#y-6jYclvod7Ir1JCfcTl4g" target="_blank" rel="noopener" onclick="event.stopPropagation()">mega.nz
2. CISM
#ddMhnsrn4_JiSF6Zid7Ckg" target="_blank" rel="noopener" onclick="event.stopPropagation()">mega.nz
3. CISSP
mega.nz
4. CND
#uvVSV52phwuK7-gvrKrVOA" target="_blank" rel="noopener" onclick="event.stopPropagation()">mega.nz
5. CAPTD
#TDjtCzB3Sry9NzhbzrUJWg" target="_blank" rel="noopener" onclick="event.stopPropagation()">mega.nz
6. CSMD
#dw0kfjfeyNz5z4y0XAP75g" target="_blank" rel="noopener" onclick="event.stopPropagation()">mega.nz
7. CTIR
#ki8RTj57GApzpm-KK4Xfxw" target="_blank" rel="noopener" onclick="event.stopPropagation()">mega.nz
8. CWAD
#b-D0N6wiMcHtJjp313t-IQ" target="_blank" rel="noopener" onclick="event.stopPropagation()">mega.nz
7.31 GB folder on MEGA
77 files and 7 subfolders
6.73 GB folder on MEGA
346 files and 6 subfolders
8.96 GB folder on MEGA
81 files and 14 subfolders
10.96 GB folder on MEGA
57 files and 4 subfolders
1.51 GB folder on MEGA
18 files and 3 subfolders
4.57 GB folder on MEGA
73 files and 7 subfolders
2.26 GB folder on MEGA
29 files and 8 subfolders
1.5 GB folder on MEGA
46 files and 8 subfolders
#SFjO-nCHRZWhRHKEOqIcDw" target="_blank" rel="noopener" onclick="event.stopPropagation()">mega.nz
10. NIST
nist.gov
11. CIS
cisecurity.org
12. HIPAA
hhs.gov
13. ISACA
#q=risk%20assessment&sort=relevancy" target="_blank" rel="noopener" onclick="event.stopPropagation()">isaca.org
14. PCI DSS
pcisecuritystandards.org
15. Cloud Security
cloudsecurityalliance.org
1.38 GB folder on MEGA
41 files and 5 subfolders
AI Risk Management Framework
Official websites use .gov A.gov website belongs to an official government organization in the Unite...
CIS RAM (Risk Assessment Method)
CIS RAM (Center for Internet Security® Risk Assessment Method) is an information security risk asses...
Guidance on Risk Analysis
Final guidance on risk analysis requirements under the Security Rule.
Cloud Security Alliance Releases Cloud Octagon Model
Innovative model challenges enterprises to investigate risk from perspective other than that of the...
docs.aws.amazon.com
17. GCP
cloud.google.com
18. Azure
docs.microsoft.com
19. GRC
phalanxgrc.com
20. CompTIA Linux+
mega.nz
21. Cybersecurity Analyst
mega.nz
22. CompTia Cysa+
#t5uk3q5yf0SgWJDSe28QUvsc0hvG_Ux2JHUaGUwdmQQ" target="_blank" rel="noopener" onclick="event.stopPropagation()">mega.nz
Amazon Web Services: Risk and Compliance - Amazon Web Services: Risk and Compliance
abstract
Risk Assessment Guide for Microsoft Cloud - Microsoft Service Assurance
Learn about the Risk Assessment Guide for Microsoft Cloud
fullCircle GRC Platform
Discover our advanced GRC platform: Streamline governance, risk management, and compliance with our...
80.61 MB file on MEGA
16.08 MB file on MEGA
9.9 MB file on MEGA
mega.nz
24. CompTia Pentest
#dwWK8YvMzVTWPF1maZAk8A1URu86lClSkvYXde6xTaQ" target="_blank" rel="noopener" onclick="event.stopPropagation()">mega.nz
25. CASP+
#WkYSD7ptnaab22XUoci-pwYk0Q1POuKXdKZVcPNigc0" target="_blank" rel="noopener" onclick="event.stopPropagation()">mega.nz
26. QRadar SIEM Foundation
ibm.com
27. Cybersecurity
youtube.com
28. Cybersecurity
youtube.com
12.08 MB file on MEGA
6.99 MB file on MEGA
25.34 MB file on MEGA
IBM QRadar SIEM Foundation - IBM Training - Global
This is an IBM-issued and IBM-recognized badge that attests that recipients have demonstrated their...
