ec-council-learning / Implementing-ISO-IEC-27001-2022
Implementing ISO/IEC 27001:2022, by EC-Council
☆12Updated 2 years ago
Alternatives and similar repositories for Implementing-ISO-IEC-27001-2022
Users that are interested in Implementing-ISO-IEC-27001-2022 are comparing it to the libraries listed below
Sorting:
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆78Updated 2 months ago
- ☆33Updated 6 months ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆39Updated 2 months ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated 10 months ago
- A Secure Controls Framework (SCF) Power BI App☆17Updated 6 months ago
- NIST CSF Maturity Toolkit☆40Updated 3 months ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆28Updated 3 months ago
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆91Updated 4 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Updated 3 years ago
- Security Scripts and Sources for daily usage.☆59Updated last month
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆124Updated 4 years ago
- Useful templates and working document for implementing ISO 27001 - ISMS☆152Updated 3 weeks ago
- ☆46Updated last year
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆118Updated 10 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆233Updated last week
- ☆39Updated last year
- ☆44Updated last year
- ☆16Updated 2 years ago
- NIST CyberSecurity Framework management tool☆163Updated 3 years ago
- One Conference 2024☆110Updated 7 months ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆12Updated last year
- MITRE ATT&CK Based App in Power BI☆15Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆28Updated 2 months ago
- SIEM Cheat Sheet☆73Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆87Updated last year
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆158Updated 3 years ago
- Some of the tools we use during vCISO engagements☆15Updated 3 years ago
- OWASP Foundation Web Respository☆31Updated 2 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated 2 months ago