Table of Contents
- Intrusion Detection System (IDS) Using Wazuh
- Malware Detection Using Wazuh
- Threat Intelligence and Analysis
- Security Automation and Orchestration Using Shuffle
- Incident Response with Wazuh
- Threat Hunting with Wazuh
- Vulnerability Detection and Configuration Assessment
- Appendix
- Glossary

