Bizi tercih ettiğiniz için teşekkür ederiz. Ekip üyelerimiz en kısa sürede sizlerle iletişime geçecektir.
Rezervasyonunuzu gönderdiğiniz için teşekkür ederiz! Ekibimizden bir yetkili kısa süre içinde sizinle iletişime geçecektir.
Eğitim İçeriği
Open-Source SIEM Sovereignty
- Why cloud SIEMs create compliance and cost risks for log retention.
- Wazuh architecture: server, indexer, dashboard, and agents.
- Comparison with Splunk, Sentinel, Elastic Security, and QRadar.
Deployment and Architecture
- Single-node and distributed deployment patterns.
- Docker Compose and Kubernetes manifests.
- Hardware sizing: CPU, RAM, disk IOPS for log ingestion.
- Certificate and TLS configuration for component communication.
Agent Management
- Installing agents via packages, Ansible, or GPO.
- Agent enrollment, key exchange, and group assignment.
- Agentless monitoring via syslog, AWS S3, or API polling.
- Agent upgrade strategies across large fleets.
Detection Engineering
- Decoders and rules for log parsing and event extraction.
- MITRE ATT&CK mapping for rule categories.
- File integrity monitoring (FIM) and rootkit detection.
- Custom rules with XML and YAML syntax.
- Threat intelligence integration: MISP, VirusTotal, and AlienVault.
Incident Response and Automation
- Active response: firewall blocking, account disable, process kill.
- SOAR integration with Shuffle, n8n, or custom webhooks.
- Alert correlation and multi-stage attack chaining.
- Case management and evidence preservation.
Compliance and Reporting
- PCI-DSS, HIPAA, GDPR, and NIST control mapping.
- Policy monitoring for password strength, encryption, and patching.
- Scheduled report generation and export.
- Audit trail integrity and tamper detection.
Dashboards and Visualization
- Wazuh dashboard customization and widget creation.
- Grafana integration for advanced visualizations.
- Kibana compatibility for legacy Elastic deployments.
- Executive and operational SOC views.
Maintenance and Scaling
- Indexer shard management and hot-warm-cold archiving.
- Log retention policies and legal hold procedures.
- Disaster recovery and cluster rebuild.
Kurs İçin Gerekli Önbilgiler
- Intermediate Linux and Windows system administration.
- Understanding of SIEM concepts: correlation, alerting, and log aggregation.
- Experience with the Elastic Stack or OpenSearch.
Audience
- Security operations centers replacing commercial SIEM.
- Compliance teams needing on-premise log retention.
- Government agencies requiring sovereign threat detection.
21 Saatler
Danışanlarımızın Yorumları (3)
Eğitmen yardımcıydı.
Attila - Lifial
Eğitim - Compliance and the Management of Compliance Risk
Yapay Zeka Çevirisi
Laboratuvar alıştırması
Tse Kiat - ST Engineering Training & Simulation Systems Pte. Ltd.
Eğitim - Automated Monitoring with Zabbix
Yapay Zeka Çevirisi
Basel hakkında öğrenme
Daksha Vallabh - Standard Bank of SA Ltd
Eğitim - Basel III – Certified Basel Professional
Yapay Zeka Çevirisi