Intrusion Detection with Wazuh - Blue Team Series with Hackersploit
Offered By: Linode via YouTube
Course Description
Overview
          Dive into the world of intrusion detection with this comprehensive tutorial on Wazuh, an open-source security platform that unifies multiple security functions into a single agent and platform architecture. Learn how to protect public clouds, private clouds, and on-premise data centers using Wazuh's powerful features. Explore the platform's architecture, deployment process, and key modules through a practical demonstration. Set up your own Wazuh server, configure it for the first time, and understand how to manage agents effectively. Discover how to monitor events, implement integrity monitoring, prevent brute force attacks, and leverage filtering techniques. Gain insights into vulnerability management and learn how to utilize Mitre intelligence for enhanced security. By the end of this tutorial, you'll have a solid foundation in using Wazuh for robust intrusion detection and overall cybersecurity management.
        
Syllabus
 Introduction
 What We’ll Be Covering
 Wazuh Prerequisites
 Introduction to Wazuh
 Wazuh Features
 How Does Wazuh Work?
 About Our Lab Environment
 Deploying Wazuh
 Beginning the Practical Demo
 Create Your Own Wazuh Server
 How to Access Your Wazuh Server
 Configuring Wazuh for the First Time
 An Overview of Wazuh Modules
 An Overview of the Management Area
 How to Setup Wazuh Agents
 What Events an Agent Display?
 All About Integrity Monitoring
 How to Stop the Brute Force
 Back to Integrity Monitoring
 How to use Filtering
 About Vulnerabilities
 Making Use of Mitre Intelligence
 Conclusion 
Taught by
Linode
Related Courses
Network SecurityRochester Institute of Technology via edX Network Security
Georgia Institute of Technology via Udacity Real-Time Cyber Threat Detection and Mitigation
New York University (NYU) via Coursera Information security - IV
Indian Institute of Technology Madras via Swayam Cyber Security
CEC via Swayam
