Key Features
- Get a thorough overview of Wazuh’s features and learn how to make the most of them
- Detect network and host-based intrusion, monitor for known vulnerabilities and exploits, and detect anomalous behavior
- Build a monitoring system for security compliance that adheres to frameworks such as MITRE ATT&CK, PCI DSS, and GDPR
- Purchase of the print or Kindle book includes a free PDF eBook
Who this book is for
This book is for SOC analysts, security architects, and security engineers who want to set up open-source SOC with critical capabilities such as file integrity monitoring, security monitoring, threat intelligence automation, and cloud security monitoring. Managed service providers aiming to build a scalable security monitoring system for their clients will also find valuable insights in this book. Familiarity with basic IT, cybersecurity, cloud, and Linux concepts is necessary to get started.