Directory Listing for /home/wkevvgxibogz/files.blacksailsecurity.com/docs
Name
Size
Modified
📁 IncidentResponse/
—
2025-11-11 17:54:27
📄 24_Great_Cybersecurity_Frameworks_1702578110.pdf
47.52 MB
2025-11-11 15:12:18
📄 25_Methods_For_Pipeline_Attacks_1689531640.pdf
1.61 MB
2025-11-20 00:07:58
📄 100_Free_Security_Tools_1705267388.pdf
530.91 KB
2025-11-11 15:10:34
📄 100_secuirty_tools_pdf_1717276774.pdf
511.37 KB
2025-11-11 14:56:01
📄 2023+CISM+Domain+1+Study+guide+by+ThorTeaches.com+v2.1.pdf
2.35 MB
2025-11-20 00:07:57
📄 2023_U_S_NATIONAL_INTELLIGENCE_STRATEGY_1692416104.pdf
16.53 MB
2023-09-21 15:38:13
📄 27001_Gap_Analysis_Tool_1697463822.pdf
358.33 KB
2025-11-20 00:07:54
📄 27001_Gap_Guide_1697897446.pdf
1.73 MB
2025-11-11 15:10:35
📄 AI_For_CyberSecurity_1730478882.pdf
1.37 MB
2025-11-11 14:53:06
📄 ai_guidance_document_1697028852.pdf
1.45 MB
2025-11-20 00:07:57
📄 All_About_Phishing_1704038487.pdf
49.83 MB
2025-11-11 15:13:22
📄 Amazon_Machine_Learning_Developer_Guide_1696687374.pdf
2.14 MB
2025-11-20 00:07:56
📄 Ansible_Guide_1699889089.pdf
1.43 MB
2025-11-11 15:10:52
📄 An_Introduction_to_Information_Security_1698978277.pdf
1.73 MB
2025-11-11 15:10:40
📄 API_Security_Maturity_Model_1702578285.pdf
551.68 KB
2025-11-11 15:10:38
📄 Are_You_Ready_Prepare_for_Mandatory_Cyber_Incident_Reporting_Rules_1710727435.pdf
127.36 KB
2025-11-11 15:02:23
📄 Assessing_Cyber_Security_Skills_Competencies_1702860190.pdf
436.18 KB
2025-11-11 15:10:40
📄 Austrailian_Cyber_Center_Information_Security_Manual_1715947424.pdf
4.3 MB
2025-11-11 14:57:42
📄 Australia_s_Cyber_Security_Strategy_1700624178.pdf
13.85 MB
2025-11-11 15:11:13
📄 Awesome_Bugbounty_Writeups_1696687394.pdf
220.59 KB
2025-11-20 00:07:59
📄 Awesome_SOC_1695484240.pdf
938.54 KB
2025-11-20 00:08:05
📄 A_Guide_to_Building_a_Secure_SDLC_1697986761.pdf
864.75 KB
2025-11-11 15:10:33
📄 A_practical_guide_on_incident_management__1702181234.pdf
13.59 MB
2025-11-11 15:11:43
📄 A_Step_By_Step_Guide_to_Cyber_Risk_Assessment_1697637747.pdf
17.18 MB
2025-11-20 00:08:33
📄 A_Zero_Trust_Architecture_Model_for_Cloud_Apps_1695676823.pdf
1.36 MB
2025-11-20 00:07:56
📄 BA_Interview_Questions_Answers__1698176862.pdf
18.2 MB
2025-11-11 15:11:55
📄 Best_Practices_for_Cyber_Crisis_Management__1720355132.pdf
2.22 MB
2025-11-11 14:54:46
📄 Best_Practices_for_Securing_Your_Home_Network_1696181136.pdf
378.76 KB
2025-11-20 00:08:04
📄 Blue_Team_Cheat_Sheets_1690676182.pdf
13.62 MB
2023-09-21 15:40:25
📄 Blue_Team_Cheat_Sheet__1701025046.pdf
13.62 MB
2025-11-11 15:11:14
📄 Blue_Team_Tools__1719780114.pdf
10.8 MB
2025-11-11 14:55:22
📄 Breaches_Anticipated_in_2023_1695824033.pdf
94.61 MB
2025-11-20 00:10:25
📄 Building_a_Cybersecurity_and_Privacy_Learning_Program_1695430981.pdf
1.72 MB
2025-11-20 00:08:12
📄 Burp_Suite_1699147304.pdf
65.62 MB
2025-11-11 15:14:46
📄 CAIQv4.0.2_STAR-Security-Questionnaire_Generated-at_2021-09-13 (1).xlsx
76.21 KB
2025-11-20 00:08:04
📄 Cannabis_Facility_Mock_Inspection_SOP__Leafsheets_com_1713710978.pdf
395.35 KB
2025-11-11 15:00:37
📄 Checklists_to_Guard_Against_Common_Types_of_Data_Breaches_1695676730.pdf
1.5 MB
2025-11-20 00:08:11
📄 CHECKLIST_FOR_API_SECURITY_1720882506.pdf
196.31 KB
2025-11-11 14:53:54
📄 China_Linked_Cyber_Actors_Hide_in_Router_Firmware_1696285616.pdf
651.08 KB
2025-11-20 00:08:07
📄 CISA_CYBERSECURITY_STRATEGIC_PLAN_2024_2026_1691450460.pdf
1.3 MB
2023-09-21 15:39:08
📄 CISA_CYBERSECURITY_STRATEGIC_PLAN_FY2024_2026_1691965807.pdf
1.3 MB
2023-09-21 15:38:58
📄 CISA_Roadmap_For_Artificial_Intelligence__1702087185.pdf
15.2 MB
2025-11-11 15:12:14
📄 CISA_SECURE_BY_DESIGN_1697590060.pdf
14.4 MB
2025-11-20 00:08:27
📄 CISM Review Manual.pdf
36.89 MB
2025-11-11 14:59:48
📄 CISO_Handbook__1689083176.pdf
5.12 MB
2025-11-20 00:08:13
📄 CISO_s_guide_to_API_Security_1694437698.pdf
256.8 KB
2023-09-21 15:35:41
📄 CISSP_Cheat_Sheet_1701285459.pdf
917.84 KB
2025-11-11 15:11:47
📄 CISSP_Concepts_Guide_1693800376.pdf
17.02 MB
2023-09-21 15:37:20
📄 CISSP_Study_Guide__1700536896.pdf
1.84 MB
2025-11-11 15:11:50
📄 CLOUD_SECURITY_ENGINEER_ROADMAP_1710942945.pdf
4.26 MB
2025-11-11 15:02:13
📄 CompTIA_Security_Exam_Study_Guide_1697745931.pdf
3.87 MB
2025-11-11 15:11:56
📄 Consumer_IoT_Device_Cybersecurity_Standards_1701025032.pdf
1.26 MB
2025-11-11 15:12:04
📄 Current_trends_in_Cyber_Insurance__1709132159.pdf
2.89 MB
2025-11-11 15:03:17
📄 Cybermeter_1695569990.pdf
2.47 MB
2025-11-20 00:08:17
📄 Cybersecurity Fundamentals.pdf
1.59 MB
2025-11-11 14:56:40
📄 Cybersecurity terms to know.pdf
1.17 MB
2025-11-11 14:58:56
📄 CYBERSECURITY_career__1704678375.pdf
10.55 MB
2025-11-11 15:12:34
📄 CyberSecurity_Checklist_for_CISO_in_2024_1728878533.pdf
156.3 KB
2025-11-11 14:53:11
📄 Cybersecurity_for_small_business__1690979242.pdf
3.09 MB
2023-09-21 15:39:22
📄 Cybersecurity_Handbook_1723209688.pdf
4.23 MB
2025-11-11 14:53:27
📄 Cybersecurity_incident_response_plan_1714684863.pdf
1.14 MB
2025-11-11 14:58:24
📄 Cybersecurity_Incident_Vulnerability_Response_Playbooks_1705810879.pdf
1.41 MB
2025-11-11 15:12:18
📄 Cybersecurity_Incident_Vulnerability_Response_Playbooks__1701025261.pdf
1.41 MB
2025-11-11 15:12:24
📄 Cybersecurity_Jobs_Roles_Responsibilities_Certifications_1705459965.pdf
209.59 KB
2025-11-11 15:12:23
📄 CYBERSECURITY_OF_AI_AND_STANDARDISATION_1686355833.pdf
823.6 KB
2025-11-20 00:08:20
📄 Cybersecurity_Seven_Steps_for_Boards_of_Directors__1697418898.pdf
7.69 MB
2025-11-20 00:08:46
📄 CYBERSECURITY_TERMS_1704393345.pdf
22.17 MB
2025-11-11 15:13:46
📄 Cybersecurity_Vendor_Guide__1701230610.pdf
8.1 MB
2025-11-11 15:13:10
📄 Cybersecurity__DOD_Rec.pdf
658.15 KB
2025-11-11 14:57:03
📄 Cyber_Physical_Security_and_Critical_Infrastructure_1695768411.pdf
7.34 MB
2025-11-20 00:08:27
📄 Cyber_security_Governance_1704149061.pdf
14.03 MB
2025-11-11 15:13:05
📄 Cyber_Security_Toolkit_for_Boards_1695589217.pdf
4.59 MB
2025-11-20 00:08:28
📄 Cyber_Threat_Intelligence_Guide_1708719284.pdf
7.54 MB
2025-11-11 15:04:02
📄 DARK_WEB_IN_TEN_MINUTES_1702265813.pdf
1.96 MB
2025-11-11 15:12:37
📄 Developing_Cyber_Resilient_Systems_1697986987.pdf
1.84 MB
2025-11-11 15:12:42
📄 DevSecOps_Checklists__1696708618.pdf
11.17 MB
2025-11-20 00:09:01
📄 DevSecOps_Fundamentals_Guidebook_1688914839.pdf
1.23 MB
2025-11-20 00:08:37
📄 DevSecOps_Scenarios__1704558666.pdf
71.38 MB
2025-11-11 15:15:44
📄 DOC_1695844417.pdf
1.02 MB
2025-11-20 00:08:32
📄 DOC_1696273958.pdf
4.94 MB
2025-11-11 15:04:29
📄 DORA_Assessment_Workbook_1713974269.pdf
1.64 MB
2025-11-11 15:00:17
📄 download_log.txt
202 B
2025-11-11 14:49:48
📄 Effective_Threat_Investigation_for_SOC_Analysts_1694108757.pdf
1.72 MB
2023-09-21 15:36:51
📄 Exploring_Hacker_hats_1708624128.pdf
2.07 MB
2025-11-11 15:04:05
📄 Foresight_2030_Threats_1695393213.pdf
314.12 KB
2025-11-20 00:08:36
📄 Getting_Started_with_MITRE_ATT_CK_1695691474.pdf
12.19 MB
2025-11-20 00:09:13
📄 Global_Chief_Information_Security_Officer_CISO_Survey_1689375462.pdf
2.14 MB
2025-11-20 00:08:41
📄 Global_Cybersecurity_Outlook_2023_1695486995.pdf
4.36 MB
2025-11-20 00:08:45
📄 GLOBAL_THREAT_INTELLIGENCE_REPORT__1711141635.pdf
15.29 MB
2025-11-11 15:02:20
📄 Global_Threat_Report_2024_1708624107.pdf
5.02 MB
2025-11-11 15:04:11
📄 GRC_1717166303.pdf
912.32 KB
2025-11-11 14:56:16
📄 Guide_To_Conducting_Risk_Assessment_for_CII_1705504411.pdf
919.08 KB
2025-11-11 15:13:09
📄 Guide_to_ECC_Implementation_1701358483.pdf
1.24 MB
2025-11-11 15:13:13
📄 Hacking_Beginner_to_Expert_Guide_1696079122.pdf
409.4 KB
2025-11-20 00:08:44
📄 ICS_Security_Compendium_1695515697.pdf
3.3 MB
2025-11-20 00:08:52
📄 Identity_and_Access_Management_1696513603.pdf
1.29 MB
2025-11-20 00:08:48
📄 Implementing_An_Information_Security_Management_System_1694125040.pdf
6.79 MB
2023-09-21 15:35:53
📄 Incident Response
3.11 MB
2025-11-20 00:10:05
📄 Incident_Response_Guide_Water_and_Wastewater_Sector_1705625610.pdf
1.59 MB
2025-11-11 15:13:14
📄 Incident_Response_Play_Book_1702305104.pdf
587.33 KB
2025-11-11 15:13:18
📄 Incident_Response_Using_the_Cyber_Kill_Chain_Framework_1721577319.pdf
3.43 MB
2025-11-11 14:53:38
📄 Information_Security_1699132487.pdf
7.93 MB
2025-11-11 15:13:38
📄 Internet_Crime_Report_2022_1680299771.pdf
2.04 MB
2023-09-21 15:40:29
📄 Introduction_CYBERSECURITY_1705759889.pdf
3.26 MB
2025-11-11 15:13:27
📄 Introduction_to_Cybersecurity_1693576949.pdf
5.22 MB
2023-09-21 15:37:29
📄 IOT_Cyber_Security_Framework_1705339825.pdf
3.83 MB
2025-11-11 15:13:28
📄 IoT_Security_1695515792.pdf
3.13 MB
2025-11-20 00:08:57
📄 ISACA_ISO_27001_Implementation_Guide_1696006495.pdf
2.5 MB
2025-11-20 00:08:52
📄 ISO_271001_2022_Audit_Checklist_Part_1_Part_2_and_Part_3_1697722551.pdf
1.87 MB
2025-11-20 00:09:00
📄 ISRAEL_GAZA_CONFLICT_THE_CYBER_PERSPECTIVE_1699889176.pdf
1.78 MB
2025-11-11 15:13:34
📄 IT_Disaster_Recovery_Plan_Templat_1720095295.pdf
751.24 KB
2025-11-11 14:54:58
📄 John_the_Ripper_Guide_1714418087.pdf
1.66 MB
2025-11-11 14:58:35
📄 Joint_Guidance_Identifying_and_Mitigating_LOTL__1711164222.pdf
2.36 MB
2025-11-11 15:01:46
📄 Linux_commands__1711379613.pdf
765.4 KB
2025-11-11 15:01:31
📄 MICROSOFT_365_SECURITY_CHECKLIST_1695389600.pdf
4.7 MB
2025-11-11 15:13:37
📄 Mobile_Device_Best_Practices_1695598594.pdf
1.97 MB
2025-11-20 00:08:58
📄 NASA_S_CYBERSECURITY_READINESS_1690918775.pdf
2.49 MB
2023-09-21 15:39:30
📄 National_Cyber_Threat_Assessment__1699918419.pdf
4.28 MB
2025-11-11 15:13:52
📄 NCSC_Cyber_Security_Framework_1702229016.pdf
417.08 KB
2025-11-11 15:13:43
📄 NCSC_Ransomware_Incident_Response_Plan_1709082648.pdf
787.67 KB
2025-11-11 15:03:25
📄 Network_Security_Best_Practices_1695580460.pdf
445.69 KB
2025-11-20 00:09:01
📄 New_SEC_Cybersecurity_Regulations_Guide_1707785149.pdf
792.47 KB
2025-11-11 15:04:15
📄 NIST_CSF_2_0_A_Guide_to_Creating_Community_Profiles_1713909561.pdf
1.13 MB
2025-11-11 15:00:27
📄 NIST_Cybersecurity_Framework_2_0_1714745412.pdf
1.54 MB
2025-11-11 14:57:55
📄 NIST_PHISH_SCALE_USER_GUIDE_1703905920.pdf
7.82 MB
2025-11-11 15:13:55
📄 NIST_SP_800_92r1_ipd_Cybersecurity_Log_Management_1697070336.pdf
897.95 KB
2025-11-20 00:09:02
📄 NIST_V2_0_1709075700.pdf
1.54 MB
2025-11-11 15:03:43
📄 NMAP_For_Pentesters_1711466688.pdf
2 MB
2025-11-11 15:01:29
📄 NSA_2023_Cybersecurity_Year_in_Review__1703456986.pdf
9.17 MB
2025-11-11 15:14:25
📄 NSA_Network_Infrastructure_Security_Guide_1710614431.pdf
1.05 MB
2025-11-11 15:02:34
📄 NY CyberSecurity laws.pdf
598.45 KB
2025-11-11 15:13:51
