CyberOps
Cybersecurity Frameworks & Standards
NIST & MITRE Publications:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-167.pdf
https://www.first.org/standards/frameworks/csirts/csirt_services_framework_v2.1
www.first.org/standards/frameworks/psirts
https://csrc.nist.gov/publications/nistir/ir7502/nistir-7502_CCSS.pdf
Key cybersecurity frameworks, standards, and guidelines from NIST and MITRE, including vulnerability databases and security assessments.
2. Threat Intelligence & Incident Response
Threat Sharing Platforms:
http://stixproject.github.io
https://cyboxproject.github.io
Platforms for sharing and analyzing cyber threat intelligence using structured formats like VERIS, STIX, and TAXII.
Incident Response & Playbooks:
https://github.com/vz-risk/VCDB
Resources for incident response, including playbooks and structured incident data analysis.
3. Vulnerability Databases & Exploits
Vulnerability Databases:
https://oval.mitre.org
Databases of known vulnerabilities, default passwords, and exploit resources.
Exploitation Tools & Techniques:
https://github.com/The-Art-of-Hacking/h4cker
Tools and databases for exploits, penetration testing, and ethical hacking.
4. Cloud & Network Security
Cloud Security:
https://docs.aws.amazon.com/vpc/latest/userguide/flow-logs.html
https://aws.amazon.com/compliance/shared-responsibility-model
https://cloudsecurityalliance.org/research/working-groups/top-threats
Resources for cloud security, including AWS, Google Cloud, and security responsibilities.
Network Security:
www.cisco.com/c/en/us/products/security/firewalls/index.html
www.cisco.com/c/en/us/about/security/intelligence/security-for-ip-addr.html
Cisco and Talos resources for network security, firewalls, and threat intelligence.
5. DevOps & Automation
DevOps Tools:
https://docs.docker.com
Tools for container orchestration, microservices management, and deployment.
Automation & Orchestration:
www.servicenow.com/products/security-operations.html
Automation tools for security operations and workflow orchestration.
6. Cryptography & Security Protocols
Cryptography Resources:
www.cisco.com/c/en/us/about/security-center/next-generation-cryptography.html
http://blogs.cisco.com/security/sha512-checksums-for-all-cisco-software
https://tools.cisco.com/security/center/resources/next_generation_cryptography
Next-generation cryptography resources and tools for secure communication.
7. Open Source Security & Forensics
Forensic Tools:
www.radare.org
Open-source tools for digital forensics and packet analysis.
OSINT & Ethical Hacking:
https://github.com/The-Art-of-Hacking/h4cker/tree/master/osint
https://nmap.org
Open-source intelligence and network scanning tools.
8. Security Scoring & Automation
Vulnerability Scoring & Management:
https://github.com/robcowart/elastiflow
Vulnerability management, scoring, and threat flow analysis tools.
9. Containers & Orchestration
Container Tools:
https://katacoda.com/courses/container-runtimes/what-is-a-container-image
Container management and orchestration tools like Docker Swarm.
10. Security Automation & Orchestration
Threat Detection & Response:
www.elastic.co/downloads/kibana
Threat detection, response tools, and Kibana visualization tools for monitoring logs.
11. Miscellaneous
General Resources:
www.w3.org/Submission/wadl
General web API resources for web services and documentation.
Training & Learning Resources:
www.magnetforensics.com/resources/magnet-acquire
Training resources for cybersecurity and forensics tools.