Directory Listing for /home/wkevvgxibogz/files.blacksailsecurity.com/docs

NameSizeModified
📁 IncidentResponse/ 2025-11-11 17:54:27
📄 24_Great_Cybersecurity_Frameworks_1702578110.pdf 47.52 MB 2025-11-11 15:12:18
📄 25_Methods_For_Pipeline_Attacks_1689531640.pdf 1.61 MB 2025-11-20 00:07:58
📄 100_Free_Security_Tools_1705267388.pdf 530.91 KB 2025-11-11 15:10:34
📄 100_secuirty_tools_pdf_1717276774.pdf 511.37 KB 2025-11-11 14:56:01
📄 2023+CISM+Domain+1+Study+guide+by+ThorTeaches.com+v2.1.pdf 2.35 MB 2025-11-20 00:07:57
📄 2023_U_S_NATIONAL_INTELLIGENCE_STRATEGY_1692416104.pdf 16.53 MB 2023-09-21 15:38:13
📄 27001_Gap_Analysis_Tool_1697463822.pdf 358.33 KB 2025-11-20 00:07:54
📄 27001_Gap_Guide_1697897446.pdf 1.73 MB 2025-11-11 15:10:35
📄 AI_For_CyberSecurity_1730478882.pdf 1.37 MB 2025-11-11 14:53:06
📄 ai_guidance_document_1697028852.pdf 1.45 MB 2025-11-20 00:07:57
📄 All_About_Phishing_1704038487.pdf 49.83 MB 2025-11-11 15:13:22
📄 Amazon_Machine_Learning_Developer_Guide_1696687374.pdf 2.14 MB 2025-11-20 00:07:56
📄 Ansible_Guide_1699889089.pdf 1.43 MB 2025-11-11 15:10:52
📄 An_Introduction_to_Information_Security_1698978277.pdf 1.73 MB 2025-11-11 15:10:40
📄 API_Security_Maturity_Model_1702578285.pdf 551.68 KB 2025-11-11 15:10:38
📄 Are_You_Ready_Prepare_for_Mandatory_Cyber_Incident_Reporting_Rules_1710727435.pdf 127.36 KB 2025-11-11 15:02:23
📄 Assessing_Cyber_Security_Skills_Competencies_1702860190.pdf 436.18 KB 2025-11-11 15:10:40
📄 Austrailian_Cyber_Center_Information_Security_Manual_1715947424.pdf 4.3 MB 2025-11-11 14:57:42
📄 Australia_s_Cyber_Security_Strategy_1700624178.pdf 13.85 MB 2025-11-11 15:11:13
📄 Awesome_Bugbounty_Writeups_1696687394.pdf 220.59 KB 2025-11-20 00:07:59
📄 Awesome_SOC_1695484240.pdf 938.54 KB 2025-11-20 00:08:05
📄 A_Guide_to_Building_a_Secure_SDLC_1697986761.pdf 864.75 KB 2025-11-11 15:10:33
📄 A_practical_guide_on_incident_management__1702181234.pdf 13.59 MB 2025-11-11 15:11:43
📄 A_Step_By_Step_Guide_to_Cyber_Risk_Assessment_1697637747.pdf 17.18 MB 2025-11-20 00:08:33
📄 A_Zero_Trust_Architecture_Model_for_Cloud_Apps_1695676823.pdf 1.36 MB 2025-11-20 00:07:56
📄 BA_Interview_Questions_Answers__1698176862.pdf 18.2 MB 2025-11-11 15:11:55
📄 Best_Practices_for_Cyber_Crisis_Management__1720355132.pdf 2.22 MB 2025-11-11 14:54:46
📄 Best_Practices_for_Securing_Your_Home_Network_1696181136.pdf 378.76 KB 2025-11-20 00:08:04
📄 Blue_Team_Cheat_Sheets_1690676182.pdf 13.62 MB 2023-09-21 15:40:25
📄 Blue_Team_Cheat_Sheet__1701025046.pdf 13.62 MB 2025-11-11 15:11:14
📄 Blue_Team_Tools__1719780114.pdf 10.8 MB 2025-11-11 14:55:22
