Intrusion Detection with Wazuh | Blue Team Series with Hackersploit

Subscribers:
1,040,000
Published on ● Video Link: https://www.youtube.com/watch?v=P38H4g938rE



Category:
Guide
Duration: 1:36:17
68,028 views
310


In this episode of our Blue Team series with @HackerSploit, we cover intrusion detection with Wazuh. Wazuh is an open source security platform that unifies historically separate functions into a single agent and platform architecture. Protection is provided for public clouds, private clouds, and on-premise data centers.

Chapters:
0:00 Introduction
00:22 What We’ll Be Covering
1:38 Wazuh Prerequisites
1:48 Introduction to Wazuh
3:52 Wazuh Features
4:42 How Does Wazuh Work?
12:19 About Our Lab Environment
14:33 Deploying Wazuh
16:50 Beginning the Practical Demo
17:29 Create Your Own Wazuh Server
23:14 How to Access Your Wazuh Server
25:09 Configuring Wazuh for the First Time
28:48 An Overview of Wazuh Modules
32:31 An Overview of the Management Area
47:17 How to Setup Wazuh Agents
54:52 What Events an Agent Display?
1:04:40 All About Integrity Monitoring
1:06:06 How to Stop the Brute Force
1:16:04 Back to Integrity Monitoring
1:21:08 How to use Filtering
1:23:50 About Vulnerabilities
1:28:14 Making Use of Mitre Intelligence
1:35:06 Conclusion

New to Cloud Computing? Get started here with a $100 credit → https://www.linode.com/linodetube
Read the doc for more information on deploying Wazuh → https://www.linode.com/docs/products/tools/marketplace/guides/wazuh/
Learn more about Wazuh in the Linode Marketplace → https://www.linode.com/marketplace/apps/linode/wazuh/
Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_confirmation=1

#Linode #wazuh #cybersecurity
Product: Linode, Security, Blue Team; @HackerSploit ;




Other Videos By Akamai Developer


2022-11-09The Ultimate Python Crash Course Featuring Code With Harry | Full Python 101 Beginner Tutorial
2022-11-07Simulate Attacks with Infection Monkey | Cyber Security Simulation, Validation, and Mitigation
2022-11-04CRUD App Continued! DELETE | Creating a Full Stack App with Prisma & Remix
2022-11-02Nextcloud AIO Server: Finally Easy Server Management with an All-In-One Solution!
2022-10-31Splunk Security Event Monitoring | Blue Team Series with Hackersploit
2022-10-28How to Visualize Your NGINX Logs with GoAccess| An Nginx Log Visualizer
2022-10-26The wget Command | How to Download Files From a Server
2022-10-24Intrusion Detection with Suricata | Blue Team Series with Hackersploit
2022-10-21API Reading and Updating | Sending Dynamic Route Parameters from Remix to Prisma
2022-10-19How to Use Block Storage with Your Linode | Expand Your Server's Storage Capacity
2022-10-17Intrusion Detection with Wazuh | Blue Team Series with Hackersploit
2022-10-14Umbrel Install With One Command | Server Dashboard and Marketplace App
2022-10-12What's a Ping? | Linux Ping Command Explained
2022-10-10Blue Team Hacking | Intrusion Detection with Snort
2022-10-07Sending data with Remix and saving it with Prisma | Real World Database Application Building
2022-10-05Command Line Basics, Data Streams | How Linux Handles Input, Output, and Errors
2022-10-03HackerSploit Blue Team Series Episode 1 | Network Traffic Analysis with Wireshark
2022-09-30Does Arch Belong on a Production Server? | Pros and Cons of Running Arch
2022-09-28btrfs Filesystem for Linux | Top Docs
2022-09-26Linode NodeBalancers Explained | Manage Scale with Transparent Load Distribution
2022-09-23Save and Organize Your Most Useful Code in Simple Snippets | Snippet Box



Tags:
linode
linux
cloud computing
alternative cloud
linux server
open source
sysadmin
wazuh
linode wazuh
linode security
blue team security
blue team cybersecurity
wazuh intrusion detection
linux intrusion detection
secure blue team
blue team course
blue team series
wazuh security platform
hackersploit
hackersploit blue team series
hackersploit wazuh
hackersploit blue team wazuh
linode blue team
cybersecurity
cybersecurity blue team
linux cybersecurity