注册
登录
资源引擎
CyberSec-resources
返回
项目作者:
DavidJKTofan
项目描述 :
A repo of useful CyberSec tools/urls, OSINT, Linux security resources, and more.
高级语言:
Jupyter Notebook
项目主页:
项目地址:
git://github.com/DavidJKTofan/CyberSec-resources.git
创建时间:
2020-09-09T09:14:01Z
项目社区:
https://github.com/DavidJKTofan/CyberSec-resources
开源协议:
下载
1 - Meow_1647888339767.pdf
2 - Fawn_1647888340095.pdf
3 - Dancing_1647888340286.pdf
4 - Explosion_1647888340454.pdf
5 - Preignition_1647888340587.pdf
1 - Appointment_1647888340897.pdf
2- Sequel_1647888341215.pdf
3- Crocodile_1647888341360.pdf
4 - Ignition_1647888341605.pdf
5 - Pennyworth_1647888341715.pdf
6 - Tactics_1647888341847.pdf
Guide-to-Hardening-Windows-10_1647888331016.pdf
Windows_Server_Hardening_Checklist_1647888331052.pdf
CIS-Controls-Version-7-1_1647888331366.pdf
CIS-Controls-Version-7-Spanish_1647888331459.pdf
CIS_Controls_Microsoft_Windows_10_Cyber_Hygiene_Guide_1647888331870.pdf
Compliance Frameworks and Industry Standards Summary_1647888332293.pdf
EU Data Protection Rules and U.S. Implications - IF10896_1647888332329.pdf
data-protection-factsheet-sme-obligations_en_1647888332525.pdf
Ransomware-FactSheet_1647888332593.pdf
cyber-attack-checklist-06-2017_1647888332622.pdf
nist-csf-to-hipaa-security-rule-crosswalk-02-22-2016-final_1647888332739.pdf
HITRUST CSF v9.4.2 Introduction_1647888332823.pdf
How to Effectively Implement ISA 99 - IEC 62443_1647888333098.pdf
ISAGCA Quick Start Guide_1647888333321.pdf
ISO27k_Standards_listing_1647888333396.pdf
isaca_2017_implementation_guideline_isoiec27001_1647888333641.pdf
EPRS_BRI(2020)654198_EN_1647888333709.pdf
Framework for Improving Critical Infrastructure Cybersecurity - NIST.CSWP.04162018_1647888333835.pdf
Security and Privacy Controlsfor Information Systems and Organizations - NIST.SP.800-53r5_1647888334217.pdf
PCI_DSS-QRG-v3_2_1_1647888334713.pdf
Responding_to_a_Cardholder_Data_Breach_1647888334979.pdf
Skimming Prevention BP for Merchants Sept2014_1647888335103.pdf
agile-manifesto-download-2019_1647888335173.pdf
ftc-cybersecurity_sb_factsheets_1647888335413.pdf
security-intelligence-handbook-third-edition_1647888335709.pdf
wp-pos-system-breaches_1647888335958.pdf
bcbp-implementation-guide-5th-edition-june-2016_1647888336631.pdf
soc-for-cybersecurity-brochure_1647888322396.pdf
CISSP-Cheat-Sheet-Domain-4_1647888322490.pdf
DDoS Quick Guide_1647888322588.pdf
Digital Evidence and the U.S. Criminal Justice System- Identifying Technology and Other Needs to More Effectively Acquire and Utilize Digital Evidence_1647888322658.pdf
Digital Signature Standard (DSS) - NIST.FIPS.186-4_1647888322723.pdf
ENISA Report - How to setup up CSIRT and SOC_1647888323125.pdf
ETL2020 - Data Breach A4_1647888323559.pdf
Cloud Computing Terminology_1647888323641.pdf
Glossary of Cybersecurity Terms_1647888323704.pdf
Sophos_Threatsaurusaz_1647888323843.pdf
Terminology Artificial Intelligence_1647888324001.pdf
LSL0232X - Using IBM QRadar SIEM_1647888324237.pdf
Preparing cybersecurity now for a quantum world - IBM_1647888324569.pdf
ibm-ai-and-cybersecurity-fd-ibm-limited-ed_42013142USEN_1647888324684.pdf
ibm-x-force-threat-intelligence-index-2020_1647888324906.pdf
unified-endpoint-management-fd-with-correct-part-number_WGW03288USEN_1647888325094.pdf
Kali-Linux-Revealed-1st-edition_1647888325337.pdf
LM-White-Paper-Intel-Driven-Defense_1647888325562.pdf
Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform_1647888325722.pdf
2020 CWE Top 25 Most Dangerous Software Weaknesses_1647888325785.pdf
CNA_Rules_v3.0_1647888325822.pdf
MITRE_ATTACK_Enterprise_1647888325925.pdf
attack_roadmap_2020_1647888326325.pdf
cve-intro-handout_1647888326518.pdf
mitre-getting-started-with-attack-october-2019_1647888326849.pdf
NCSC 10 Steps To Cyber Security NCSC_1647888327423.pdf
Computer Security Incident Handling Guide - NIST.SP.800-61r2_1647888327522.pdf
Guidelines on Mobile Device Forensics - NIST.SP.800-101r1_1647888327713.pdf
NIST Special Publication 800-145 - Definition of Cloud Computing_1647888327762.pdf
NIST Special Publication 800-63B - NIST.SP.800-63b_1647888327906.pdf
OSINT_Handbook_June-2018_Final_1647888328162.pdf
OSINT_Packet_2019_1647888328387.pdf
OWASP Top 10-2017 (en)_1647888328559.pdf
sucuri-ebook-OWASP-top-10_1647888328716.pdf
DevOps Cheat Sheet_1647888329002.pdf
Secure Service Configuration in AWS, Azure, & GCP_1647888329252.pdf
blueprint-building-pen-tester_1647888329569.pdf
documentation-incident-response-air-tank-scuba-diving-2021_1647888329612.pdf
empowering-incident-response-automation-38862_1647888329714.pdf
incident-handlers-handbook-33901_1647888329821.pdf
practical-incident-response-network-based-attack-37920_1647888330031.pdf
scripts-exploit-mitigate-risks-1313_1647888330098.pdf
soc-automation-deliverance-disaster-38225_1647888330168.pdf
CIS_Controls_Microsoft_Windows_10_Cyber_Hygiene_Guide_1647888330602.pdf
Sample-Chain-of-Custody-Form-1-_1647888330373.docx
soc-2-vs-cyber-whitepaper-web-final_1647888322316.pdf
1 - Meow_1649538065617.pdf
2 - Fawn_1649538066272.pdf
3 - Dancing_1649538066676.pdf
bcbp-implementation-guide-5th-edition-june-2016_1649538064169.pdf
security-intelligence-handbook-third-edition_1649538061827.pdf
wp-pos-system-breaches_1649538062119.pdf
ftc-cybersecurity_sb_factsheets_1649538061205.pdf
PCI_DSS-QRG-v3_2_1_1649538059848.pdf
Responding_to_a_Cardholder_Data_Breach_1649538060398.pdf
Skimming Prevention BP for Merchants Sept2014_1649538060631.pdf
agile-manifesto-download-2019_1649538060884.pdf
Security and Privacy Controlsfor Information Systems and Organizations - NIST.SP.800-53r5_1649538059330.pdf
isaca_2017_implementation_guideline_isoiec27001_1649538057836.pdf
EPRS_BRI(2020)654198_EN_1649538058053.pdf
Framework for Improving Critical Infrastructure Cybersecurity - NIST.CSWP.04162018_1649538058468.pdf
How to Effectively Implement ISA 99 - IEC 62443_1649538056823.pdf