📄 Breaches_Anticipated_in_2023_1695824033.pdf 94.61 MB 2025-11-20 00:10:25
📄 Building_a_Cybersecurity_and_Privacy_Learning_Program_1695430981.pdf 1.72 MB 2025-11-20 00:08:12
📄 Burp_Suite_1699147304.pdf 65.62 MB 2025-11-11 15:14:46
📄 CAIQv4.0.2_STAR-Security-Questionnaire_Generated-at_2021-09-13 (1).xlsx 76.21 KB 2025-11-20 00:08:04
📄 Cannabis_Facility_Mock_Inspection_SOP__Leafsheets_com_1713710978.pdf 395.35 KB 2025-11-11 15:00:37
📄 Checklists_to_Guard_Against_Common_Types_of_Data_Breaches_1695676730.pdf 1.5 MB 2025-11-20 00:08:11
📄 CHECKLIST_FOR_API_SECURITY_1720882506.pdf 196.31 KB 2025-11-11 14:53:54
📄 China_Linked_Cyber_Actors_Hide_in_Router_Firmware_1696285616.pdf 651.08 KB 2025-11-20 00:08:07
📄 CISA_CYBERSECURITY_STRATEGIC_PLAN_2024_2026_1691450460.pdf 1.3 MB 2023-09-21 15:39:08
📄 CISA_CYBERSECURITY_STRATEGIC_PLAN_FY2024_2026_1691965807.pdf 1.3 MB 2023-09-21 15:38:58
📄 CISA_Roadmap_For_Artificial_Intelligence__1702087185.pdf 15.2 MB 2025-11-11 15:12:14
📄 CISA_SECURE_BY_DESIGN_1697590060.pdf 14.4 MB 2025-11-20 00:08:27
📄 CISM Review Manual.pdf 36.89 MB 2025-11-11 14:59:48
📄 CISO_Handbook__1689083176.pdf 5.12 MB 2025-11-20 00:08:13
📄 CISO_s_guide_to_API_Security_1694437698.pdf 256.8 KB 2023-09-21 15:35:41
📄 CISSP_Cheat_Sheet_1701285459.pdf 917.84 KB 2025-11-11 15:11:47
📄 CISSP_Concepts_Guide_1693800376.pdf 17.02 MB 2023-09-21 15:37:20
📄 CISSP_Study_Guide__1700536896.pdf 1.84 MB 2025-11-11 15:11:50
📄 CLOUD_SECURITY_ENGINEER_ROADMAP_1710942945.pdf 4.26 MB 2025-11-11 15:02:13
📄 CompTIA_Security_Exam_Study_Guide_1697745931.pdf 3.87 MB 2025-11-11 15:11:56
📄 Consumer_IoT_Device_Cybersecurity_Standards_1701025032.pdf 1.26 MB 2025-11-11 15:12:04
📄 Current_trends_in_Cyber_Insurance__1709132159.pdf 2.89 MB 2025-11-11 15:03:17
📄 Cybermeter_1695569990.pdf 2.47 MB 2025-11-20 00:08:17
📄 Cybersecurity Fundamentals.pdf 1.59 MB 2025-11-11 14:56:40
📄 Cybersecurity terms to know.pdf 1.17 MB 2025-11-11 14:58:56
📄 CYBERSECURITY_career__1704678375.pdf 10.55 MB 2025-11-11 15:12:34
📄 CyberSecurity_Checklist_for_CISO_in_2024_1728878533.pdf 156.3 KB 2025-11-11 14:53:11
📄 Cybersecurity_for_small_business__1690979242.pdf 3.09 MB 2023-09-21 15:39:22
📄 Cybersecurity_Handbook_1723209688.pdf 4.23 MB 2025-11-11 14:53:27
📄 Cybersecurity_incident_response_plan_1714684863.pdf 1.14 MB 2025-11-11 14:58:24
📄 Cybersecurity_Incident_Vulnerability_Response_Playbooks_1705810879.pdf 1.41 MB 2025-11-11 15:12:18
📄 Cybersecurity_Incident_Vulnerability_Response_Playbooks__1701025261.pdf 1.41 MB 2025-11-11 15:12:24
📄 Cybersecurity_Jobs_Roles_Responsibilities_Certifications_1705459965.pdf 209.59 KB 2025-11-11 15:12:23
