yyds-page / cissp-mind-map
CISSP mind map, 8 domains, 2020 edition, OSG/AIO eighth edition, 8th
☆75Updated 3 years ago
Alternatives and similar repositories for cissp-mind-map:
Users that are interested in cissp-mind-map are comparing it to the libraries listed below
- CISSP Study Materials PDF and Web Copy for 2022☆47Updated 4 years ago
- a mock CISSP exam test simulator using aggregated questions from online sources.☆33Updated 4 years ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆292Updated 2 years ago
- ☆43Updated 2 years ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆179Updated 2 weeks ago
- Blue Team detection lab created with Terraform and Ansible in Azure.☆153Updated 5 months ago
- Helpful mnemonics for remembing concepts you may see in the CISSP exam☆52Updated 6 years ago
- Tool to discover external and internal network attack surface☆195Updated 11 months ago
- Collection of created MindMaps☆150Updated last year
- study material used for the 2018 CISSP exam☆566Updated 4 years ago
- CISSP and CCSP study material repository. ISC2.☆302Updated 6 months ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆297Updated 3 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 3 weeks ago
- Build a attack range in your local machine☆131Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆350Updated last week
- Repository resource for threat hunter☆158Updated 6 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆118Updated last month
- Threat Hunting queries for various attacks☆232Updated this week
- Cyber Threat Intelligence Data, Indicators, and Analysis☆84Updated 4 months ago
- ☆78Updated 4 years ago
- ☆160Updated last year
- Damn Vulnerable Cloud Application☆193Updated 6 years ago
- Sigma is Generic Signature Format for SIEM Systems written by Florian Roth @Neo23x0 and Thomas Patzke. This repository is providing sprea…☆29Updated 5 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆235Updated last year
- Awesome Honeypot Resource Collection. Including 250+ Honeypot tools, and 350+ posts about Honeypot.☆91Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆10Updated 2 years ago
- ☆93Updated last year
- Nessus Audit files☆32Updated 2 years ago
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆598Updated 5 years ago
- Elemental - An ATT&CK Threat Library☆318Updated 2 years ago