bParsh11 / WGU-C867---Class-Roster---C-
Files with examples that meet expectations
☆9Updated 2 years ago
Alternatives and similar repositories for WGU-C867---Class-Roster---C-:
Users that are interested in WGU-C867---Class-Roster---C- are comparing it to the libraries listed below
- This repo is meant to be a list of companies that hire security people full remote.☆94Updated 7 months ago
- ☆15Updated last year
- ☆34Updated last month
- WGU C867 Scripting and Programming PA July 2020☆8Updated 4 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆111Updated 5 months ago
- Scripts for rapid Windows endpoint "tactical triage" and investigations with Velociraptor and KAPE☆123Updated 3 weeks ago
- DDTTX Tabletop Trainings☆28Updated 3 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- In depth guide for cybersecurity interviews☆142Updated 2 years ago
- A curated list of awesome infosec courses and training resources.☆202Updated last year
- Web application to create indexes for GIAC certification examinations.☆138Updated 2 years ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- ☆12Updated last year
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆60Updated 3 months ago
- ☆9Updated 10 months ago
- Generate Indexes from SANS PDFs☆15Updated 10 months ago
- Configuration Management (CM) Security Playground. A small enterprise security lab to practice automation + CM tooling like Ansible, Che…☆16Updated 5 months ago
- A cybersecurity game in Azure Data Explorer☆170Updated 9 months ago
- This is a public repository to help those trying to learn Azure content and certifications to better understand the concepts and have a c…☆26Updated last year
- Some important DFIR Resources☆83Updated 2 years ago
- ☆47Updated last month
- Repository of attack and defensive information for Business Email Compromise investigations☆250Updated 2 months ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆39Updated last month
- KQL Queries for Advanced Hunting / Log Analytics☆13Updated last year
- List of companies that hire security people full remote.☆67Updated 2 weeks ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆83Updated last year
- Create lab environment for Linux Command Line course☆46Updated 7 months ago
- Indexes for SANS Courses and GIAC Certifications☆247Updated 11 months ago
- Some of the tools we use during vCISO engagements☆15Updated 3 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆137Updated 3 weeks ago