📄 CYBERSECURITY_OF_AI_AND_STANDARDISATION_1686355833.pdf 823.6 KB 2025-11-20 00:08:20
📄 Cybersecurity_Seven_Steps_for_Boards_of_Directors__1697418898.pdf 7.69 MB 2025-11-20 00:08:46
📄 CYBERSECURITY_TERMS_1704393345.pdf 22.17 MB 2025-11-11 15:13:46
📄 Cybersecurity_Vendor_Guide__1701230610.pdf 8.1 MB 2025-11-11 15:13:10
📄 Cybersecurity__DOD_Rec.pdf 658.15 KB 2025-11-11 14:57:03
📄 Cyber_Physical_Security_and_Critical_Infrastructure_1695768411.pdf 7.34 MB 2025-11-20 00:08:27
📄 Cyber_security_Governance_1704149061.pdf 14.03 MB 2025-11-11 15:13:05
📄 Cyber_Security_Toolkit_for_Boards_1695589217.pdf 4.59 MB 2025-11-20 00:08:28
📄 Cyber_Threat_Intelligence_Guide_1708719284.pdf 7.54 MB 2025-11-11 15:04:02
📄 DARK_WEB_IN_TEN_MINUTES_1702265813.pdf 1.96 MB 2025-11-11 15:12:37
📄 Developing_Cyber_Resilient_Systems_1697986987.pdf 1.84 MB 2025-11-11 15:12:42
📄 DevSecOps_Checklists__1696708618.pdf 11.17 MB 2025-11-20 00:09:01
📄 DevSecOps_Fundamentals_Guidebook_1688914839.pdf 1.23 MB 2025-11-20 00:08:37
📄 DevSecOps_Scenarios__1704558666.pdf 71.38 MB 2025-11-11 15:15:44
📄 DOC_1695844417.pdf 1.02 MB 2025-11-20 00:08:32
📄 DOC_1696273958.pdf 4.94 MB 2025-11-11 15:04:29
📄 DORA_Assessment_Workbook_1713974269.pdf 1.64 MB 2025-11-11 15:00:17
📄 download_log.txt 202 B 2025-11-11 14:49:48
📄 Effective_Threat_Investigation_for_SOC_Analysts_1694108757.pdf 1.72 MB 2023-09-21 15:36:51
📄 Exploring_Hacker_hats_1708624128.pdf 2.07 MB 2025-11-11 15:04:05
📄 Foresight_2030_Threats_1695393213.pdf 314.12 KB 2025-11-20 00:08:36
📄 Getting_Started_with_MITRE_ATT_CK_1695691474.pdf 12.19 MB 2025-11-20 00:09:13
📄 Global_Chief_Information_Security_Officer_CISO_Survey_1689375462.pdf 2.14 MB 2025-11-20 00:08:41
📄 Global_Cybersecurity_Outlook_2023_1695486995.pdf 4.36 MB 2025-11-20 00:08:45
📄 GLOBAL_THREAT_INTELLIGENCE_REPORT__1711141635.pdf 15.29 MB 2025-11-11 15:02:20
📄 Global_Threat_Report_2024_1708624107.pdf 5.02 MB 2025-11-11 15:04:11
📄 GRC_1717166303.pdf 912.32 KB 2025-11-11 14:56:16
📄 Guide_To_Conducting_Risk_Assessment_for_CII_1705504411.pdf 919.08 KB 2025-11-11 15:13:09
📄 Guide_to_ECC_Implementation_1701358483.pdf 1.24 MB 2025-11-11 15:13:13
📄 Hacking_Beginner_to_Expert_Guide_1696079122.pdf 409.4 KB 2025-11-20 00:08:44
📄 ICS_Security_Compendium_1695515697.pdf 3.3 MB 2025-11-20 00:08:52
📄 Identity_and_Access_Management_1696513603.pdf 1.29 MB 2025-11-20 00:08:48
📄 Implementing_An_Information_Security_Management_System_1694125040.pdf 6.79 MB 2023-09-21 15:35:53
📄 Incident Response 3.11 MB 2025-11-20 00:10:05
