Toggle navigation
[日本語]
Login
Toggle navigation
Vulnerability Information
Vulnerability Search
JVN Vulnerability Search
NVD Vulnerability Search
CPE検索
List of CWE
Software Information
All
Operating Systems
Web Server
Database
Other Middleware
Programming language
Framework
CMS
Encryption
Virtualization
System Management Tool
Version Update History
Support Expiration Information
Information gathering
Provide Information Site
CheatSheet
Response Header
Directory Traversal
Network related
Information about Port numbers
Protocol Information
Tools
Check Access Source Information
Generate Password
HTML Escape
URL Encode・Decoding
Base64 Encode・Decoding
Numeric Character Reference Encoding・Decoding
About Secualive
Provide Information Site
Select Genre
All
media_news
security_company
tool
blog
organization
convenient_service
conference
ctf_bug_bounty
Low
framework
vulnerable_site
wordpress
proxy
tamper_detect
vulnerability_notification_site
firewall
Security Advisary
Document
Education,Training
Cloud Security Posture Management
Information Site Top
->
Document
This is a collection of sites about security.
The order is alphabetical.
Show Search Menu
URL
Name
Language
Number of items displayed
100
200
300
Add Tag
---------
News
Web Audit
Network Audit
Major
Tools
Foreign Country
Organization
Company
Celebrated Person
School
Government
Hacking
CMS
WordPress
Source Code Audit
Game Audit
Smartphone Audit
IoT Audit
Consulting
CTF
Qualifications
WAF
Education
Manipulation Detection
Endpoint Detection and Response(EDR)
Mail
Incident Response
Blog
Forensic
File Transfer
FW Audit
Pentest
E-Learning
Create Development Guidelines
Security enhancement support
Requirements Consulting
WAF Installation Support
Security Advisor
WordPress Security Enhancement
EC-CUBE Security Enhancement Support
Automatic Audit tools
System Development
Targeted Email Attack Training
Manipulation Detection
Windows
Linux/Unix
Mac OS
Open Source
Bug Bounty
SIEM
Vulnerability Management
Log Management
SOC
Hardware Audit
Android Application
Information Provision
Mail Security
Cloud Security
Database Audit
Support for PCIDSS
Building CSIRTs
Android
iOS
AWS
Open Source
Cheetsheet
Exploit
Cloud
Incorporated association
Automotive Audit
Virtual Currency Audit
Anti-tampering Audit
Smartphone App Development
Wireless LAN Audit
APT Attack Resistance Audit
Malware Audit
Building Active Directory
Secure app development environment
Website Malware Scan
Sandbox
ERP Security
Infra Security
Social engineering
MITB measures
Fraud Prediction Detection
SDK Development Kit
Countermeasures against malicious sites
FW Management
IDS/IPS Management
Active Directory Audit
Server Configuration Audit
Backup Service
DDos protection
Open Source Risk Detection
Database encryption
POS security
Blockchain Security
File Transfers
DNS security
Privacy Mark
Managed Security Service Provider (MSSP)
Managed Detection and Response (MDR)
Backups
Security Advisories
Antivirus software
Japan Corporation
Microsoft
Anti-virus software verification service
Documents
DevSecOps
OSS Security Detection
0Day Defense
RASP(Runtime Application Self Protection)
CDN
Data management and protection
Salesforce security Audit
IaaS Audit
Microsoft365 Audit
SaaS Audit
Sngle sign-on
Support for internalization of audit
Endpoint Audit
Monitoring
GDPR compliance
Cyber Security for Medical Institutions
Cyber Security Exercise
Antiphishing
ISO27001
Threat Intelligence
Law
IP address research
Fuzzing
Git
Google
Site Information Gathering
Malware and ransomware support
Server Robustness Support
AI
Vulnerability assessment Design document review
Physical Security
VOIP Audit
RedTeam
Wifi Audit
IPv6 Audit
Host Security Audit
Support for building a remote work environment
Ransomware resistance check
Wiretap and spy camera investigation
Performance survey
Support for acquisition of ISMS certification
Cyber Risk Management
Embedded Device Assessment
Insider Threat Assessment
Remote Security Assessment
Penetration Testing for Internal Attacks
AWS
AZUL
GCP
CSPM(Cloud Security Posture Management)
MISP
Internal information leakage countermeasures
System config and Management Support
Product Assessment
OSINT
1 / 1 - 合計 : 25
Document
No
Image
Name
URL
Description
Tag
1
AWS Cloud Practitioner Essentials (Second Edition) (Japanese)
https://www.aws.training/Details/Curriculum?id=34408
This is a site where you can learn the basics of AWS for free.sss
Japanese
Education
Information Provision
AWS
Cloud
Documents
2
AWS Well-Architected Framework
https://wa.aws.amazon.com/index.ja.html
Japanese
Education
Information Provision
AWS
Cloud
Documents
3
CSIRT人材の定義と確保
https://www.nca.gr.jp/activity/imgs/recruit-hr20170313.pdf
Japanese
Education
Incident Response
Information Provision
Building CSIRTs
Documents
4
Katacoda
https://www.katacoda.com/
This is an online learning site provided by O'Reilly.sss
English
Foreign Country
Education
Information Provision
Documents
