Skip to main content
Prompts Wazuh Security Monitoring Research Project Generator

student security user risk: medium

Wazuh Security Monitoring Research Project Generator

Instructs the model to act as a Postgraduate Cybersecurity Researcher and produce a comprehensive research project titled 'Security Monitoring with Wazuh,' structured across five c…

  • Policy sensitive
  • Human review

PROMPT

Act as a Postgraduate Cybersecurity Researcher. You are tasked with producing a comprehensive research project titled "Security Monitoring with Wazuh."

Your project must adhere to the following structure and requirements:

### Chapter One: Introduction
- **Background of the Study**: Provide context about security monitoring in information systems.
- **Statement of the Research Problem**: Clearly define the problem addressed by the study.
- **Aim and Objectives of the Study**: Outline what the research aims to achieve.
- **Research Questions**: List the key questions guiding the research.
- **Scope of the Study**: Describe the study's boundaries.
- **Significance of the Study**: Explain the importance of the research.

### Chapter Two: Literature Review and Theoretical Framework
- **Concept of Security Monitoring**: Discuss security monitoring in modern information systems.
- **Overview of Wazuh**: Analyze Wazuh as a security monitoring platform.
- **Review of Related Studies**: Examine empirical and theoretical studies.
- **Theoretical Framework**: Discuss models like defense-in-depth, SIEM/XDR.
- **Research Gaps**: Identify gaps in the current research.

### Chapter Three: Research Methodology
- **Research Design**: Describe your research design.
- **Study Environment and Tools**: Explain the environment and tools used.
- **Data Collection Methods**: Detail how data will be collected.
- **Data Analysis Techniques**: Describe how data will be analyzed.

### Chapter Four: Data Presentation and Analysis
- **Presentation of Data**: Present the collected data.
- **Analysis of Security Events**: Analyze events and alerts from Wazuh.
- **Results and Findings**: Discuss findings aligned with objectives.
- **Initial Discussion**: Provide an initial discussion of the findings.

### Chapter Five: Conclusion and Recommendations
- **Summary of the Study**: Summarize key aspects of the study.
- **Conclusions**: Draw conclusions from your findings.
- **Recommendations**: Offer recommendations based on results.
- **Future Research**: Suggest areas for further study.

### Writing and Academic Standards
- Maintain a formal, scholarly tone throughout the project.
- Apply critical analysis and ensure methodological clarity.
- Use credible sources with proper citations.
- Include tables and figures to support your analysis where appropriate.

This research project must demonstrate critical analysis, methodological rigor, and practical evaluation of Wazuh as a security monitoring solution.

ROLES & RULES

Role assignments

  • Act as a Postgraduate Cybersecurity Researcher.
  1. Maintain a formal, scholarly tone throughout the project.
  2. Apply critical analysis and ensure methodological clarity.
  3. Use credible sources with proper citations.
  4. Include tables and figures to support your analysis where appropriate.

EXPECTED OUTPUT

Format
markdown
Schema
markdown_sections · Chapter One: Introduction, Background of the Study, Statement of the Research Problem, Aim and Objectives of the Study, Research Questions, Scope of the Study, Significance of the Study, Chapter Two: Literature Review and Theoretical Framework, Concept of Security Monitoring, Overview of Wazuh, Review of Related Studies, Theoretical Framework, Research Gaps, Chapter Three: Research Methodology, Research Design, Study Environment and Tools, Data Collection Methods, Data Analysis Techniques, Chapter Four: Data Presentation and Analysis, Presentation of Data, Analysis of Security Events, Results and Findings, Initial Discussion, Chapter Five: Conclusion and Recommendations, Summary of the Study, Conclusions, Recommendations, Future Research
Constraints
  • follow exact five-chapter structure
  • formal scholarly tone
  • critical analysis
  • methodological rigor
  • credible sources with citations
  • include tables and figures where appropriate

SUCCESS CRITERIA

  • Produce a comprehensive research project titled "Security Monitoring with Wazuh."
  • Adhere to the specified chapter structure and requirements
  • Demonstrate critical analysis, methodological rigor, and practical evaluation of Wazuh as a security monitoring solution

FAILURE MODES

  • May deviate from the mandatory chapter structure
  • Might lack formal scholarly tone or critical analysis
  • Could use non-credible sources or improper citations
  • May omit tables and figures where appropriate

CAVEATS

Missing context
  • Approximate length or word count per chapter
  • Number of required citations or sources
  • Output format (e.g., Markdown, LaTeX)

QUALITY

OVERALL
0.75
CLARITY
0.95
SPECIFICITY
0.95
REUSABILITY
0.25
COMPLETENESS
0.85

IMPROVEMENT SUGGESTIONS

  • Introduce placeholders like {tool_name} instead of hardcoding 'Wazuh' to improve reusability.
  • Add guidance on generating realistic sample data, tables, figures, and citations for Chapters Three and Four.
  • Specify evaluation criteria for 'critical analysis and methodological rigor' with examples.

USAGE

Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.

MORE FOR STUDENT