📄 Incident_Response_Guide_Water_and_Wastewater_Sector_1705625610.pdf 1.59 MB 2025-11-11 15:13:14
📄 Incident_Response_Play_Book_1702305104.pdf 587.33 KB 2025-11-11 15:13:18
📄 Incident_Response_Using_the_Cyber_Kill_Chain_Framework_1721577319.pdf 3.43 MB 2025-11-11 14:53:38
📄 Information_Security_1699132487.pdf 7.93 MB 2025-11-11 15:13:38
📄 Internet_Crime_Report_2022_1680299771.pdf 2.04 MB 2023-09-21 15:40:29
📄 Introduction_CYBERSECURITY_1705759889.pdf 3.26 MB 2025-11-11 15:13:27
📄 Introduction_to_Cybersecurity_1693576949.pdf 5.22 MB 2023-09-21 15:37:29
📄 IOT_Cyber_Security_Framework_1705339825.pdf 3.83 MB 2025-11-11 15:13:28
📄 IoT_Security_1695515792.pdf 3.13 MB 2025-11-20 00:08:57
📄 ISACA_ISO_27001_Implementation_Guide_1696006495.pdf 2.5 MB 2025-11-20 00:08:52
📄 ISO_271001_2022_Audit_Checklist_Part_1_Part_2_and_Part_3_1697722551.pdf 1.87 MB 2025-11-20 00:09:00
📄 ISRAEL_GAZA_CONFLICT_THE_CYBER_PERSPECTIVE_1699889176.pdf 1.78 MB 2025-11-11 15:13:34
📄 IT_Disaster_Recovery_Plan_Templat_1720095295.pdf 751.24 KB 2025-11-11 14:54:58
📄 John_the_Ripper_Guide_1714418087.pdf 1.66 MB 2025-11-11 14:58:35
📄 Joint_Guidance_Identifying_and_Mitigating_LOTL__1711164222.pdf 2.36 MB 2025-11-11 15:01:46
📄 Linux_commands__1711379613.pdf 765.4 KB 2025-11-11 15:01:31
📄 MICROSOFT_365_SECURITY_CHECKLIST_1695389600.pdf 4.7 MB 2025-11-11 15:13:37
📄 Mobile_Device_Best_Practices_1695598594.pdf 1.97 MB 2025-11-20 00:08:58
📄 NASA_S_CYBERSECURITY_READINESS_1690918775.pdf 2.49 MB 2023-09-21 15:39:30
📄 National_Cyber_Threat_Assessment__1699918419.pdf 4.28 MB 2025-11-11 15:13:52
📄 NCSC_Cyber_Security_Framework_1702229016.pdf 417.08 KB 2025-11-11 15:13:43
📄 NCSC_Ransomware_Incident_Response_Plan_1709082648.pdf 787.67 KB 2025-11-11 15:03:25
📄 Network_Security_Best_Practices_1695580460.pdf 445.69 KB 2025-11-20 00:09:01
📄 New_SEC_Cybersecurity_Regulations_Guide_1707785149.pdf 792.47 KB 2025-11-11 15:04:15
📄 NIST_CSF_2_0_A_Guide_to_Creating_Community_Profiles_1713909561.pdf 1.13 MB 2025-11-11 15:00:27
📄 NIST_Cybersecurity_Framework_2_0_1714745412.pdf 1.54 MB 2025-11-11 14:57:55
📄 NIST_PHISH_SCALE_USER_GUIDE_1703905920.pdf 7.82 MB 2025-11-11 15:13:55
📄 NIST_SP_800_92r1_ipd_Cybersecurity_Log_Management_1697070336.pdf 897.95 KB 2025-11-20 00:09:02
📄 NIST_V2_0_1709075700.pdf 1.54 MB 2025-11-11 15:03:43
📄 NMAP_For_Pentesters_1711466688.pdf 2 MB 2025-11-11 15:01:29
📄 NSA_2023_Cybersecurity_Year_in_Review__1703456986.pdf 9.17 MB 2025-11-11 15:14:25
📄 NSA_Network_Infrastructure_Security_Guide_1710614431.pdf 1.05 MB 2025-11-11 15:02:34
📄 NY CyberSecurity laws.pdf 598.45 KB 2025-11-11 15:13:51
