OSUso / FAIR-Open-Course
Open FAIR Course
☆13Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for FAIR-Open-Course
- Documentation on the Cyber Defense Matrix☆24Updated last year
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆69Updated 2 weeks ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆67Updated 3 years ago
- ☆53Updated 3 years ago
- misp-cloud - Cloud-ready images of MISP☆72Updated 2 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆37Updated last year
- Expert Investigation Guides☆50Updated 3 years ago
- Push-button Security Operations Center using Kubernetes☆12Updated 8 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 3 years ago
- Controls Assessment Specification☆65Updated 5 months ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Presentation Slides and Video links☆31Updated 3 years ago
- Security Monitoring Resolution Categories☆138Updated 2 years ago
- ☆55Updated 2 years ago
- ☆43Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆31Updated last year
- Factor Analysis of Information Risk (FAIR) tool developed in R☆20Updated 6 years ago
- ☆29Updated 5 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 4 years ago
- ☆34Updated 3 years ago
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago
- ☆32Updated 2 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆16Updated 8 years ago
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Updated 6 years ago
- Build your own threat hunting maturity model☆12Updated 7 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- A set of templates for documenting threat intelligence☆73Updated 11 years ago