forked from decal/werdlists
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Create several new files and update corresponding README markdowns
- Loading branch information
Showing
11 changed files
with
216 additions
and
8 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,3 +1,5 @@ | ||
ctcp-command-names: Client-to-Client Protocol command name strings | ||
freenode-channel-sizes: channels from [freenode](https://freenode.net) IRC sorted by joined client count | ||
inspircd-anope-commands: commands accepted by anope IRC services daemon via InspIRCd <https://wiki.inspircd.org/Commands> | ||
inspircd-helpop-cmds: commands returned by HELPOP in [InspIRCd](https://inspircd.org) servers | ||
inspircd-numerics-replies: list of formats for InspIRCd servers' numeric code replies <http://decal.sdf.org/spotfedsonline/inspircd-numerics.txt> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
# reputation name Description | ||
25,000 access to site analytics Access to internal and Google site analytics | ||
20,000 trusted user Expanded editing, deletion and undeletion privileges | ||
15,000 protect questions Mark questions as protected | ||
10,000 access to moderator tools Access reports, delete questions, review reviews | ||
5,000 approve tag wiki edits Approve edits to tag wikis made by regular users | ||
3,000 cast close and reopen votes Help decide whether posts are off-topic or duplicates | ||
2,500 create tag synonyms Decide which tags have the same meaning as others | ||
2,000 edit questions and answers Edits to any question or answer are applied immediately | ||
1,500 create tags Add new tags to the site | ||
1,000 established user You've been around for a while; see vote counts | ||
1,000 create gallery chat rooms Create chat rooms where only specific users may talk | ||
500 access review queues Access first posts and late answers review queues | ||
250 view close votes View and cast close/reopen votes on your own questions | ||
200 reduce ads Some ads are now automatically disabled | ||
125 vote down Indicate when questions and answers are not useful | ||
100 edit community wiki Collaborate on the editing and improvement of wiki posts | ||
100 create chat rooms Create new chat rooms | ||
75 set bounties Offer some of your reputation as bounty on a question | ||
50 comment everywhere Leave comments on other people's posts | ||
20 talk in chat Participate in this site's chat rooms | ||
15 flag posts Bring content to the attention of the community via flags | ||
15 vote up Indicate when questions and answers are useful | ||
10 remove new user restrictions Post more links, answer protected questions | ||
10 create wiki posts Create answers that can be easily edited by most users | ||
5 participate in meta Discuss the site itself: bugs, feedback, and governance | ||
1 create posts Ask a question or contribute an answer |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,76 @@ | ||
General ICT security guidance documents | ||
Security Architectures, Models and Frameworks | ||
Security management standards and guidance documents | ||
Security policy and policy mechanisms | ||
Security assessment and evaluation criteria | ||
Security Assurance | ||
Baseline security requirements | ||
Intrusion Detection | ||
Security services | ||
Generic Security Services | ||
Access Control services | ||
Authentication Services | ||
Trusted Third Party services | ||
Audit and Alarms services | ||
Authorization | ||
Security mechanisms | ||
Access Control mechanisms | ||
Authentication mechanisms | ||
Confidentiality mechanisms | ||
Integrity mechanisms | ||
Non-repudiation mechanisms | ||
Generic security mechanisms | ||
Biometrics | ||
Check systems | ||
Crypto utilities | ||
Digital Signature mechanisms | ||
Electronic signatures | ||
Encryption Algorithms & techniques | ||
Hash Functions | ||
Miscellaneous cryptographic mechanisms | ||
Smart cards | ||
Trusted Third party mechanisms | ||
Time Stamping | ||
Application layer security | ||
Business continuity | ||
Content protection | ||
Critical Infrastructure Protection | ||
Cybersecurity | ||
Digital identity | ||
Directories | ||
Disaster Recovery | ||
Emergency Services | ||
Identity management | ||
Incident management | ||
IPTV security | ||
Key management | ||
Lawful interception | ||
Malicious Code | ||
Mobile security | ||
Network Management | ||
Network security | ||
Network Layer security | ||
Next Generation Networks | ||
Patch Management | ||
PKI | ||
Privacy | ||
Risk assessment | ||
Security audit | ||
Security certificates | ||
Secure messaging | ||
Security terminology and glossaries | ||
Security protocol standards | ||
Spam and Spyware | ||
Transport Layer security | ||
Threats and threat assessment | ||