📄 Office_365_Secure_Configuration_Framework_1705104645.pdf 2.68 MB 2025-11-11 15:14:01
📄 OSCP_Exam_Report_Demo_1720788341.pdf 2.3 MB 2025-11-11 14:54:08
📄 OWASP_API_Security_Top_10_2023_1699022008.pdf 930.98 KB 2025-11-11 15:13:56
📄 OWASP_Code_Review_Guide_1698715596.pdf 2.27 MB 2025-11-11 15:14:01
📄 OWASP_SECURITY_GUIDE_1704152322.pdf 3.41 MB 2025-11-11 15:14:09
📄 OWASP_TOP_TEN_VULNERABILITIES__1695907185.pdf 2.3 MB 2025-11-20 00:09:07
📄 Part_1_complete_guide_to_cism_certi_1714087636.pdf 6.13 MB 2025-11-11 14:59:55
📄 PCI-DSS-3x-ROC-RTs-FAQs.pdf 375.21 KB 2025-11-11 15:15:03
📄 PCI-DSS-v3_2-A3_DESV-S_AOC.docx 168.07 KB 2025-11-11 15:15:07
📄 PCI-DSS-v3_2-A3_DESV-S_ROC-Reporting-Template.pdf 516.85 KB 2025-11-11 15:15:10
📄 PCI-DSS-v3_2_1-AOC-Merchant.docx 145.67 KB 2025-11-11 15:15:10
📄 PCI-DSS-v3_2_1-AOC-ServiceProviders.docx 159.97 KB 2025-11-11 15:15:13
📄 PCI-DSS-v3_2_1-ROC-Reporting-Template.pdf 2.51 MB 2025-11-11 15:15:21
📄 PCI_DSS-QRG-v3_2_1.pdf 2.56 MB 2025-11-11 15:15:20
📄 PCI_DSS_Glossary_v3-2.pdf 415.82 KB 2025-11-11 15:15:17
📄 PCI_DSS_v3-2-1.pdf 1.28 MB 2025-11-11 15:15:20
📄 Penetrating_Testing_Guide_1702921139.pdf 6.71 MB 2025-11-11 15:14:31
📄 Penetration_Testing_Checklist__1705157859.pdf 1001.33 KB 2025-11-11 15:14:08
📄 Penetration_Testing_WIth_Kali_Linux_Guide__1696195099.pdf 4.27 MB 2025-11-20 00:09:17
📄 Powershell_Tips_Tricks_1702253739.pdf 3.39 MB 2025-11-11 15:14:16
📄 Prioritized-Approach-for-PCI-DSS-v3_2_1.pdf 1.03 MB 2025-11-11 15:15:28
📄 Prioritized-Approach-Tool-v3_2_1.xlsx 326.73 KB 2025-11-11 15:15:28
📄 privacy_regulation_white_paper_1695751305.pdf 886.73 KB 2025-11-20 00:09:07
📄 Privilege_1717597479.pdf 5.42 MB 2025-11-11 14:55:50
📄 Privilege_Escalation_Automated_Script_Windows_Linux_1697473812.pdf 4.86 MB 2025-11-20 00:09:11
📄 Ransomware_Hostage_Rescue_Manual__1691809840.pdf 891.25 KB 2023-09-21 15:39:02
📄 Ransomware_incident_response_playbook_framework_1695515761.pdf 3.11 MB 2025-11-20 00:09:11
📄 Real_world_Incident_Report_Template_1712349147.pdf 14.25 MB 2025-11-11 15:01:01
📄 Red_Teaming_Toolkit_1711810675.pdf 252.16 KB 2025-11-11 15:01:13
📄 Red_Team_Guides_1697568136.pdf 5.24 MB 2025-11-20 00:09:16
📄 REPORT_STATE_OF_AI_CYBER_SECURITY_2024_1714052194.pdf 2.16 MB 2025-11-11 14:59:59
📄 Risk_Assessment_and_Treatment_Process_1696373891.pdf 506.53 KB 2025-11-20 00:09:12
📄 RISK_ASSESSMENT_PROCESS_HANDBOOK_1696006452.pdf 7.18 MB 2025-11-20 00:09:31
📄 Risk_management_playbook__1695933945.pdf 10.52 MB 2025-11-20 00:09:35
📄 ROLES_AND_RECOMMENDED_ROLE_BASED_TRAINING_1697059548.pdf 3.78 MB 2025-11-20 00:09:22
