so87 / CISSP-Study-GuideLinks
study material used for the 2018 CISSP exam
☆572Updated 5 years ago
Alternatives and similar repositories for CISSP-Study-Guide
Users that are interested in CISSP-Study-Guide are comparing it to the libraries listed below
Sorting:
- A collection of resources for Threat Hunters☆914Updated last year
- The Open-Source AWS Cyber Range☆491Updated 5 years ago
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆613Updated 6 years ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆456Updated 4 years ago
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆592Updated 2 years ago
- CISSP Study Materials PDF and Web Copy for 2022☆46Updated 4 years ago
- Create actionable data from your Vulnerability Scans☆1,396Updated 3 years ago
- ☆441Updated last year
- A collective list of public APIs for use in security. Contributions welcome☆966Updated 6 months ago
- Splunk Boss of the SOC version 2 dataset.☆412Updated 3 years ago
- Blue Team Cheat Sheats☆166Updated 9 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,312Updated last year
- A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.☆573Updated 2 years ago
- Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exh…☆675Updated 5 years ago
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆930Updated last year
- This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.☆485Updated 4 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,176Updated 2 years ago
- Incident Response Methodologies☆1,027Updated 7 years ago
- Both personal and public notes for EC-Council's CEHv10 312-50, because it's thousands of pages/slides of boredom, and a braindump to man…☆247Updated 5 years ago
- An archive of everything related to OSCP☆625Updated 5 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆889Updated 6 years ago
- Detect Tactics, Techniques & Combat Threats☆2,263Updated 2 weeks ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆497Updated last year
- Study Guide for the CEH v10☆438Updated 5 years ago
- ☆121Updated 3 weeks ago
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆950Updated 3 years ago
- 🗒️ A [work-in-progress] collection for interview questions for Information Security roles☆138Updated 2 years ago
- Actionable analytics designed to combat threats☆1,006Updated 3 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,076Updated last year
- Phantom Community Playbooks☆528Updated 2 weeks ago