PacktPublishing / Cybersecurity-Architects-HandbookLinks
Cybersecurity Architects Handbook, published by Packt
☆24Updated last year
Alternatives and similar repositories for Cybersecurity-Architects-Handbook
Users that are interested in Cybersecurity-Architects-Handbook are comparing it to the libraries listed below
Sorting:
- Automating Security Detection Engineering, published by Packt☆62Updated 10 months ago
- Security Monitoring using Wazuh, published by Packt☆25Updated last year
- PowerShell Automation and Scripting for CyberSecurity, Published by Packt☆148Updated last year
- A starter pack of resources to help you get started in Detection Engineering.☆170Updated last month
- ☆28Updated 8 months ago
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 2 years ago
- A curated list of Awesome Threat Intelligence blogs☆70Updated 2 years ago
- List of resources for buiding a home lab☆283Updated 2 years ago
- CISSP Certification Exam Prep☆17Updated 2 years ago
- ☆184Updated last year
- Incident Response with Threat Intelligence, published by Packt☆53Updated last year
- ☆47Updated 2 years ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆250Updated last month
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆149Updated last year
- Python for Security and Networking, Published by Packt☆83Updated 3 months ago
- ☆53Updated 2 weeks ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆40Updated 5 months ago
- OCSF Documentation☆137Updated 2 months ago
- Practical Threat Detection Engineering, Published by Packt☆76Updated 2 years ago
- Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io☆12Updated 5 years ago
- ☆80Updated 3 weeks ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆162Updated last week
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆123Updated 3 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆144Updated 2 weeks ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆18Updated last year
- NIST CSF Maturity Toolkit☆70Updated 2 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆97Updated last year
- Crucible is a modular framework for creating, deploying, and managing virtual environments to support training, education, and exercises.☆37Updated last month
- DevSecOpsGuides☆190Updated 4 months ago