Wazuh - implementation and use

Available Hours: 16 Last updated 05/2026

Description

This training focuses on the practical implementation of a SIEM system using the Wazuh platform. Participants are guided step-by-step through the installation, configuration, and launch of the environment, both on-premises and in the cloud.

The training covers connecting endpoints (servers, workstations) and integrating various log sources. Participants learn how to create correlation rules that detect threats and anomalies in the IT infrastructure. Special emphasis is placed on practical application, including creating custom decoders and rules for systems not natively supported by Wazuh.

Additionally, the training covers integration with popular cloud services such as Microsoft 365 and Google Workspace, which allows for centralized monitoring and increased event visibility across the organization.

Working with the Wazuh platform is a key part of the training. Participants will learn its basic features, integration methods, and security event analysis capabilities.

Finally, practical incident detection scenarios are discussed, demonstrating how to leverage SIEM to increase visibility and security within an organization.

Who is this for?

System and network administrators, SOC analysts and security specialists, DevOps/SecOps engineers, SIEM implementation and maintenance professionals, IT professionals who want to gain practical skills in working with Wazuh.

Training goals

  • Complete Wazuh implementation (installation and configuration),
  • Connecting endpoints and various log sources,
  • Learning to create correlation rules for threat detection,
  • Creating custom decoders and rules for custom systems,
  • Integrating SIEM with cloud services (e.g., Microsoft 365, Google Workspace),
  • Acquiring practical skills in security event analysis.

Training format

live and in-persons

Benefits for the organization

  • Implement a fully functional SIEM solution,
  • increase event visibility across the entire IT infrastructure,
  • detect and analyze threats more effectively,
  • adapt the SIEM system to your own, non-standard needs,
  • improve your team's cybersecurity and monitoring competencies.