PaulJerimy / SecCertRoadmapLinks
Interactive version of the Security Certification Roadmap found at https://pauljerimy.com/security-certification-roadmap/
☆115Updated 8 months ago
Alternatives and similar repositories for SecCertRoadmap
Users that are interested in SecCertRoadmap are comparing it to the libraries listed below
Sorting:
- List of resources for buiding a home lab☆288Updated 2 years ago
- ☆63Updated 4 years ago
- ☆42Updated 2 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆124Updated 3 years ago
- Useful resources about phishing email analysis☆87Updated 9 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆117Updated last year
- The latest pyWars client for the SEC573 class☆47Updated 8 months ago
- A repository of study materials related to Think Python 2nd Edition by Allen B. Downey. More information about the book can be found her…☆68Updated last year
- CSbyGB PenTips Gitbook☆114Updated last month
- President's Cup Cybersecurity Competition Challenges☆186Updated 2 months ago
- ☆78Updated 4 years ago
- CSbyGB - Gabrielle B's new Blog!☆23Updated 3 months ago
- SIEM Cheat Sheet☆76Updated 2 years ago
- A very opinionated list of security tools☆128Updated 7 months ago
- Incident Response with Threat Intelligence, published by Packt☆55Updated last year
- Pwnspoof repository☆265Updated 2 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆109Updated last year
- Blue Team Cheat Sheats☆165Updated 9 years ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆408Updated 6 months ago
- This is a repository for network security tools and technologies.☆99Updated 3 years ago
- ☆55Updated 3 weeks ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 2 years ago
- Repository resource for threat hunter☆158Updated 7 years ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to …☆358Updated last year
- IoT Digital Forensics Course with hands-on labs☆231Updated 2 months ago
- ☆188Updated last year
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆151Updated 4 years ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆254Updated 3 years ago
- A cybersecurity game in Azure Data Explorer☆173Updated last year