Using and Understanding Wazuh

SUMMARY
ABOUT THIS
WORKSHOP

Learn how to centralize, monitor, and analyze security events using Wazuh, from architecture and installation to rules, dashboards, and reports.

The ongoing digitalization and increasing interconnection of systems are leading to a steady rise in security-relevant events and log data. Effective monitoring, correlation, and analysis of this data require a centralized, scalable, and rule-based SIEM system (Security Information and Event Management). But what exactly is a “SIEM”? And how can Wazuh be implemented and used to monitor my environment?

Content:

  • What is SIEM?
  • Wazuh architecture
  • Installation of the Wazuh stack
  • Processing data in Wazuh (rules and decoders)
  • Visualizing data in Wazuh (dashboards and reports)

 

Who should attend:
The workshop is aimed at system administrators, DevOps engineers, and anyone who wants to integrate an open source SIEM solution into their infrastructure.

Requirements for workshop participation:
Familiarity with the Linux command line and Windows Server is expected. Basic knowledge of log management is helpful.

Language: German

Scheduled from 10:00 AM to 5:00 PM.

(Workshops can be selected during registration process.)

Hosted by:

Lucy Siemer

NETWAYS Professional Services GmbH