PacktPublishing / Cybersecurity-Architects-HandbookLinks
Cybersecurity Architects Handbook, published by Packt
☆25Updated last year
Alternatives and similar repositories for Cybersecurity-Architects-Handbook
Users that are interested in Cybersecurity-Architects-Handbook are comparing it to the libraries listed below
Sorting:
- Automating Security Detection Engineering, published by Packt☆65Updated last year
- Security Monitoring using Wazuh, published by Packt☆36Updated last year
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆151Updated 2 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆188Updated last month
- A starter pack of resources to help you get started in Detection Engineering.☆180Updated this week
- ☆59Updated 2 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆261Updated 6 months ago
- KEV EPSS Data☆31Updated this week
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆85Updated 6 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Updated 2 years ago
- ☆29Updated last year
- This repo contains all of the scripts used in Practical Vulnerability Management (No Starch Press, 2020)☆43Updated 4 years ago
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 3 years ago
- ☆192Updated last year
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆94Updated last month
- Python for Security and Networking, Published by Packt☆99Updated 8 months ago
- Incident Response with Threat Intelligence, published by Packt☆56Updated last year
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆51Updated last month
- ☆96Updated 2 weeks ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆17Updated last year
- Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Che…☆19Updated 6 months ago
- ☆64Updated 4 years ago
- This program is designed to pull relevant current news articles for keywords defined in a keywords.csv file. GRC professionals can use th…☆30Updated last year
- List of resources for buiding a home lab☆298Updated 2 years ago
- ☆54Updated 2 years ago
- AI Security Shared Responsibility Model☆88Updated 3 months ago
- NOVA: The Prompt Pattern Matching☆64Updated 2 months ago
- Industrial Cybersecurity Second Edition, published by Packt☆30Updated 2 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆11Updated 7 months ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆204Updated last month