感谢您发送咨询!我们的团队成员将很快与您联系。
感谢您发送预订!我们的团队成员将很快与您联系。
课程大纲
Open-Source SIEM Sovereignty
- Why cloud SIEMs create compliance and cost risks for log retention.
- Wazuh architecture: server, indexer, dashboard, and agents.
- Comparison with Splunk, Sentinel, Elastic Security, and QRadar.
Deployment and Architecture
- Single-node and distributed deployment patterns.
- Docker Compose and Kubernetes manifests.
- Hardware sizing: CPU, RAM, disk IOPS for log ingestion.
- Certificate and TLS configuration for component communication.
Agent Management
- Installing agents via packages, Ansible, or GPO.
- Agent enrollment, key exchange, and group assignment.
- Agentless monitoring via syslog, AWS S3, or API polling.
- Agent upgrade strategies across large fleets.
Detection Engineering
- Decoders and rules for log parsing and event extraction.
- MITRE ATT&CK mapping for rule categories.
- File integrity monitoring (FIM) and rootkit detection.
- Custom rules with XML and YAML syntax.
- Threat intelligence integration: MISP, VirusTotal, and AlienVault.
Incident Response and Automation
- Active response: firewall blocking, account disable, process kill.
- SOAR integration with Shuffle, n8n, or custom webhooks.
- Alert correlation and multi-stage attack chaining.
- Case management and evidence preservation.
Compliance and Reporting
- PCI-DSS, HIPAA, GDPR, and NIST control mapping.
- Policy monitoring for password strength, encryption, and patching.
- Scheduled report generation and export.
- Audit trail integrity and tamper detection.
Dashboards and Visualization
- Wazuh dashboard customization and widget creation.
- Grafana integration for advanced visualizations.
- Kibana compatibility for legacy Elastic deployments.
- Executive and operational SOC views.
Maintenance and Scaling
- Indexer shard management and hot-warm-cold archiving.
- Log retention policies and legal hold procedures.
- Disaster recovery and cluster rebuild.
要求
- Intermediate Linux and Windows system administration.
- Understanding of SIEM concepts: correlation, alerting, and log aggregation.
- Experience with the Elastic Stack or OpenSearch.
Audience
- Security operations centers replacing commercial SIEM.
- Compliance teams needing on-premise log retention.
- Government agencies requiring sovereign threat detection.
21 小时
客户评论 (3)
培训师非常乐于助人。
Attila - Lifial
课程 - Compliance and the Management of Compliance Risk
机器翻译
实验练习
Tse Kiat - ST Engineering Training & Simulation Systems Pte. Ltd.
课程 - Automated Monitoring with Zabbix
机器翻译
学习巴塞尔协议
Daksha Vallabh - Standard Bank of SA Ltd
课程 - Basel III – Certified Basel Professional
机器翻译