The use of Open-Source Tools in cyber defense infrastructure is explained and detailed with their installations. It is exemplified by tools such as NIDS, HIDS, Sysmon, Breach and Attack Simulation Tools, and Rsyslog.
About the Writer
Alican Kiraz (CSIE, CSAE, CASP+, eCIR, eWPTXv2, eCDFP, eCTHPv2, OSWP, CEH Master, Pentest+, CySA+, Security+, CEHv10, ISO27001 IA) in his seven-year cybersecurity career first became interested in offensive security. Then, he took an interest in the blue team, and now he continues to work in both the blue and purple teams.
Alican Kiraz (CSIE, CSAE, CASP+, eCIR, eWPTXv2, eCDFP, eCTHPv2, OSWP, CEH Master, Pentest+, CySA+, Security+, CEHv10, ISO27001 IA) in his seven-year cybersecurity career first became interested in offensive security. Then, he took an interest in the blue team, and now he continues working on the blue and purple teams.