📄 SANS_DFIR_Cheatsheets_Notebooks_1695570008.pdf 4.61 MB 2025-11-20 00:09:25
📄 Security Health Model - csage.xlsx 23.29 KB 2025-11-20 00:09:21
📄 Security_myths_debunked_1695347264.pdf 760.24 KB 2025-11-20 00:09:25
📄 Security_Operations_Centre_Guide__1709836746.pdf 1.19 MB 2025-11-11 15:02:42
📄 Security_Plan_Work_Book_1702927196.pdf 1.99 MB 2025-11-11 15:14:15
📄 SOC_Analyst_Series__1702044533.pdf 12.26 MB 2025-11-11 15:14:44
📄 SOC_Concepts_Questions__1721569326.pdf 1.1 MB 2025-11-11 14:53:44
📄 SOC_SIEM_USE_CASES_1703786387.pdf 367.24 KB 2025-11-11 15:14:21
📄 SOC_TOOLS_1706418098.pdf 3.36 MB 2025-11-11 15:14:32
📄 SOC_Use_Cases_1696285688.pdf 494.33 KB 2025-11-20 00:09:24
📄 SOFTWARE_SUPPLY_CHAIN_SECURITY_THREAT_LANDSCAPE__1704479320.pdf 6.06 MB 2025-11-11 15:14:47
📄 Statement1.pdf 150.29 KB 2025-11-11 15:14:33
📄 The_Best_SOC_Analyst_Tools_1692222685.pdf 3.36 MB 2023-09-21 15:38:49
📄 The_Complete_Active_Directory_Security_Handbook_1702181284.pdf 4.33 MB 2025-11-11 15:14:46
📄 The_Global_Risks_Report_2024_1705339835.pdf 13.85 MB 2025-11-11 15:15:20
📄 The_NIST_Cybersecurity_Framework_2_0_1694974669.pdf 2.35 MB 2023-09-21 15:35:39
📄 THE_OPEN_SOURCE_CYBERSECURITY_PLAYBOOK_1701820306.pdf 644.17 KB 2025-11-11 15:14:51
📄 The_Windows_Hacker_s_Handbook_1697587677.pdf 4.94 MB 2025-11-20 00:09:33
📄 Third Party Security Controls Guidelines.pdf 426.98 KB 2025-11-11 14:54:35
📄 ThorTeaches+CISSP+and+CISM+Mnemonics.pdf 371.88 KB 2025-11-20 00:09:31
📄 Threat_Hunting_101_1695307432.pdf 2.13 MB 2023-09-21 15:35:26
📄 Tools_for_Hacking_1709221914.pdf 2.64 MB 2025-11-11 15:03:10
📄 Top_50_Python_Interview_Questions__1697986965.pdf 259.75 KB 2025-11-11 15:14:49
📄 Ultimate_DevSecOps_Library_1695307082.pdf 296.94 KB 2023-09-21 15:35:32
📄 Understanding_the_latest_CVSS_4_0_1698965287.pdf 920.06 KB 2025-11-11 15:14:50
📄 Using_MITRE_ATT_CK_in_Threat_Hunting_and_Detection_1695598531.pdf 1.94 MB 2025-11-20 00:09:33
📄 Visual_Threat_Intelligence_1693011915.pdf 11.35 MB 2023-09-21 15:37:47
📄 What_to_do_in_case_of_a_ransomware_incident_1698597555.pdf 500.08 KB 2025-11-11 15:14:59
📄 Who_s_on_your_Cybersecurity_Dream_Team__1571526927.pdf 5.84 MB 2025-11-11 15:15:38
📄 Windows_hacking_1704558641.pdf 2.81 MB 2025-11-11 15:15:06
📄 WinLinux_1701230585.pdf 9.92 MB 2025-11-11 15:15:12
📄 Wireshark_for_Security_Professionals_1698258198.pdf 10.74 MB 2025-11-11 15:15:20
📄 Wireshark__1713978895.pdf 1.54 MB 2025-11-11 15:00:08
📄 _DoD_Zero_Trust_Reference_Architecture_1690734380.pdf 6.71 MB 2023-09-21 15:39:50
📄 _ISO_27001_2022_vs_NIST_CSF_2_0_1709221931.pdf 160.73 KB 2025-11-11 15:02:58