Part 1:Threat Detection
In this part, we will focus on utilizing Wazuh for effective threat detection. You will learn to set up an intrusion detection system (IDS) to discover suspicious traffic. In addition to that, you will also learn the architecture, components, and core capabilities of the Wazuh platform. You will learn about several capabilities of Wazuh to detect malware with some practical use cases.
This part includes the following chapters:
- Chapter 1, Intrusion Detection System (IDS) Using Wazuh
- Chapter 2, Malware Detection Using Wazuh