My learning, tutorials on Cybersecurity
☆112Dec 27, 2024Updated last year
Alternatives and similar repositories for ISC2-CC-Cybersecurity-Study-Material
Users that are interested in ISC2-CC-Cybersecurity-Study-Material are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Certified in Cybersecurity℠ (CC) is for anyone interested in gaining a basic understanding of cybersecurity concepts. This is an ent…☆25Mar 22, 2025Updated last year
- The purpose of this repository is to concentrate information, concepts and studies for the Certified in Cybersecurity (ISC²) exam.☆52Apr 18, 2023Updated 2 years ago
- Google Cybersecurity Professional Certificate Program Coursera☆20Aug 12, 2023Updated 2 years ago
- CISSP and CCSP study material repository. ISC2.☆369Mar 3, 2026Updated 2 weeks ago
- All assignments, demos, and cheat sheets from the 8 courses in the "Google Cybersecurity Professional Certificate" on Coursera.☆46Aug 2, 2023Updated 2 years ago
- Cisco Certified CyberOps Associate 200-201 Certification Guide, published by Packt☆29Jan 30, 2023Updated 3 years ago
- 🎓 Harvard CS50x 2022 - problem sets solutions☆21Feb 18, 2026Updated last month
- Coursera☆18May 30, 2023Updated 2 years ago
- My first trial at Ethical Hacking Write Ups☆23Jul 23, 2020Updated 5 years ago
- This repository stores my learning journey and write-ups throughout the security blue team's Blue Team Junior Analyst Certification☆19May 12, 2024Updated last year
- A step-by-step walkthrough of the inner workings of a simple neural network. The goal is to demystify the calculations behind neural netw…☆29Nov 26, 2025Updated 3 months ago
- Comprehensive training materials for the CEH v12 exam, including detailed modules, practical exercises, hands-on labs, and best practices…☆56Mar 8, 2025Updated last year
- ☆28Dec 27, 2023Updated 2 years ago
- TOTAL: CompTIA Security+ Cert (SY0-701), by Packt Publishing☆178Nov 22, 2024Updated last year
- CISSP mind map, 8 domains, 2020 edition, OSG/AIO eighth edition, 8th☆76Feb 10, 2022Updated 4 years ago
- A threat modeling tool that implements the Trike v2 methodology in Smalltalk☆16Nov 18, 2019Updated 6 years ago
- Browser extension to summarize a page using OpenAI☆26Mar 13, 2026Updated last week
- List of Google dorks to find VDPs and Bug Bounty Programs☆33Jan 3, 2023Updated 3 years ago
- ☆24Dec 3, 2025Updated 3 months ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- Guides for locking down a computer☆12Mar 4, 2023Updated 3 years ago
- ☆12Oct 21, 2024Updated last year
- ☆11Nov 5, 2018Updated 7 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Predict, Manage and Monitor the call drops of cell towers using Cloud Pak for Data☆10Mar 16, 2021Updated 5 years ago
- Dockerfiles for php with a few extensions already loaded☆10Jun 17, 2023Updated 2 years ago
- ☆23Jul 28, 2020Updated 5 years ago
- ☆10Jun 19, 2024Updated last year
- Some simple codes to format the CSDMC2010 SPAM corpus☆11Sep 18, 2016Updated 9 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆16Aug 6, 2020Updated 5 years ago
- Dockerfiles for course lab images☆21Jan 23, 2025Updated last year
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆44Apr 13, 2023Updated 2 years ago
- CEH v13 exam resources & Tips☆38Jun 24, 2025Updated 8 months ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- PHP mt_rand() seed cracker☆75Jan 17, 2021Updated 5 years ago
- ESP32 Marauder Portable IDE creation script☆10Oct 10, 2022Updated 3 years ago
- CISSP Study Resources☆1,027Feb 27, 2026Updated 3 weeks ago
- A simple XSS challenge example using Zombie.js☆10Apr 8, 2015Updated 10 years ago