ec-council-learning / Implementing-ISO-IEC-27001-2022
Implementing ISO/IEC 27001:2022, by EC-Council
☆12Updated 2 years ago
Alternatives and similar repositories for Implementing-ISO-IEC-27001-2022:
Users that are interested in Implementing-ISO-IEC-27001-2022 are comparing it to the libraries listed below
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆78Updated last month
- Generate a matrix based on an inventory of InfoSec tools☆23Updated 9 months ago
- ☆32Updated 5 months ago
- ☆44Updated last year
- Security Scripts and Sources for daily usage.☆58Updated 2 weeks ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆27Updated 2 months ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆72Updated 11 months ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆39Updated last month
- NIST CSF Maturity Toolkit☆39Updated 2 months ago
- M365 Defender SOC Playbooks☆24Updated 2 years ago
- A collection of various SIEM rules relating to malware family groups.☆66Updated 10 months ago
- CrowdStrike Falcon Queries For Advanced Threat Detection☆17Updated last month
- ☆15Updated 2 years ago
- ☆102Updated 2 weeks ago
- A Secure Controls Framework (SCF) Power BI App☆16Updated 5 months ago
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆87Updated 3 months ago
- ☆13Updated last year
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated last month
- One Conference 2024☆109Updated 6 months ago
- This repo aims to help you decipher the UAL from a Digital Forensics & Incident Response (DFIR) perspective. The UAL is the Microsoft 365…☆58Updated 11 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆83Updated last year
- Some of the tools we use during vCISO engagements☆15Updated 3 years ago
- Sentinel Logic Apps, Playbooks and Workbooks to automate enrichment, incident analysis and more.☆92Updated 2 weeks ago
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆29Updated this week
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Updated 3 years ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆114Updated last week
- Microsoft 365 Advanced Hunting Queries with hotlinks that plug the query right into your tenant.☆122Updated 8 months ago
- SIEM Cheat Sheet☆73Updated last year
- AI-Powered Dark Web OSINT Tool☆36Updated this week
- ☆45Updated last year