Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
59,40 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
Kategorien:
Beschreibung
Learn how to set up zero-cost security automation, incident response, file integrity monitoring systems, and cloud security monitoring from scratchKey FeaturesGet a thorough overview of Wazuh's features and learn how to make the most of them
Detect network and host-based intrusion, monitor for known vulnerabilities and exploits, and detect anomalous behavior
Build a monitoring system for security compliance that adheres to frameworks such as MITRE ATT&CK, PCI DSS, and GDPR
Purchase of the print or Kindle book includes a free PDF eBook
Book Description
Explore the holistic solution that Wazuh offers to improve your organization's cybersecurity posture with this insightful guide. Security Monitoring with Wazuh is a comprehensive resource, covering use cases, tool integration, and compliance monitoring to equip you with the skills you need to build an enterprise-level defense system.
The book begins by setting up an Intrusion Detection System (IDS), integrating the open-source tool Suricata with the Wazuh platform, and then explores topics such as network and host-based intrusion detection, monitoring for known vulnerabilities, exploits, and detecting anomalous behavior. As you progress, you'll learn how to leverage Wazuh's capabilities to set up Security Orchestration, Automation, and Response (SOAR). The chapters will lead you through the process of implementing security monitoring practices aligned with industry standards and regulations. You'll also master monitoring and enforcing compliance with frameworks such as PCI DSS, GDPR, and MITRE ATT&CK, ensuring that your organization maintains a strong security posture while adhering to legal and regulatory requirements.
By the end of this book, you'll be proficient in harnessing the power of Wazuh and have a deeper understanding of effective security monitoring [...] you will learnFind out how to set up an intrusion detection system with Wazuh
Get to grips with setting up a file integrity monitoring system
Deploy Malware Information Sharing Platform (MISP) for threat intelligence automation to detect indicators of compromise (IOCs)
Explore ways to integrate Shuffle, TheHive, and Cortex to set up security automation
Apply Wazuh and other open source tools to address your organization's specific needs
Integrate Osquery with Wazuh to conduct threat hunting
Who this book is for
This book is for SOC analysts, security architects, and security engineers who want to set up open-source SOC with critical capabilities such as file integrity monitoring, security monitoring, threat intelligence automation, and cloud security monitoring. Managed service providers aiming to build a scalable security monitoring system for their clients will also find valuable insights in this book. Familiarity with basic IT, cybersecurity, cloud, and Linux concepts is necessary to get [...] of ContentsIntrusion Detection System (IDS) Using Wazuh
Malware Detection Using Wazuh
Threat Intelligence and Analysis
Security Automation and Orchestration Using Shuffle
Incident Response with Wazuh
Threat Hunting with Wazuh
Vulnerability Detection and Configuration Assessment
Appendix
Glossary
Detect network and host-based intrusion, monitor for known vulnerabilities and exploits, and detect anomalous behavior
Build a monitoring system for security compliance that adheres to frameworks such as MITRE ATT&CK, PCI DSS, and GDPR
Purchase of the print or Kindle book includes a free PDF eBook
Book Description
Explore the holistic solution that Wazuh offers to improve your organization's cybersecurity posture with this insightful guide. Security Monitoring with Wazuh is a comprehensive resource, covering use cases, tool integration, and compliance monitoring to equip you with the skills you need to build an enterprise-level defense system.
The book begins by setting up an Intrusion Detection System (IDS), integrating the open-source tool Suricata with the Wazuh platform, and then explores topics such as network and host-based intrusion detection, monitoring for known vulnerabilities, exploits, and detecting anomalous behavior. As you progress, you'll learn how to leverage Wazuh's capabilities to set up Security Orchestration, Automation, and Response (SOAR). The chapters will lead you through the process of implementing security monitoring practices aligned with industry standards and regulations. You'll also master monitoring and enforcing compliance with frameworks such as PCI DSS, GDPR, and MITRE ATT&CK, ensuring that your organization maintains a strong security posture while adhering to legal and regulatory requirements.
