Security Monitoring with Wazuh : A hands-on guide to effective enterprise security using real-life use cases in Wazuh

Enregistré dans:
Détails bibliographiques
Auteur principal: Gupta, Rajneesh. (Auteur)
Autres auteurs: Bassett, Santiago. (Préface)
Support: E-Book
Langue: Anglais
Publié: Birmingham : Packt Publishing.
Autres localisations: Voir dans le Sudoc
Résumé: Learn how to set up zero-cost security automation, incident response, file integrity monitoring systems, and cloud security monitoring from scratch. Key Features: Get a thorough overview of Wazuh's features and learn how to make the most of them ; Detect network and host-based intrusion, monitor for known vulnerabilities and exploits, and detect anomalous behavior ; Build a monitoring system for security compliance that adheres to frameworks such as MITRE ATT&CK, PCI DSS, and GDPR ; Purchase of the print or Kindle book includes a free PDF eBook. Book Description: Explore the holistic solution that Wazuh offers to improve your organization's cybersecurity posture with this insightful guide. Security Monitoring with Wazuh is a comprehensive resource, covering use cases, tool integration, and compliance monitoring to equip you with the skills you need to build an enterprise-level defense system. The book begins by setting up an Intrusion Detection System (IDS), integrating the open-source tool Suricata with the Wazuh platform, and then explores topics such as network and host-based intrusion detection, monitoring for known vulnerabilities, exploits, and detecting anomalous behavior. As you progress, you'll learn how to leverage Wazuh's capabilities to set up Security Orchestration, Automation, and Response (SOAR). The chapters will lead you through the process of implementing security monitoring practices aligned with industry standards and regulations. You'll also master monitoring and enforcing compliance with frameworks such as PCI DSS, GDPR, and MITRE ATT&CK, ensuring that your organization maintains a strong security posture while adhering to legal and regulatory requirements. By the end of this book, you'll be proficient in harnessing the power of Wazuh and have a deeper understanding of effective security monitoring strategies. What you will learn: Find out how to set up an intrusion detection system with Wazuh ; Get to grips with setting up a file integrity monitoring system ; Deploy Malware Information Sharing Platform (MISP) for threat intelligence automation to detect indicators of compromise (IOCs) ; Explore ways to integrate Shuffle, TheHive, and Cortex to set up security automation ; Apply Wazuh and other open source tools to address your organization's specific needsIntegrate Osquery with Wazuh to conduct threat hunting. Who this book is for: This book is for SOC analysts, security architects, and security engineers who want to set up open-source SOC with critical capabilities such as file integrity monitoring, security monitoring, threat intelligence automation, and cloud security monitoring. Managed service providers aiming to build a scalable security monitoring system for their clients will also find valuable insights in this book. Familiarity with basic IT, cybersecurity, cloud, and Linux concepts is necessary to get started
Accès en ligne: Accès à l'E-book
LEADER 04513nmm a2200445 i 4500
001 ebook-280850263
005 20241014154541.0
007 cu|uuu---uuuuu
008 241014s2024||||uk ||||g|||| ||||||eng d
020 |a 9781837633432 
035 |a FRCYB88958245 
035 |a FRCYB26088958245 
035 |a FRCYB19188958245 
035 |a FRCYB24788958245 
035 |a FRCYB24888958245 
035 |a FRCYB29388958245 
035 |a FRCYB084688958245 
035 |a FRCYB087588958245 
035 |a FRCYB56788958245 
035 |a FRCYB097088958245 
035 |a FRCYB087088958245 
040 |a ABES  |b fre  |e AFNOR 
041 0 |a eng  |2 639-2 
100 1 |a Gupta, Rajneesh.  |4 aut.  |e Auteur 
245 1 0 |a Security Monitoring with Wazuh :  |b A hands-on guide to effective enterprise security using real-life use cases in Wazuh   |c Rajneesh Gupta ; [Foreword by Santiago Bassett]. 
264 1 |a Birmingham :  |b Packt Publishing. 
264 2 |a Paris :  |b Cyberlibris,  |c 2024. 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
337 |b b  |2 isbdmedia 
338 |b ceb  |2 RDAfrCarrier 
500 |a Couverture (https://static2.cyberlibris.com/books_upload/136pix/9781837633432.jpg). 
506 |a L'accès en ligne est réservé aux établissements ou bibliothèques ayant souscrit l'abonnement  |e Cyberlibris 
520 |a Learn how to set up zero-cost security automation, incident response, file integrity monitoring systems, and cloud security monitoring from scratch. Key Features: Get a thorough overview of Wazuh's features and learn how to make the most of them ; Detect network and host-based intrusion, monitor for known vulnerabilities and exploits, and detect anomalous behavior ; Build a monitoring system for security compliance that adheres to frameworks such as MITRE ATT&CK, PCI DSS, and GDPR ; Purchase of the print or Kindle book includes a free PDF eBook. Book Description: Explore the holistic solution that Wazuh offers to improve your organization's cybersecurity posture with this insightful guide. Security Monitoring with Wazuh is a comprehensive resource, covering use cases, tool integration, and compliance monitoring to equip you with the skills you need to build an enterprise-level defense system. The book begins by setting up an Intrusion Detection System (IDS), integrating the open-source tool Suricata with the Wazuh platform, and then explores topics such as network and host-based intrusion detection, monitoring for known vulnerabilities, exploits, and detecting anomalous behavior. As you progress, you'll learn how to leverage Wazuh's capabilities to set up Security Orchestration, Automation, and Response (SOAR). The chapters will lead you through the process of implementing security monitoring practices aligned with industry standards and regulations. You'll also master monitoring and enforcing compliance with frameworks such as PCI DSS, GDPR, and MITRE ATT&CK, ensuring that your organization maintains a strong security posture while adhering to legal and regulatory requirements. By the end of this book, you'll be proficient in harnessing the power of Wazuh and have a deeper understanding of effective security monitoring strategies. What you will learn: Find out how to set up an intrusion detection system with Wazuh ; Get to grips with setting up a file integrity monitoring system ; Deploy Malware Information Sharing Platform (MISP) for threat intelligence automation to detect indicators of compromise (IOCs) ; Explore ways to integrate Shuffle, TheHive, and Cortex to set up security automation ; Apply Wazuh and other open source tools to address your organization's specific needsIntegrate Osquery with Wazuh to conduct threat hunting. Who this book is for: This book is for SOC analysts, security architects, and security engineers who want to set up open-source SOC with critical capabilities such as file integrity monitoring, security monitoring, threat intelligence automation, and cloud security monitoring. Managed service providers aiming to build a scalable security monitoring system for their clients will also find valuable insights in this book. Familiarity with basic IT, cybersecurity, cloud, and Linux concepts is necessary to get started 
700 1 |a Bassett, Santiago.  |4 aui.  |e Préface 
856 |q HTML  |u https://srvext.uco.fr/login?url=https://univ.scholarvox.com/book/88958245  |w Données éditeur  |z Accès à l'E-book 
886 2 |2 unimarc  |a 181  |a i#  |b xxxe## 
993 |a E-Book  
994 |a BNUM 
995 |a 280850263