CCSK Domain 6 – Security Monitoring

1. Cloud Monitoring – Why It’s Hard Monitoring is more complex in the cloud due to: A. Management Plane B. High Velocity C. Distribution & Segregation D. Cloud Sprawl E. Shared Responsibility Model 2. Logs vs Events A. Logs B. Events 3. Security Posture Management Goes beyond logs by analyzing the configuration state of cloudContinue reading “CCSK Domain 6 – Security Monitoring”

The Role of NTP Servers in Information Security: Why Accurate Time Matters

In the world of cybersecurity, we often focus on firewalls, intrusion detection systems, encryption algorithms, and endpoint defenses. Yet, one of the most fundamental elements of a secure and reliable IT infrastructure is often overlooked: time synchronization. This is where the Network Time Protocol (NTP) server comes into play. NTP is more than just aContinue reading “The Role of NTP Servers in Information Security: Why Accurate Time Matters”

Wazuh

Setting up Wazuh on Virtual Machine (OVA) User: wazuh-user Password: wazuh In our case it will be https://192.168.29.160 You will get the following web page User: admin Password: admin Setting up an agent on the endpoint. Once you login into the wazuh dashboard you can add agents: On clicking Agents option you will get theContinue reading “Wazuh”