By the end of this book, you'll be proficient in harnessing the power of Wazuh and have a deeper understanding of effective security monitoring [...] you will learnFind out how to set up an intrusion detection system with Wazuh
Get to grips with setting up a file integrity monitoring system
Deploy Malware Information Sharing Platform (MISP) for threat intelligence automation to detect indicators of compromise (IOCs)
Explore ways to integrate Shuffle, TheHive, and Cortex to set up security automation
Apply Wazuh and other open source tools to address your organization's specific needs
Integrate Osquery with Wazuh to conduct threat hunting
Who this book is for
This book is for SOC analysts, security architects, and security engineers who want to set up open-source SOC with critical capabilities such as file integrity monitoring, security monitoring, threat intelligence automation, and cloud security monitoring. Managed service providers aiming to build a scalable security monitoring system for their clients will also find valuable insights in this book. Familiarity with basic IT, cybersecurity, cloud, and Linux concepts is necessary to get [...] of ContentsIntrusion Detection System (IDS) Using Wazuh
Malware Detection Using Wazuh
Threat Intelligence and Analysis
Security Automation and Orchestration Using Shuffle
Incident Response with Wazuh
Threat Hunting with Wazuh
Vulnerability Detection and Configuration Assessment
Appendix
Glossary
Learn how to set up zero-cost security automation, incident response, file integrity monitoring systems, and cloud security monitoring from scratchKey FeaturesGet a thorough overview of Wazuh's features and learn how to make the most of them
Detect network and host-based intrusion, monitor for known vulnerabilities and exploits, and detect anomalous behavior
Build a monitoring system for security compliance that adheres to frameworks such as MITRE ATT&CK, PCI DSS, and GDPR
Purchase of the print or Kindle book includes a free PDF eBook
Book Description
Explore the holistic solution that Wazuh offers to improve your organization's cybersecurity posture with this insightful guide. Security Monitoring with Wazuh is a comprehensive resource, covering use cases, tool integration, and compliance monitoring to equip you with the skills you need to build an enterprise-level defense system.
The book begins by setting up an Intrusion Detection System (IDS), integrating the open-source tool Suricata with the Wazuh platform, and then explores topics such as network and host-based intrusion detection, monitoring for known vulnerabilities, exploits, and detecting anomalous behavior. As you progress, you'll learn how to leverage Wazuh's capabilities to set up Security Orchestration, Automation, and Response (SOAR). The chapters will lead you through the process of implementing security monitoring practices aligned with industry standards and regulations. You'll also master monitoring and enforcing compliance with frameworks such as PCI DSS, GDPR, and MITRE ATT&CK, ensuring that your organization maintains a strong security posture while adhering to legal and regulatory requirements.
By the end of this book, you'll be proficient in harnessing the power of Wazuh and have a deeper understanding of effective security monitoring [...] you will learnFind out how to set up an intrusion detection system with Wazuh
Get to grips with setting up a file integrity monitoring system
Deploy Malware Information Sharing Platform (MISP) for threat intelligence automation to detect indicators of compromise (IOCs)
Explore ways to integrate Shuffle, TheHive, and Cortex to set up security automation
Apply Wazuh and other open source tools to address your organization's specific needs
Integrate Osquery with Wazuh to conduct threat hunting
Who this book is for
This book is for SOC analysts, security architects, and security engineers who want to set up open-source SOC with critical capabilities such as file integrity monitoring, security monitoring, threat intelligence automation, and cloud security monitoring. Managed service providers aiming to build a scalable security monitoring system for their clients will also find valuable insights in this book. Familiarity with basic IT, cybersecurity, cloud, and Linux concepts is necessary to get [...] of ContentsIntrusion Detection System (IDS) Using Wazuh
Malware Detection Using Wazuh
Threat Intelligence and Analysis
Security Automation and Orchestration Using Shuffle
Incident Response with Wazuh
Threat Hunting with Wazuh
Vulnerability Detection and Configuration Assessment
Appendix
Glossary
Detect network and host-based intrusion, monitor for known vulnerabilities and exploits, and detect anomalous behavior
Build a monitoring system for security compliance that adheres to frameworks such as MITRE ATT&CK, PCI DSS, and GDPR
Purchase of the print or Kindle book includes a free PDF eBook
Book Description
Explore the holistic solution that Wazuh offers to improve your organization's cybersecurity posture with this insightful guide. Security Monitoring with Wazuh is a comprehensive resource, covering use cases, tool integration, and compliance monitoring to equip you with the skills you need to build an enterprise-level defense system.
