Overview
Syllabus
Introduction
What We’ll Be Covering
Wazuh Prerequisites
Introduction to Wazuh
Wazuh Features
How Does Wazuh Work?
About Our Lab Environment
Deploying Wazuh
Beginning the Practical Demo
Create Your Own Wazuh Server
How to Access Your Wazuh Server
Configuring Wazuh for the First Time
An Overview of Wazuh Modules
An Overview of the Management Area
How to Setup Wazuh Agents
What Events an Agent Display?
All About Integrity Monitoring
How to Stop the Brute Force
Back to Integrity Monitoring
How to use Filtering
About Vulnerabilities
Making Use of Mitre Intelligence
Conclusion
Taught by
Linode
Reviews
4.6 rating, based on 15 Class Central reviews
-
A little dated in terms of WAZUH as the overall interface from 4.2 to 4.8 has had a major overhaul.
However!
It is a fairly noteworthy introductory course. The coinciding SSH attack during the training demo really aided in the demonstration on the delivery of how to utilize the SIEM. -
I have little knowledge about SIEM and Wazuh. It is a good course I love it and the mentor is awesome. Thanks, Alexis for making this course
-
Great instructor with hands-on experience! I’m learning this tool now, it is really exciting. I’m wondering how we can implement this using docker containers.
-
Excelente, entendi mas el SIEM de wazuh, se entendio el como esta herramienta puede evitar vulnerabilidades con analisis
-
I recently completed the course on Coursera, and I must say it was an excellent experience. The course was well-structured and suitable for beginners. The instructor explained concepts clearly and provided practical examples. The course also inclu…
-
The course is very well structured. I had already worked with the Wazuh system, it served to recap some topics and improve my use. There should be a certificate of completion so that it can be shared on social media.
-
This course is helpfull. Because when i study it done. I can control my system it well.it help me saving many more money to invest buy many device to servere for security.thanks so much.
-
Very informative. Unexpected real-life example of a brute-force attack and how to react to it using Wazuh.
Thank you. -
Thank you as this helps me configured wazuh in my macOS host to monitor it and my VMs. Got a lot of videos but it wasn't that clear and I keep on getting errors.
-
Really helpful in understanding the fundamentals of Wazuh and how to detect intrusions. Looking forward for further courses along these lines.
-
Got the basics from the tutorial and has informative information. This course would help beginners to understand the grasp of wazuh.
-
Easy to understand and to start learning wazuh! It's very nice, i like it so much and i'll do more courses of this platform! thank you!! :D
-
Thank you for the course I have learnt a lot about Wazuh.
Im looing forward to more courses of this nature in the future -
Awesome, just experienced live attack and remediation.... I totally recommend it to anyone interested in blueteam cybersecurity.
-