Instant OSSEC Host-based Intrusion Detection
Instant OSSEC Host-based Intrusion Detection
Configuring an OSSEC server (Simple)
Getting agents to communicate (Simple)
Writing your own rules (Simple)
Detecting SSH brute-force attacks (Intermediate)
Configuring the alerts (Simple)
File integrity monitoring (Simple)
Monitoring command output (Intermediate)
Detecting rootkits and anomalies (Simple)