The book begins by setting up an Intrusion Detection System (IDS), integrating the open-source tool Suricata with the Wazuh platform, and then explores topics such as network and host-based intrusion detection, monitoring for known vulnerabilities, exploits, and detecting anomalous behavior. As you progress, you'll learn how to leverage Wazuh's capabilities to set up Security Orchestration, Automation, and Response (SOAR). The chapters will lead you through the process of implementing security monitoring practices aligned with industry standards and regulations. You'll also master monitoring and enforcing compliance with frameworks such as PCI DSS, GDPR, and MITRE ATT&CK, ensuring that your organization maintains a strong security posture while adhering to legal and regulatory requirements.
By the end of this book, you'll be proficient in harnessing the power of Wazuh and have a deeper understanding of effective security monitoring [...] you will learnFind out how to set up an intrusion detection system with Wazuh
Get to grips with setting up a file integrity monitoring system
Deploy Malware Information Sharing Platform (MISP) for threat intelligence automation to detect indicators of compromise (IOCs)
Explore ways to integrate Shuffle, TheHive, and Cortex to set up security automation
Apply Wazuh and other open source tools to address your organization's specific needs
Integrate Osquery with Wazuh to conduct threat hunting
Who this book is for
This book is for SOC analysts, security architects, and security engineers who want to set up open-source SOC with critical capabilities such as file integrity monitoring, security monitoring, threat intelligence automation, and cloud security monitoring. Managed service providers aiming to build a scalable security monitoring system for their clients will also find valuable insights in this book. Familiarity with basic IT, cybersecurity, cloud, and Linux concepts is necessary to get [...] of ContentsIntrusion Detection System (IDS) Using Wazuh
Malware Detection Using Wazuh
Threat Intelligence and Analysis
Security Automation and Orchestration Using Shuffle
Incident Response with Wazuh
Threat Hunting with Wazuh
Vulnerability Detection and Configuration Assessment
Appendix
Glossary
Über den Autor
Rajneesh Gupta is a seasoned cybersecurity professional with over 11 years of industry experience. With a remarkable career focused on incident response, penetration testing, security compliance, and risk management, Rajneesh has established himself as a leading expert in the field. He is also an accomplished author, having penned the book "Hands-on with Blockchain and Cybersecurity." As a dedicated educator, Rajneesh has made a significant impact on the cybersecurity community by training over 60,000 students globally.
Details
Erscheinungsjahr: | 2024 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
ISBN-13: | 9781837632152 |
ISBN-10: | 1837632154 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Gupta, Rajneesh |
Hersteller: | Packt Publishing |
Verantwortliche Person für die EU: | Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de |
Maße: | 235 x 191 x 18 mm |
Von/Mit: | Rajneesh Gupta |
Erscheinungsdatum: | 12.04.2024 |
Gewicht: | 0,604 kg |
Über den Autor
Rajneesh Gupta is a seasoned cybersecurity professional with over 11 years of industry experience. With a remarkable career focused on incident response, penetration testing, security compliance, and risk management, Rajneesh has established himself as a leading expert in the field. He is also an accomplished author, having penned the book "Hands-on with Blockchain and Cybersecurity." As a dedicated educator, Rajneesh has made a significant impact on the cybersecurity community by training over 60,000 students globally.
Details
Erscheinungsjahr: | 2024 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
ISBN-13: | 9781837632152 |
ISBN-10: | 1837632154 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Gupta, Rajneesh |
Hersteller: | Packt Publishing |
Verantwortliche Person für die EU: | Books on Demand GmbH, In de Tarpen 42, D-22848 Norderstedt, info@bod.de |
Maße: | 235 x 191 x 18 mm |
Von/Mit: | Rajneesh Gupta |
Erscheinungsdatum: | 12.04.2024 |
Gewicht: | 0,604 kg |
Sicherheitshinweis