Cyber Security Playlist [2024 Updated]🔥
https://www.simplilearn.com/cyber-security?utm_campaign=Introduction%20to%20Ethical%20hacking&utm_me...
Cyber Security Training for Beginners | Edureka
This Edureka playlist on "Cyber Security Training for Beginners" will help you learn Cyber Security...
docs.google.com
30. Cybersecurityi
drive.google.com
31. Cybersecurity Documents
drive.google.com
32. SIEM QRadar
youtu.be
33. SIEM Splunk
youtu.be
34. SIEM Microsoft Sentinel
techcommunity.microsoft.com
FREE Cybersecurity COURSES - Awesome Cyber Security University
OpenVPN - Learn how to connect to a virtual private network using OpenVPN. Welcome - Learn how to us...
Cybersecurity Books - Google Drive
CYBER SECURITY DOCS - Google Drive
Become a Microsoft Sentinel Ninja: The complete level 400 training
You asked for it, and we deliver. Virtually to fit the era. Get deep into Microsoft Sentinel using t...
github.com
35. SIEM FortiSIEM
training.fortinet.com
36. SIEM AlienVault OSSIM
cybrary.it
37. SIEM Elastic
elastic.co
38. SIEM ArcSight
youtube.com
mindmajix.com
GitHub - rod-trent/Sentinel-SOC-101: Content and collateral for the Microsoft Sentinel SOC 101 series
Content and collateral for the Microsoft Sentinel SOC 101 series - rod-trent/Sentinel-SOC-101
FortiSIEM
The Fortinet Certified Trainer (FCT) assessment is a trainer evaluation process in which each candid...
AlienVault OSSIM Online Training Course | Cybrary
Take Cybrary's AlienVault OSSIM course to practice real-world cybersecurity skills, prepare for cert...
Elastic Security: Getting Started with detecting threats in my data with SIEM
Elastic is the SIEM solution of choice for detection, investigation, and response. Put it to the tes...
ArcSight ESM 101 Series
Share your videos with friends, family, and the world
What is ArcSight - A Complete Guide for Beginners
A complete guide to what is ArcSight ✔️ArcSight SIEM Tool ✔️ESM Architecture ✔️Network Model✔️Event...
youtube.com
40. SIEM LogSign
academy.logsign.com
41. OSINT
#description" target="_blank" rel="noopener" onclick="event.stopPropagation()">elearning.securityblue.team
42. Dark Web
#description" target="_blank" rel="noopener" onclick="event.stopPropagation()">elearning.securityblue.team
43. Threat Intell
arcx.io
44. Open-source Intel
learn.baselgovernance.org
Training
SureLog SIEM Training
Logsign Academy
Logsign E-Learning Platform
Security Blue Team - eLearning Platform
Security Blue Team - eLearning Platform
Cyber Threat Intelligence 101 Course
The arcX Cyber Threat Intelligence (CTI) 101 course is a short selection of content taken from our C...
Basel LEARN
LEARN new skills to fight financial crime with the Basel Institute’s free eLearning courses and prac...
kasescenarios.com
46. Maltego
academy.maltego.com
47. Osint Workshop
courses.thecyberinst.org
48. EDR
qualys.sumtotal.host
qualys.sumtotal.host
49. Web App Scanning
qualys.sumtotal.host
50. File Integrity Monitoring
qualys.sumtotal.host
Betrayal | Kase Scenarios
When a body turns up, cops believe it is an open and shut case. The ADA asks for your help using OSI...
OSINT Workshop
An overview of open source intelligence, investigation and research.
1. قم بمتابعتنا ( @UCybersX ) للمزيد 🛡
2. أعد نشر هذه السلسلة لمشاركة هذا الموضوع
3. شارك هذه السلسلة مع شخص آخر وشارك المعرفة.
🛡⚡️لنجعل تعليم الأمن السيبراني في متناول الجميع 🛡⚡️
جاري تحميل الاقتراحات...