ec-council-learning / Implementing-ISO-IEC-27001-2022Links
Implementing ISO/IEC 27001:2022, by EC-Council
☆13Updated 2 years ago
Alternatives and similar repositories for Implementing-ISO-IEC-27001-2022
Users that are interested in Implementing-ISO-IEC-27001-2022 are comparing it to the libraries listed below
Sorting:
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆83Updated 2 months ago
- A Secure Controls Framework (SCF) Power BI App☆22Updated last year
- NIST CSF Maturity Toolkit☆110Updated 5 months ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated last year
- ☆35Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆258Updated 4 months ago
- ☆52Updated 2 years ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆139Updated last week
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆127Updated last year
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆101Updated 10 months ago
- ☆18Updated 2 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆46Updated 8 months ago
- ☆20Updated 6 years ago
- One Conference 2024☆110Updated last year
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Updated 3 years ago
- A curated list of LLM driven Cyber security Resources☆38Updated 3 weeks ago
- This is a RSS feed collection for all the InfoSec Content Creators☆32Updated 2 years ago
- ☆63Updated 5 months ago
- MITRE ATT&CK Based App in Power BI☆17Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆102Updated last year
- NIST CyberSecurity Framework management tool☆166Updated 3 years ago
- Reports from various areas of information security☆270Updated last year
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆12Updated 2 years ago
- Useful resources about phishing email analysis☆87Updated 9 months ago
- ☆63Updated 2 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated 5 months ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆127Updated 4 years ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆82Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆212Updated this week