ec-council-learning / Implementing-ISO-IEC-27001-2022Links
Implementing ISO/IEC 27001:2022, by EC-Council
☆14Updated 2 years ago
Alternatives and similar repositories for Implementing-ISO-IEC-27001-2022
Users that are interested in Implementing-ISO-IEC-27001-2022 are comparing it to the libraries listed below
Sorting:
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆84Updated last week
- NIST CSF Maturity Toolkit☆113Updated 6 months ago
- A Secure Controls Framework (SCF) Power BI App☆26Updated last year
- Generate a matrix based on an inventory of InfoSec tools☆23Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆260Updated 5 months ago
- ☆35Updated last year
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆49Updated last month
- ☆63Updated 6 months ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆126Updated last year
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆30Updated this week
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Updated 3 years ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆143Updated last week
- OWASP Foundation Web Respository☆31Updated 2 months ago
- ☆20Updated 6 years ago
- CrowdStrike Falcon Queries For Advanced Threat Detection☆27Updated 9 months ago
- One Conference 2024☆111Updated last year
- Useful resources about phishing email analysis☆86Updated 10 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆214Updated this week
- NIST CyberSecurity Framework management tool☆166Updated 4 years ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆126Updated 4 years ago
- A curated list of LLM driven Cyber security Resources☆43Updated 2 months ago
- MITRE ATT&CK Based App in Power BI☆17Updated last year
- ☆54Updated 2 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆119Updated 6 months ago
- ☆18Updated 2 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆82Updated last year
- ☆19Updated 3 years ago
- ☆39Updated 2 years ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated last year
- Cybersecurity Incident Response Plan☆109Updated 5 years ago