File Name | Description | Tags/Keywords |
---|---|---|
1 Past Cyber Attacks.md | Detailed accounts of significant cyber attacks in history, analyzing the methods used and their impacts. | History, Cyber Attacks, Case Studies |
2 Attacks Digital Age.md | Examination of current cyber attack techniques, focusing on the evolution and sophistication of methods in the digital age. | Modern Attacks, Techniques, Cybercrime |
3 Common Attacks.md | Overview of the most prevalent types of cyber attacks today, including phishing, malware, and ransomware. | Phishing, Malware, Ransomware |
4 CISSP Part 1.md | Study material for the CISSP certification, covering foundational security concepts and principles. | CISSP, Certification, Security Basics |
5 CISSP Part 2.md | Continuation of CISSP study material, focusing on advanced security topics and in-depth knowledge areas. | CISSP, Certification, Advanced Topics |
6 Determine Attack Type.md | Guide to identifying and categorizing different types of cyber attacks based on their characteristics and techniques. | Attack Identification, Analysis |
7 Understand Attackers.md | Insight into the motivations, behaviors, and profiles of cyber attackers to better understand their actions. | Attacker Motivation, Psychology |
File Name | Description | Tags/Keywords |
---|---|---|
1 Ethics.md | Discussion on the ethical considerations and responsibilities in cybersecurity practices. | Ethics, Cybersecurity, Guidelines |
2 Ethical Concepts Guidance.md | Exploration of ethical concepts with practical guidance on how to implement ethical practices in cybersecurity. | Ethics, Guidelines, Best Practices |
3 Glossary.md | Comprehensive glossary of terms and definitions commonly used in the field of cybersecurity. | Glossary, Terminology, Definitions |
File Name | Description | Tags/Keywords |
---|---|---|
1 Common Tools.md | Overview of the most commonly used tools in cybersecurity, including their features and applications. | Tools, Software, Cybersecurity |
2 Tools For Protecting Business.md | Detailed guide on tools and strategies for protecting businesses from cyber threats. | Business Security, Tools, Protection |
3 Use Tools.md | Instructions and best practices for effectively using cybersecurity tools to mitigate risks and respond to threats. | Tool Usage, Instructions, Cybersecurity |
File Name | Description | Tags/Keywords |
---|---|---|
1 Security Domains Part 1.md | Introduction to the various security domains, focusing on fundamental concepts and principles essential for cybersecurity. | Security Domains, Fundamentals, Concepts |
2 Security Domains Part 2.md | Continuation of the security domains discussion, delving into advanced topics and practical applications. | Security Domains, Advanced Topics, Applications |
3 Security Domains.md | Comprehensive overview of all security domains, integrating both foundational and advanced topics to provide a holistic understanding. | Security Domains, Overview, Integration |
4 Threats Risks Vulnerabilities.md | Analysis of various threats, risks, and vulnerabilities in the context of security domains. | Threats, Risks, Vulnerabilities |
5 Impacts Of Threats Risks Vulnerabilities.md | Discussion on the impacts of different threats, risks, and vulnerabilities on security domains. | Impacts, Threats, Risks, Vulnerabilities |
6 NIST Risk Mgmt Framework.md | Detailed overview of the NIST Risk Management Framework and its application within security domains. | NIST, Risk Management, Framework |
7 Risk Mgmt Strat Framewk.md | Strategic framework for managing risks within security domains, based on NIST guidelines. | Risk Management, Strategy, NIST |
File Name | Description | Tags/Keywords |
---|---|---|
1 Frameworks.md | Overview of various security frameworks used in the industry to establish cybersecurity standards and practices. | Frameworks, Security, Industry Standards |
2 Controls.md | Detailed explanation of security controls, their types, and implementations to mitigate risks. | Controls, Implementation, Security Measures |
3 Relationship Frameworks Controls.md | Analysis of the relationship and interplay between different security frameworks and controls. | Frameworks, Controls, Relationships |
4 CIA Triad.md | Explanation of the CIA Triad (Confidentiality, Integrity, Availability) and its significance in cybersecurity. | CIA Triad, Confidentiality, Integrity, Availability |
