. .

Frequently Bought Products

Product Queries (0)

Login Or Registerto submit your questions to seller

Other Questions

No none asked to seller yet

Bookiyos Books Solutions - Quality Books, Unbeatable Prices

Bookiyos Books Solutions is your premier online bookstore offering a vast selection of over 5 crore books. Whether you're looking for the latest releases, timeless classics, or rare finds, we have something for every reader. Our platform serves customers worldwide, including the USA, UK, and Europe, with fast delivery and easy return policies to ensure a hassle-free shopping experience. Discover daily updates, exclusive deals, and a comprehensive collection of books that cater to all your reading needs. Shop with confidence at Bookiyos, where quality books and unbeatable prices meet.

Why Choose Bookiyos?

Extensive Inventory: New, old, and rare books available.
Fast Delivery: Same or next-day shipping.
Easy Returns: Hassle-free refund and return policies.
Global Reach: Serving customers in the USA, UK, Europe, and beyond.
Daily Updates: Thousands of new titles added every day.
Join our community of book lovers and start your literary journey with Bookiyos Books Solutions today!