RedLanternTech / CISSPNotesLinks
Notes for my CISSP study
☆11Updated 2 years ago
Alternatives and similar repositories for CISSPNotes
Users that are interested in CISSPNotes are comparing it to the libraries listed below
Sorting:
- CISSP Certification Domain 1: Security and Risk Management Video Boot Camp 2019 [Video], published by Packt☆29Updated 2 years ago
- CISSP Study Materials PDF and Web Copy for 2022☆47Updated 4 years ago
- ☆117Updated this week
- CISSP and CCSP study material repository. ISC2.☆327Updated 9 months ago
- CISSP Resources☆699Updated last month
- ☆114Updated 3 months ago
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆876Updated 10 months ago
- study material used for the 2018 CISSP exam☆570Updated 4 years ago
- CISSP mind map, 8 domains, 2020 edition, OSG/AIO eighth edition, 8th☆76Updated 3 years ago
- Invoke-AtomicRedTeam is a PowerShell module to execute tests as defined in the [atomics folder](https://github.com/redcanaryco/atomic-red…☆933Updated 2 months ago
- ☆66Updated 2 months ago
- a mock CISSP exam test simulator using aggregated questions from online sources.☆33Updated 5 years ago
- This is a Project Designed for Security Analysts and all SOC audiences who wants to play with implementation and explore the Modern SOC a…☆677Updated 10 months ago
- Great List of Resources to Build an Enterprise Grade Home Lab☆851Updated last year
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,318Updated last week
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆493Updated last year
- 🛡️ Master the essentials of SOC/Security Analysis with our 12-day SOC Analyst Prerequisites Learning Path, covering Linux, Windows, netw…☆13Updated 9 months ago
- MITRE ATT&CK Website☆537Updated 3 weeks ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,191Updated last month
- Practical Windows Forensics Training☆672Updated last year
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆928Updated last year
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆667Updated last week
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,316Updated last year
- Repo Filled With Follow Along Guides☆79Updated 3 years ago
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,452Updated last month
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆587Updated last year
- Azure and AWS Attacks☆1,103Updated 2 years ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆806Updated 2 weeks ago
- A collection of resources for Threat Hunters☆893Updated 9 months ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,495Updated this week