5 CIA Protect.md | Methods and strategies for protecting the elements of the CIA Triad against various threats. | Protection, CIA Triad, Strategies |
6 NIST Frameworks.md | Overview of NIST cybersecurity frameworks and their practical applications in organizations. | NIST, Frameworks, Applications |
7 NIST 5.md | Detailed explanation of the NIST Cybersecurity Framework's five core functions: Identify, Protect, Detect, Respond, Recover. | NIST, Functions, Cybersecurity |
8 OWASP.md | Introduction to the OWASP framework and its critical role in ensuring web application security. | OWASP, Web Security, Framework |
9 More About OWASP.md | In-depth exploration of OWASP projects, tools, and resources available for enhancing web security. | OWASP, Projects, Tools |
10 Audit Scope And Goals.md | Guidelines for defining the scope and objectives of a security audit to ensure comprehensive assessment. | Audit, Scope, Goals |
10 Plan A Security Audit.md | Step-by-step guide to planning and executing a thorough security audit. | Security Audit, Planning, Execution |
11 Complete A Security Audit.md | Comprehensive process for completing a security audit, including documentation and reporting. | Security Audit, Process, Completion |
12 More About Security Audits.md | Additional insights and advanced information on conducting effective security audits. | Security Audits, Insights, Information |
13 Control Categories Document.md | Documentation of various categories of security controls, their purposes, and applications. | Security Controls, Categories, Documentation |
14 Glossary.md | Glossary of terms and definitions related to security frameworks and controls, providing clear explanations of key concepts. | Glossary, Definitions, Terms |
File Name | Description | Tags/Keywords |
---|---|---|
1 Log SIEM Tools.md | Introduction to logging and SIEM (Security Information and Event Management) tools used in cybersecurity. | Logging, SIEM, Tools |
2 SIEM Dashboards.md | Overview of SIEM dashboards, their functionalities, and how they help in monitoring and analyzing security events. | SIEM, Dashboards, Functionalities |
3 Future Of SIEM Tools.md | Discussion on future trends and advancements in SIEM tools, focusing on emerging technologies and innovations. | SIEM, Future Trends, Advancements |
4 Common SIEM Tools.md | List and description of common SIEM tools widely used in the cybersecurity industry, highlighting their features. | SIEM, Common Tools, Industry |
5 More About Cybersecurity Tools.md | Additional information on various cybersecurity tools, their uses, and benefits in protecting against cyber threats. | Cybersecurity Tools, Information, Overview |
6 Use SIEM To Protect Orgs.md | Guide on how to effectively use SIEM tools to protect organizations from cyber threats, including best practices and case studies. | SIEM, Protection, Organizations |
7 Glossary.md | Glossary of terms and definitions related to SIEM and cybersecurity tools, providing clear explanations of key concepts. | Glossary, Definitions, Terms |
File Name | Description | Tags/Keywords |
---|---|---|
1 Phases Of An Incident Response Playbook.md | Detailed explanation of the phases involved in an incident response playbook, covering preparation, identification, containment, eradication, recovery, and lessons learned. | Incident Response, Phases, Playbook |
2 More About Playbooks.md | Additional information on creating, maintaining, and using incident response playbooks effectively. | Playbooks, Incident Response, Creation |
3 Use A Playbook To Respond.md | Practical guide on how to use an incident response playbook during a cybersecurity incident to ensure a structured and efficient response. | Incident Response, Playbook, Guide |
4 Playbooks SIEM SOAR Tools.md | Overview of integrating incident response playbooks with SIEM and SOAR (Security Orchestration, Automation, and Response) tools to enhance incident management capabilities. | Playbooks, SIEM, SOAR, Incident Response |
File Name | Description | Tags/Keywords |
---|---|---|
All Mod Descriptions.md | Descriptions of all modules covered in the manage security risks folder, providing a high-level overview of the content and objectives. | Module Descriptions, Overview |