Part 1:Threat Detection
In this part, we will focus on utilizing Wazuh for effective threat detection. You will learn to set up an intrusion detection system (IDS) to discover suspicious traffic. In addition to that, you will also learn the architecture, components, and core capabilities of the Wazuh platform. You will learn about several capabilities of Wazuh to detect malware with some practical use cases.
This part includes the following chapters:
Get Security Monitoring with Wazuh now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.