5
Linux Cheat Sheet
https://assets.hongkiat.com/uploads/cheatsheet-wallpapers-for-designers-developers/original/linux-wallpaper.jpg
This is a list of frequently used commands in Linux.sss
English
Education
Linux/Unix
Information Provision
Cheetsheet
Documents
6
Standard Textbook for Linux Server Construction
https://linuc.org/textbooks/server/
Japanese
Qualifications
Education
Linux/Unix
Information Provision
Documents
7
Linux Security Standard Textbook
https://linuc.org/textbooks/security/
Japanese
Qualifications
Education
Linux/Unix
Information Provision
Documents
8
Linux Standard Textbook
https://linuc.org/textbooks/linux/
Japanese
Qualifications
Education
Linux/Unix
Information Provision
Documents
9
Microsoft Azure Well-Architected Framework
https://docs.microsoft.com/ja-jp/azure/architecture/framework/
Japanese
Education
Information Provision
Cloud
Microsoft
Documents
10
Microsoft Learn
https://docs.microsoft.com/ja-jp/learn/
This is a site where you can learn about Microsoft's Azure, .NET and more for free.sss
Japanese
Education
Information Provision
Microsoft
Documents
11
Owasp Top 10 2021
https://owasp.org/Top10/ja/
This is the 2021 edition of the top 10 most important security issues published by Owasp.sss
Japanese
News
Foreign Country
Education
Information Provision
Documents
12
Owasp Web Security Testing Guide
https://owasp.org/www-project-web-security-testing-guide/
This document provides a summary of security testing methods for web applications.sss
English
Web Audit
Major
Foreign Country
Education
Cheetsheet
Documents
13
インシデントハンドリングマニュアル
https://www.jpcert.or.jp/csirt_material/files/manual_ver1.0_20151126.pdf
Japanese
Education
Incident Response
Information Provision
Building CSIRTs
Documents
14
Open Source Database Standard Textbook - PostgreSQL
https://oss-db.jp/ossdbtext
Japanese
Qualifications
Education
Information Provision
Documents
15
Cloud Computing Overview and Recommendations
https://www.ipa.go.jp/files/000025367.pdf
Japanese
Information Provision
Cloud Security
Cloud
Documents
16
コンピュータセキュリティ インシデント対応ガイド
https://www.ipa.go.jp/files/000025341.pdf
Japanese
Education
Incident Response
Information Provision
Building CSIRTs
Documents
17
Textbook for Security Response Organizations (SOC/CSIRT)
https://isog-j.org/output/2017/Textbook_soc-csirt_v2.1.pdf
Japanese
Organization
SOC
Information Provision
Documents
18
Vulnerability Response Guide for Security Professionals
https://www.ipa.go.jp/files/000058493.pdf
Japanese
Organization
Information Provision
Documents
19
SOC Construction and Operation Guidelines for the Zero Trust Era
https://www.lac.co.jp/lacwatch/report/20210317_002460.html
LAC and Microsoft Japan jointly create "SOC Construction and Operation Guidelines for the Zero Trust Era" as guidelines for collecting and analyzing information based on the Zero Trust IT infrastructure. Excerpted from [https://www.lac.co.jp/lacwatch/report/20210317_002460.html]sss
Japanese
SOC
Information Provision
Microsoft
Documents
20
Guide to Conducting Risk Assessment
https://www.ipa.go.jp/files/000025325.pdf
Japanese
Organization
Information Provision
Documents
21
Guidelines for Information Security Measures for Small and Medium Enterprises
https://www.ipa.go.jp/security/keihatsu/sme/guideline/
The "Guidelines for Information Security Measures for Small and Medium-sized Enterprises" (hereinafter referred to as "the Guidelines") summarizes (1) the guidelines that should be recognized and implemented by the management and (2) the procedures and methods for implementing the measures in the company when taking information security measures. It consists of a management chapter and a practical chapter, and is intended for use by small and medium-sized enterprises (hereinafter referred to as "SMEs"), including sole proprietors and small businesses. Excerpt from [https://www.ipa.go.jp/security/keihatsu/sme/guideline/]sss
Japanese
Organization
Information Provision
Documents
22
10 Major Threats to Information Security 2020
https://www.ipa.go.jp/security/vuln/10threats2020.html
Japanese
Organization
Information Provision
Documents
23
How to effectively implement vulnerability countermeasures (using tools)
https://www.ipa.go.jp/files/000071584.pdf
He explains how to use Vuls to prevent vulnerabilities.sss
Japanese
Organization
Information Provision
Documents
24
Vulnerability Assessor Skill Map Project
https://wiki.owasp.org/index.php/Pentester_Skillmap_Project_JP
Japanese
Web Audit
Organization
Education
Pentest
Documents
25
Standard Textbook for Building High-Reliability Systems - Virtualization and High Availability
https://linuc.org/textbooks/system/
Japanese
Qualifications
Education
Linux/Unix
Information Provision
Documents
1 / 1 - 合計 : 25
×
Display Dashboard Setting
The selected informational sites can be displayed on the dashboard.
You can easily access them from your dashboard by selecting the sites you are interested in.
×