Trust | ||
Vulnerabilities and security analysis | ||
Web services | ||
Wireless | ||
Sector-specific security standards | ||
Facsimile | ||
Mobile | ||
Miscellaneous | ||
Multimedia | ||
Security of television signals and services | ||
Satellite |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,2 +1,3 @@ | ||
fbi-cyber-backgrounds: FBI Cyber Backgrounds Chart, Preferred Degrees & Work Experience Extended Certificates <https://cdn-igoqhotnhi6o.netdna-ssl.com/FBI_CyberPage_AdditionalCertificates.pdf> | ||
secure-drop-list: list of web locations to leak documents to journalists | ||
security-class-levels: names of clearance levels required by the U.S. military |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,97 @@ | ||
|
||
* * * | ||
|
||
# TIER 1 CERTIFICATIONS | ||
|
||
C)IHE Mile 2 Certified Incident Handling Engineer | ||
C)NFE Mile 2 Certified Network Forensics Examiner | ||
C)NPTE Mile2 Certified Penetration Testing Engineer | ||
C)PTC Mile2 Certified Penetration Testing Consultant | ||
C)SWAE Mile2 Certified Secure Web Applications Engineer | ||
C)VA Mile2 Certified Vulnerability Assessor | ||
C)WSE Mile2 Certified Wireless Security Engineer | ||
CCDE Cisco Certified Design Expert | ||
CCE ISFCE Certified Computer Examiner | ||
CEH ECCouncil Certified Ethical Hacker | ||
CEPT Certified Expert Penetration Tester | ||
CFCE IACIS Certified Forensic Computer Examiner | ||
CHFI EC Council Computer Hacking Forensic Investigator | ||
CISSP (ISC)2 Certified Information Systems Security Professional | ||
CNDA EC Council Certified network Defense Architect | ||
CPT IACRB Certified Penetration Tester | ||
CREA IACRB Certified Reverse Engineering Analyst | ||
CSSA IACRB Certified SCADA Security Architect | ||
CWAPT IACRB Certified Web Application Penetration Tester | ||
GAWN GIAC Assessing and Auditing Wireless Networks | ||
GCFA GIAC Certified Forensic Analyst | ||
GCFE GIAC Certified Forensic Examiner | ||
GCIA GIAC Certified Intrusion Analyst | ||
GCIH GIAC Certified Incident Handler | ||
GCUX GIAC Certified UNIX Security Administrator | ||
GICSP GIAC Global Industrial Cyber Security Professional | ||
GMOB GIAC Mobile Device Security Analyst | ||
GPEN GIAC Certified Penetration Tester | ||
GPPA GIAC Certified Perimeter Protection Analyst | ||
GREM GIAC Reverse Engineering Malware | ||
GSE GIAC Security Engineer | ||
GWAPT GIAC Web Application Penetration Tester | ||
GXPN GIAC Exploit Research and Advanced | ||
Penetration Tester | ||
MCSD Microsoft Certified Solutions Developer | ||
MCSE Microsoft Certified Solutions Expert | ||
SNFA GIAC Network Forensic Analyst | ||
SSCP (ISC)2 Systems Security Certified Practitioner | ||
|
||
|
||
* * * | ||
|
||
# TIER 2 CERTIFICATIONS | ||
|
||
ACE AccessData Certified Examiner | ||
C)DFE Mile2 Certified Digital Forensics Examiner | ||
CASS Certified Application Security Specialist | ||
CCCI HTCN Certified Computer Crime Investigator | ||
CCDA CISCO Certified Design Associate | ||
CCDP Cisco Certified Design Professional | ||
CCFE IACRB Certified Computer Forensics Examiner | ||
CCFP (ISC)2 Certified Cyber Forensics Professional | ||
CCIE Cisco Certified Internetwork Expert | ||
CCNA Cisco Certified Network Associate | ||
CCNP Cisco Certified Network Professional | ||
CCWS IACRB Certified Windows Security Specialist | ||
CISA ISACA Certified Information Systems Auditor | ||
CWNE Certified Wireless Network Engineer | ||
CWNP Certified Wireless Network Professional | ||
EnCE Encase Certified Examiner | ||
GCED GIAC Certified Enterprise Defender | ||
GCWN GIAC Certified Windows Security Administrator | ||
GSEC GIAC Security Essentials | ||
LPIC 2 Linux Professional Institute Advanced Level | ||
LPT EC Council Licensed Penetration Tester | ||
MCSA Microsoft Certified Solutions Associate | ||
Net+ CompTIA Network+ | ||
Sec+ = CompTIA Security+ | ||
Server+ CompTIA Server+ | ||
SSCP (ISC)2 Systems Security Certified Professional | ||
|
||
|
||
* * * | ||
|
||
# TIER 3 CERTIFICATIONS | ||
|
||
A+ CompTIA A+ | ||
ACSP Apple Certified Support Professional | ||
ACTC Apple Certified Technical Coordinator | ||
C)ISSO Mile2 Certified Information Systems Security Officer | ||
C)SLE Mile2 Certified Secure Linux Engineer | ||
C)SS Mile2 Certified Security Sentinel | ||
CCENT Cisco Certified Entry Networking Technician | ||
CCT Cisco Certified Technician | ||
GISF GIAC Information Security Fundamentals | ||
IAM INFOSEC Assessment Methodology | ||
IEM INFOSEC Evaluation Methodology | ||
Linux+ CompTIA Linux+ | ||
LPIC1 Linux Professional Institute Certification Junior Level | ||
TICSA TrueSecure ICAS Certified Security | ||
VMware Vmware Certified Professional (vSphere) | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters