Sumanth-Talluri / ICSI-Certified-Network-Security-Specialist-CNSSView external linksLinks
Materials and Synopsis of the course Certified Network Security Specialist (CNSS) provided by The International CyberSecurity Institute (ICSI)
☆29Aug 31, 2020Updated 5 years ago
Alternatives and similar repositories for ICSI-Certified-Network-Security-Specialist-CNSS
Users that are interested in ICSI-Certified-Network-Security-Specialist-CNSS are comparing it to the libraries listed below
Sorting:
- These are some of the basic network topologies I configured when preparing for the CCNA R&S 200-125 exam.☆22Sep 2, 2020Updated 5 years ago
- A curated list of Awesome Threat Intelligence resources☆19Mar 27, 2019Updated 6 years ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- Repository with examples of how to solve a tsp with pso, aco, ga and integer programming☆10Oct 9, 2024Updated last year
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- Industrial Cybersecurity Second Edition, published by Packt☆33Jan 30, 2023Updated 3 years ago
- 一款记录任务时间的时间管理应用☆15Dec 29, 2025Updated last month
- ☆10Sep 24, 2021Updated 4 years ago
- ☆10Jul 22, 2022Updated 3 years ago
- The simulator for the Next-Generation Championship in Branch Prediction (CBP-NG)☆22Feb 10, 2026Updated last week
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- ☆10Oct 9, 2024Updated last year
- ☆14Feb 19, 2023Updated 2 years ago
- ☆12Jul 4, 2024Updated last year
- Kismet website generation & documentation data☆12Feb 7, 2026Updated last week
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- ☆10Mar 11, 2024Updated last year
- A KEDA external scaler for the Durable Task Azure Storage backend.☆10Updated this week
- ☆11Updated this week
- This is a template to create a responisive and mobile friendly website based on flask and python. Please like, fork and improve it on you…☆11Aug 21, 2022Updated 3 years ago
- Control de rele por protocolo HTTP Rest☆10Dec 8, 2021Updated 4 years ago
- Terraform Script for - Storage, container and data life cycle rules creation at scale☆11Jan 10, 2023Updated 3 years ago
- Python based modular control simulation kickass toolbox☆11Sep 30, 2025Updated 4 months ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Jan 19, 2023Updated 3 years ago
- ☆10Mar 6, 2023Updated 2 years ago
- Udemy course - Python for Data Science and Machine Learning bootcamp☆11Mar 15, 2017Updated 8 years ago
- Developing for Kubernetes with k3s+GitLab☆10Oct 25, 2021Updated 4 years ago
- SSE to Stdio MCP Proxy Server☆17Jun 9, 2025Updated 8 months ago
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆13Mar 28, 2019Updated 6 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- Mastering Convolutional Neural Networks☆11Sep 14, 2020Updated 5 years ago
- Automatic analysis of SpiderMonkey and Firefox bugs on Bugzilla☆11Feb 5, 2026Updated last week
- Prototype of the HealthOS ventilation system☆14Mar 27, 2020Updated 5 years ago
- ☆13Jun 27, 2022Updated 3 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆10Apr 24, 2023Updated 2 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- The Beamline streaming process mining framework☆14Oct 5, 2023Updated 2 years ago
- ⚛️ Pikaso React Hook☆11Jul 25, 2022Updated 3 years ago