PacktPublishing / Cybersecurity-Architects-HandbookLinks
Cybersecurity Architects Handbook, published by Packt
☆24Updated last year
Alternatives and similar repositories for Cybersecurity-Architects-Handbook
Users that are interested in Cybersecurity-Architects-Handbook are comparing it to the libraries listed below
Sorting:
- Security Monitoring using Wazuh, published by Packt☆29Updated last year
- Automating Security Detection Engineering, published by Packt☆63Updated last year
- Industrial Cybersecurity Second Edition, published by Packt☆30Updated 2 years ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆18Updated last year
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆91Updated last month
- A very opinionated list of security tools☆128Updated 7 months ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆45Updated 7 months ago
- ☆52Updated 2 years ago
- Threat Hunting with Elastic Stack, Published by Packt☆39Updated 2 years ago
- NOVA: The Prompt Pattern Matching☆25Updated last week
- Adversarial AI - Attacks, Mitigations, and Defense Strategies, published by Packt☆63Updated last year
- NIST CSF Maturity Toolkit☆107Updated 4 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆181Updated 3 weeks ago
- OWASP Foundation Web Respository☆31Updated 2 weeks ago
- PowerShell Automation and Scripting for CyberSecurity, Published by Packt☆153Updated last year
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆150Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆198Updated last year
- Python for Security and Networking, Published by Packt☆95Updated 5 months ago
- ☆55Updated last week
- ☆185Updated last year
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆257Updated 3 months ago
- Incident Response with Threat Intelligence, published by Packt☆55Updated last year
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆16Updated 10 months ago
- Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Che…☆18Updated 3 months ago
- List of resources for buiding a home lab☆286Updated 2 years ago
- The latest pyWars client for the SEC573 class☆47Updated 7 months ago
- ☆170Updated 2 months ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆123Updated 3 years ago
- A collection of sources of documentation and best practices to build and run a SOC☆66Updated 2 years ago