kramse / kea-it-sikkerhed
KEA Diplom i IT-sikkerhed kurser
☆12Updated last week
Alternatives and similar repositories for kea-it-sikkerhed:
Users that are interested in kea-it-sikkerhed are comparing it to the libraries listed below
- various courses, presentation etc.☆165Updated this week
- Resultatbudget-app til HØK-studerende☆10Updated 4 years ago
- This is a Project Designed for Security Analysts and all SOC audiences who wants to play with implementation and explore the Modern SOC a…☆652Updated 4 months ago
- Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).☆669Updated 6 months ago
- A curated list of awesome infosec courses and training resources.☆200Updated last year
- CISA's catalog of bad practices that are exceptionally risky.☆205Updated 3 months ago
- ☆21Updated last year
- A guide on how to become an Information (or Cyber) Security Professional. With resources from free to expensive.☆555Updated 2 years ago
- List of resources for buiding a home lab☆260Updated last year
- NIST CyberSecurity Framework management tool☆161Updated 3 years ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆927Updated last month
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆173Updated last year
- A curated list of annual cyber security reports☆450Updated this week
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,326Updated this week
- Incident Response Methodologies 2022☆1,031Updated last year
- a list of cybersecurity internships☆537Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 4 months ago
- An extensive list of resources related to threat modelling. Gotta catch ’em all!☆32Updated last week
- This repo is meant to be a list of companies that hire security people full remote.☆92Updated 4 months ago
- SOC Interview Questions☆1,107Updated 5 months ago
- A collection of resources for Threat Hunters☆874Updated 4 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆224Updated 2 years ago
- A concise, directive, specific, flexible, and free incident response plan template☆674Updated 9 months ago
- Cyber Incident Response Team Playbook Battle Cards☆370Updated 9 months ago
- ☆73Updated 3 months ago
- A repository of study materials related to Think Python 2nd Edition by Allen B. Downey. More information about the book can be found her…☆68Updated 7 months ago
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆532Updated 6 months ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆411Updated last month
- Great List of Resources to Build an Enterprise Grade Home Lab☆809Updated last year