Using and Understanding Wazuh
SUMMARY
ABOUT THIS
WORKSHOP
Learn how to centralize, monitor, and analyze security events using Wazuh, from architecture and installation to rules, dashboards, and reports.
The ongoing digitalization and increasing interconnection of systems are leading to a steady rise in security-relevant events and log data. Effective monitoring, correlation, and analysis of this data require a centralized, scalable, and rule-based SIEM system (Security Information and Event Management). But what exactly is a “SIEM”? And how can Wazuh be implemented and used to monitor my environment?
Content:
- What is SIEM?
- Wazuh architecture
- Installation of the Wazuh stack
- Processing data in Wazuh (rules and decoders)
- Visualizing data in Wazuh (dashboards and reports)
Who should attend:
The workshop is aimed at system administrators, DevOps engineers, and anyone who wants to integrate an open source SIEM solution into their infrastructure.
Requirements for workshop participation:
Familiarity with the Linux command line and Windows Server is expected. Basic knowledge of log management is helpful.
Language: German
Scheduled from 10:00 AM to 5:00 PM.
(Workshops can be selected during registration process.)
Hosted by:
