Building SIEM or the Log Server using Open Source Tools

Building SIEM or the Log Server using Open Source Tools

Take Control of Your Security: Free, Self-Hosted SIEM & Logs with Graylog, Wazuh, & Security OnionПодробнее

Take Control of Your Security: Free, Self-Hosted SIEM & Logs with Graylog, Wazuh, & Security Onion

Wazuh Crash Course | 2 Hour+ Free Course(Must for Security Analyst)Подробнее

Wazuh Crash Course | 2 Hour+ Free Course(Must for Security Analyst)

Server Monitoring with Grafana Prometheus and LokiПодробнее

Server Monitoring with Grafana Prometheus and Loki

you need this FREE CyberSecurity toolПодробнее

you need this FREE CyberSecurity tool

Graylog: Your Comprehensive Guide to Getting Started Open Source Log ManagementПодробнее

Graylog: Your Comprehensive Guide to Getting Started Open Source Log Management

Introduction to the Prometheus Monitoring System | Key Concepts and FeaturesПодробнее

Introduction to the Prometheus Monitoring System | Key Concepts and Features

Wazuh - An OpenSource(Free) SIEM & EDR ToolПодробнее

Wazuh - An OpenSource(Free) SIEM & EDR Tool

Wazuh Custom Decoders - Ingest Any Log Into Wazuh By Building Your Own Decoders!Подробнее

Wazuh Custom Decoders - Ingest Any Log Into Wazuh By Building Your Own Decoders!

Syslog and Wazuh - Let's Build A Host Intrusion Detection SystemПодробнее

Syslog and Wazuh - Let's Build A Host Intrusion Detection System

Detect Reverse Shells With Wazuh! - Let's Build A Host Intrusion Detection SystemПодробнее

Detect Reverse Shells With Wazuh! - Let's Build A Host Intrusion Detection System

Block Unauthorized Users with Active Response! - Let's Build a Host Intrusion Detection SystemПодробнее

Block Unauthorized Users with Active Response! - Let's Build a Host Intrusion Detection System

Building a Blacklist Database in Wazuh - Let's Deploy a Host Intrusion Detection System #12Подробнее

Building a Blacklist Database in Wazuh - Let's Deploy a Host Intrusion Detection System #12

Energy Logserver: how to improve security based on log management and SIEM? | WebinarПодробнее

Energy Logserver: how to improve security based on log management and SIEM? | Webinar

Secure logging with syslog-ng Forward integrity and confidentiality of system logsПодробнее

Secure logging with syslog-ng Forward integrity and confidentiality of system logs

How To Build a Threat Hunting Capability in AWSПодробнее

How To Build a Threat Hunting Capability in AWS

Faster, Better, AND Cheaper: Improving security operations using open source toolsПодробнее

Faster, Better, AND Cheaper: Improving security operations using open source tools

SAINTCON 2019 - Daniel Dayley - Building your first SIEM with the Elastic StackПодробнее

SAINTCON 2019 - Daniel Dayley - Building your first SIEM with the Elastic Stack

Building SIEM using Opensource tools.Подробнее

Building SIEM using Opensource tools.

Real time diagnostics and troubleshooting using Akamai logsПодробнее

Real time diagnostics and troubleshooting using Akamai logs

Новости