PacktPublishing / Cybersecurity-Architects-HandbookLinks
Cybersecurity Architects Handbook, published by Packt
☆25Updated last year
Alternatives and similar repositories for Cybersecurity-Architects-Handbook
Users that are interested in Cybersecurity-Architects-Handbook are comparing it to the libraries listed below
Sorting:
- Automating Security Detection Engineering, published by Packt☆64Updated last year
- Security Monitoring using Wazuh, published by Packt☆31Updated last year
- Python for Security and Networking, Published by Packt☆98Updated 6 months ago
- List of resources for buiding a home lab☆288Updated 2 years ago
- This program is designed to pull relevant current news articles for keywords defined in a keywords.csv file. GRC professionals can use th…☆29Updated last year
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆150Updated 2 years ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated last week
- OCSF Documentation☆144Updated last month
- Incident Response with Threat Intelligence, published by Packt☆55Updated last year
- Industrial Cybersecurity Second Edition, published by Packt☆30Updated 2 years ago
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 2 years ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆46Updated 8 months ago
- My eBook with tips on how to get started in industrial (ICS/OT) cyber security.☆68Updated 2 years ago
- ☆63Updated 2 years ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆92Updated this week
- ☆52Updated 2 years ago
- PowerShell Automation and Scripting for CyberSecurity, Published by Packt☆158Updated last year
- Cross cloud workload identity research and workshops☆43Updated last month
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆258Updated 4 months ago
- NIST CSF Maturity Toolkit☆111Updated 5 months ago
- ☆188Updated last year
- ☆63Updated 4 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆82Updated 4 months ago
- DevSecOpsGuides☆192Updated 7 months ago
- ☆118Updated last week
- ☆55Updated 3 weeks ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆129Updated 5 years ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆202Updated this week
- The latest pyWars client for the SEC573 class☆47Updated 8 months ago