Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh (Paperback)
暫譯: 使用 Wazuh 進行安全監控:基於實際案例的有效企業安全實務指南 (平裝本)
Gupta, Rajneesh
- 出版商: Packt Publishing
- 出版日期: 2024-04-12
- 售價: $1,880
- 貴賓價: 9.5 折 $1,786
- 語言: 英文
- 頁數: 322
- 裝訂: Quality Paper - also called trade paper
- ISBN: 1837632154
- ISBN-13: 9781837632152
-
相關分類:
資訊安全
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$454開源安全運維平臺 OSSIM 疑難解析 (提高篇)
-
$505從實踐中學習 Windows 滲透測試
-
$400$360 -
$520$411 -
$680$530 -
$760$593 -
$600$468 -
$490$387
商品描述
Learn how to set up zero-cost security automation, incident response, file integrity monitoring systems, and cloud security monitoring from scratch
Key Features
- Get a thorough overview of Wazuh's features and learn how to make the most of them
- Detect network and host-based intrusion, monitor for known vulnerabilities and exploits, and detect anomalous behavior
- Build a monitoring system for security compliance that adheres to frameworks such as MITRE ATT&CK, PCI DSS, and GDPR
- Purchase of the print or Kindle book includes a free PDF eBook
Book Description
Explore the holistic solution that Wazuh offers to improve your organization's cybersecurity posture with this insightful guide. Security Monitoring with Wazuh is a comprehensive resource, covering use cases, tool integration, and compliance monitoring to equip you with the skills you need to build an enterprise-level defense system.
The book begins by setting up an Intrusion Detection System (IDS), integrating the open-source tool Suricata with the Wazuh platform, and then explores topics such as network and host-based intrusion detection, monitoring for known vulnerabilities, exploits, and detecting anomalous behavior. As you progress, you'll learn how to leverage Wazuh's capabilities to set up Security Orchestration, Automation, and Response (SOAR). The chapters will lead you through the process of implementing security monitoring practices aligned with industry standards and regulations. You'll also master monitoring and enforcing compliance with frameworks such as PCI DSS, GDPR, and MITRE ATT&CK, ensuring that your organization maintains a strong security posture while adhering to legal and regulatory requirements.
By the end of this book, you'll be proficient in harnessing the power of Wazuh and have a deeper understanding of effective security monitoring strategies.
What you will learn
- Find out how to set up an intrusion detection system with Wazuh
- Get to grips with setting up a file integrity monitoring system
- Deploy Malware Information Sharing Platform (MISP) for threat intelligence automation to detect indicators of compromise (IOCs)
- Explore ways to integrate Shuffle, TheHive, and Cortex to set up security automation
- Apply Wazuh and other open source tools to address your organization's specific needs
- Integrate Osquery with Wazuh to conduct threat hunting
Who this book is for
This book is for SOC analysts, security architects, and security engineers who want to set up open-source SOC with critical capabilities such as file integrity monitoring, security monitoring, threat intelligence automation, and cloud security monitoring. Managed service providers aiming to build a scalable security monitoring system for their clients will also find valuable insights in this book. Familiarity with basic IT, cybersecurity, cloud, and Linux concepts is necessary to get started.
Table of Contents
- Intrusion Detection System (IDS) Using Wazuh
- Malware Detection Using Wazuh
- Threat Intelligence and Analysis
- Security Automation and Orchestration Using Shuffle
- Incident Response with Wazuh
- Threat Hunting with Wazuh
- Vulnerability Detection and Configuration Assessment
- Appendix
- Glossary
商品描述(中文翻譯)
學習如何從零開始設置零成本的安全自動化、事件響應、文件完整性監控系統和雲安全監控
主要特點
- 全面了解 Wazuh 的功能,並學習如何充分利用這些功能
- 檢測網絡和主機入侵,監控已知漏洞和利用,並檢測異常行為
- 建立符合 MITRE ATT&CK、PCI DSS 和 GDPR 等框架的安全合規監控系統
- 購買印刷版或 Kindle 書籍可獲得免費 PDF 電子書
書籍描述
通過這本深入的指南,探索 Wazuh 提供的整體解決方案,以改善您組織的網絡安全態勢。《使用 Wazuh 進行安全監控》是一本全面的資源,涵蓋用例、工具整合和合規監控,幫助您掌握建立企業級防禦系統所需的技能。
本書首先設置入侵檢測系統 (IDS),將開源工具 Suricata 與 Wazuh 平台整合,然後探討網絡和主機入侵檢測、監控已知漏洞、利用和檢測異常行為等主題。隨著進展,您將學會如何利用 Wazuh 的功能設置安全編排、自動化和響應 (SOAR)。各章將引導您實施與行業標準和法規相符的安全監控實踐。您還將掌握如何監控和強制執行 PCI DSS、GDPR 和 MITRE ATT&CK 等框架的合規性,確保您的組織在遵守法律和法規要求的同時保持強大的安全態勢。
在本書結束時,您將熟練掌握 Wazuh 的力量,並對有效的安全監控策略有更深入的理解。
您將學到什麼
- 了解如何使用 Wazuh 設置入侵檢測系統
- 掌握設置文件完整性監控系統的技巧
- 部署惡意軟件信息共享平台 (MISP) 以自動化威脅情報,檢測妥協指標 (IOCs)
- 探索如何整合 Shuffle、TheHive 和 Cortex 以設置安全自動化
- 應用 Wazuh 和其他開源工具來滿足您組織的特定需求
- 將 Osquery 與 Wazuh 整合以進行威脅獵捕
本書適合誰
本書適合 SOC 分析師、安全架構師和安全工程師,他們希望設置具有關鍵功能的開源 SOC,如文件完整性監控、安全監控、威脅情報自動化和雲安全監控。旨在為客戶建立可擴展安全監控系統的管理服務提供商也會在本書中找到有價值的見解。開始之前需要對基本的 IT、網絡安全、雲和 Linux 概念有一定的了解。
目錄
- 使用 Wazuh 的入侵檢測系統 (IDS)
- 使用 Wazuh 的惡意軟件檢測
- 威脅情報與分析
- 使用 Shuffle 的安全自動化與編排
- 使用 Wazuh 的事件響應
- 使用 Wazuh 的威脅獵捕
- 漏洞檢測與配置評估
- 附錄
- 術語表