ec-council-learning / Implementing-ISO-IEC-27001-2022Links
Implementing ISO/IEC 27001:2022, by EC-Council
☆15Updated 2 years ago
Alternatives and similar repositories for Implementing-ISO-IEC-27001-2022
Users that are interested in Implementing-ISO-IEC-27001-2022 are comparing it to the libraries listed below
Sorting:
- NIST CSF Maturity Toolkit☆114Updated 7 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆86Updated last month
- Generate a matrix based on an inventory of InfoSec tools☆23Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆262Updated 6 months ago
- A Secure Controls Framework (SCF) Power BI App☆26Updated last year
- ☆54Updated 2 years ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆126Updated last year
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆30Updated 3 weeks ago
- ☆35Updated last year
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆51Updated 2 months ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Updated 3 years ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆144Updated last month
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆12Updated 2 years ago
- ☆63Updated 2 years ago
- OWASP Foundation Web Respository☆32Updated 3 months ago
- One Conference 2024☆111Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83Updated last year
- ☆18Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Updated 2 years ago
- ☆61Updated 8 months ago
- Useful resources about phishing email analysis☆86Updated last year
- MITRE ATT&CK Based App in Power BI☆18Updated last year
- ☆20Updated 6 years ago
- This is a companion to the Security Engineer Questions☆205Updated 2 years ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆215Updated this week
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆126Updated 4 years ago
- Reports from various areas of information security☆270Updated last year
- ☆12Updated last year
- SIEM Cheat Sheet☆80Updated 2 years ago
- ☆192Updated last year