📄 Office_365_Secure_Configuration_Framework_1705104645.pdf
2.68 MB
2025-11-11 15:14:01
📄 OSCP_Exam_Report_Demo_1720788341.pdf
2.3 MB
2025-11-11 14:54:08
📄 OWASP_API_Security_Top_10_2023_1699022008.pdf
930.98 KB
2025-11-11 15:13:56
📄 OWASP_Code_Review_Guide_1698715596.pdf
2.27 MB
2025-11-11 15:14:01
📄 OWASP_SECURITY_GUIDE_1704152322.pdf
3.41 MB
2025-11-11 15:14:09
📄 OWASP_TOP_TEN_VULNERABILITIES__1695907185.pdf
2.3 MB
2025-11-20 00:09:07
📄 Part_1_complete_guide_to_cism_certi_1714087636.pdf
6.13 MB
2025-11-11 14:59:55
📄 PCI-DSS-3x-ROC-RTs-FAQs.pdf
375.21 KB
2025-11-11 15:15:03
📄 PCI-DSS-v3_2-A3_DESV-S_AOC.docx
168.07 KB
2025-11-11 15:15:07
📄 PCI-DSS-v3_2-A3_DESV-S_ROC-Reporting-Template.pdf
516.85 KB
2025-11-11 15:15:10
📄 PCI-DSS-v3_2_1-AOC-Merchant.docx
145.67 KB
2025-11-11 15:15:10
📄 PCI-DSS-v3_2_1-AOC-ServiceProviders.docx
159.97 KB
2025-11-11 15:15:13
📄 PCI-DSS-v3_2_1-ROC-Reporting-Template.pdf
2.51 MB
2025-11-11 15:15:21
📄 PCI_DSS-QRG-v3_2_1.pdf
2.56 MB
2025-11-11 15:15:20
📄 PCI_DSS_Glossary_v3-2.pdf
415.82 KB
2025-11-11 15:15:17
📄 PCI_DSS_v3-2-1.pdf
1.28 MB
2025-11-11 15:15:20
📄 Penetrating_Testing_Guide_1702921139.pdf
6.71 MB
2025-11-11 15:14:31
📄 Penetration_Testing_Checklist__1705157859.pdf
1001.33 KB
2025-11-11 15:14:08
📄 Penetration_Testing_WIth_Kali_Linux_Guide__1696195099.pdf
4.27 MB
2025-11-20 00:09:17
📄 Powershell_Tips_Tricks_1702253739.pdf
3.39 MB
2025-11-11 15:14:16
📄 Prioritized-Approach-for-PCI-DSS-v3_2_1.pdf
1.03 MB
2025-11-11 15:15:28
📄 Prioritized-Approach-Tool-v3_2_1.xlsx
326.73 KB
2025-11-11 15:15:28
📄 privacy_regulation_white_paper_1695751305.pdf
886.73 KB
2025-11-20 00:09:07
📄 Privilege_1717597479.pdf
5.42 MB
2025-11-11 14:55:50
📄 Privilege_Escalation_Automated_Script_Windows_Linux_1697473812.pdf
4.86 MB
2025-11-20 00:09:11
📄 Ransomware_Hostage_Rescue_Manual__1691809840.pdf
891.25 KB
2023-09-21 15:39:02
📄 Ransomware_incident_response_playbook_framework_1695515761.pdf
3.11 MB
2025-11-20 00:09:11
📄 Real_world_Incident_Report_Template_1712349147.pdf
14.25 MB
2025-11-11 15:01:01
📄 Red_Teaming_Toolkit_1711810675.pdf
252.16 KB
2025-11-11 15:01:13
📄 Red_Team_Guides_1697568136.pdf
5.24 MB
2025-11-20 00:09:16
📄 REPORT_STATE_OF_AI_CYBER_SECURITY_2024_1714052194.pdf
2.16 MB
2025-11-11 14:59:59
📄 Risk_Assessment_and_Treatment_Process_1696373891.pdf
506.53 KB
2025-11-20 00:09:12
📄 RISK_ASSESSMENT_PROCESS_HANDBOOK_1696006452.pdf
7.18 MB
2025-11-20 00:09:31
📄 Risk_management_playbook__1695933945.pdf
10.52 MB
2025-11-20 00:09:35
📄 ROLES_AND_RECOMMENDED_ROLE_BASED_TRAINING_1697059548.pdf
3.78 MB
2025-11-20 00:09:22
📄 SANS_DFIR_Cheatsheets_Notebooks_1695570008.pdf
4.61 MB
2025-11-20 00:09:25
📄 Security Health Model - csage.xlsx
23.29 KB
2025-11-20 00:09:21
📄 Security_myths_debunked_1695347264.pdf
760.24 KB
2025-11-20 00:09:25
📄 Security_Operations_Centre_Guide__1709836746.pdf
1.19 MB
2025-11-11 15:02:42
📄 Security_Plan_Work_Book_1702927196.pdf
1.99 MB
2025-11-11 15:14:15
📄 SOC_Analyst_Series__1702044533.pdf
12.26 MB
2025-11-11 15:14:44
📄 SOC_Concepts_Questions__1721569326.pdf
1.1 MB
2025-11-11 14:53:44
📄 SOC_SIEM_USE_CASES_1703786387.pdf
367.24 KB
2025-11-11 15:14:21
📄 SOC_TOOLS_1706418098.pdf
3.36 MB
2025-11-11 15:14:32
📄 SOC_Use_Cases_1696285688.pdf
494.33 KB
2025-11-20 00:09:24
📄 SOFTWARE_SUPPLY_CHAIN_SECURITY_THREAT_LANDSCAPE__1704479320.pdf
6.06 MB
2025-11-11 15:14:47
📄 Statement1.pdf
150.29 KB
2025-11-11 15:14:33
📄 The_Best_SOC_Analyst_Tools_1692222685.pdf
3.36 MB
2023-09-21 15:38:49
📄 The_Complete_Active_Directory_Security_Handbook_1702181284.pdf
4.33 MB
2025-11-11 15:14:46
📄 The_Global_Risks_Report_2024_1705339835.pdf
13.85 MB
2025-11-11 15:15:20
📄 The_NIST_Cybersecurity_Framework_2_0_1694974669.pdf
2.35 MB
2023-09-21 15:35:39
📄 THE_OPEN_SOURCE_CYBERSECURITY_PLAYBOOK_1701820306.pdf
644.17 KB
2025-11-11 15:14:51
📄 The_Windows_Hacker_s_Handbook_1697587677.pdf
4.94 MB
2025-11-20 00:09:33
📄 Third Party Security Controls Guidelines.pdf
426.98 KB
2025-11-11 14:54:35
📄 ThorTeaches+CISSP+and+CISM+Mnemonics.pdf
371.88 KB
2025-11-20 00:09:31
📄 Threat_Hunting_101_1695307432.pdf
2.13 MB
2023-09-21 15:35:26
📄 Tools_for_Hacking_1709221914.pdf
2.64 MB
2025-11-11 15:03:10
📄 Top_50_Python_Interview_Questions__1697986965.pdf
259.75 KB
2025-11-11 15:14:49
📄 Ultimate_DevSecOps_Library_1695307082.pdf
296.94 KB
2023-09-21 15:35:32
📄 Understanding_the_latest_CVSS_4_0_1698965287.pdf
920.06 KB
2025-11-11 15:14:50
📄 Using_MITRE_ATT_CK_in_Threat_Hunting_and_Detection_1695598531.pdf
1.94 MB
2025-11-20 00:09:33
📄 Visual_Threat_Intelligence_1693011915.pdf
11.35 MB
2023-09-21 15:37:47
📄 What_to_do_in_case_of_a_ransomware_incident_1698597555.pdf
500.08 KB
2025-11-11 15:14:59
📄 Who_s_on_your_Cybersecurity_Dream_Team__1571526927.pdf
5.84 MB
2025-11-11 15:15:38
📄 Windows_hacking_1704558641.pdf
2.81 MB
2025-11-11 15:15:06
📄 WinLinux_1701230585.pdf
9.92 MB
2025-11-11 15:15:12
📄 Wireshark_for_Security_Professionals_1698258198.pdf
10.74 MB
2025-11-11 15:15:20
📄 Wireshark__1713978895.pdf
1.54 MB
2025-11-11 15:00:08
📄 _DoD_Zero_Trust_Reference_Architecture_1690734380.pdf
6.71 MB
2023-09-21 15:39:50
📄 _ISO_27001_2022_vs_NIST_CSF_2_0_1709221931.pdf
160.73 KB
2025-11-11 15:02:58