CISO as a Service
5.17K subscribers
4.74K photos
770 videos
1.89K files
6.99K links
Founder @ DiyakoSecureBow | CISO as a Service (vCISO)
About Me
http://about.me/Alirezaghahrood

Follow Me on
🔵LinkedIn
https://www.linkedin.com/in/AlirezaGhahrood
🔴YouTube
https://www.youtube.com/AlirezaGhahrood
X
https://twitter.com/AlirezaGhahrood
Download Telegram
Azure_Sentinel_UseCases_1624811276.pdf
1.3 MB
Azure Sentinel:
3 Use Cases for Threat Detection and Investigation


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.08
Media is too big
VIEW IN TELEGRAM
کاش روزی بشه که همه‌ی مشکلات جهان رو به همین راحتی حل کرد.


- 😍-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.08
اگر هدفت رسیدن به چیزی باشه که با ذاتت در تضاده،همیشه شکست می خوری.
هدفت باید این باشه که خودت باشی،که مثل خودت رفتار کنی و به نظر برسی و فکر کنی،که حقیقی ترین نسخه خودت باشی
از خودت بودن استقبال کنی.
تشویقش کنی.دوستش داشته باشی.
برای رسیدن بهش سخت تلاش کنی.
وقتی هم کسی مسخره ش می کنه یا بهش دهن کجی می کنه،محل نذاری.

شایعات بیشترشون در حقیقت حسادتن
و فقط ظاهرشون رو تغییر دادن.
سرتو بنداز پایین.استقامتت رو حفظ کن.ادامه بده


-کتابخانه نیمه شب-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.09
Learn Azure Sentinel 2020.pdf
14.3 MB
Azure sentinel


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.09
Mastering Azure Security-Book.pdf
7.1 MB
Master azure security


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.09
Beginning Security with Microsoft Technologies 2019.pdf
12.3 MB
Beginning Security with Microsoft Technologies


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.09
SANS_Quantitative_Risk_Analysis_1611885428.pdf
221 KB
Quantitative Risk Analysis Step-By-Step __________________
Copyright SANS Institute 2021.


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.09
Malware development

https://0xpat.github.io


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.09
Level Up Your Blue Team Skills
At the FREE SANS #BlueTeamSummit, enjoy two days of blue team & cyber defense talks from all around the world! Come learn the latest ways to mitigate the most recent attacks.

Register For Free:
https://www.sans.org/cyber-security-training-events/blue-team-summit-2021/

Early Bird Offer
Save $300 USD using the code "EarlyBird21" and pay for any 4-6 day course by 13 Aug 2021


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.09
فرمانده از افسر تک تیرانداز بالای برج پرسید:آیا تک تیرانداز دشمن در کارش مهارت دارد؟
افسر پاسخ داد:خیر قربان،در کارش خیلی هم ناشی است!
-پس چرا تا حالا موفق به کشتن او نشده ای؟
-میترسم او را بزنم بعدش یکی بهتر از او را بیاورند و همه ما را بکشد.بنظرم زنده بماند به نفع ماست قربان!
"و اینگونه است که کشورهای قدرتمند همواره از حضور افراد ناشایست در هدایت کشورهای ثروتمند شادمانند و حتی اگر در ظاهر بر طبل دشمنی می کوبند در باطن از ادامه حضورشان حمایت می کنند...


‎-😙-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.09
Sybex CISSP Official Study Guide 9E.pdf
15 MB
كتاب امسال🤓دوس داشتيم!


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.09
BashNotesForProfessionals.pdf
1.7 MB
Bash😙


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.09
Cyber Operations.pdf
28.1 MB
Cyber Operations
Building, Defending, and Attacking Modern Computer Networks


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.09
This media is not supported in your browser
VIEW IN TELEGRAM
(گوته)
نیاسایید،
زندگی در گذر است؛
بروید و دلیری کنید،
و پیش از آنکه بمیرید چیزی نیرومند و متعالی از خود بجای گذارید تا بر زمان چیره شوید.

پ ن:
انسان نباید بیندیشد که بهتر از دیگران هست یا نیست ، بلکه باید بیندیشد که می‌تواند بهتر از آن چیزی که خودش هست باشد ! هر کسی شایسته بهتر بودن نسبت به خودش است ...


-🙂-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.09
GitHub has launched a new AI-powered code completion tool — Copilot — to help software developers write better code in a variety of programming languages, including Python, #JavaScript, TypeScript, Ruby, and Go.
Read details: https://thehackernews.com/2021/06/github-launches-copilot-ai-powered-code.html


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.09
اقاي رئيس جمهور
خيلي از آرزو هاي نسل جوان و سوخته اين خاك به واسطه
عدم مديريت مسولين به دست باد رفته، دروغ چرا در ٤٢ سال اخير
رويه رو به رشدي با محوريت رفاه مردم وعدالت ….
بصورت كلي ديده نشده حداقل از سمت جمعيتي!
حداقل با روح و روان و شعور!!!! ملت بازي نكنيد!!!

موج پله پله اوج ميگيرد🥸

يكي از مهمترين كارهاي شما
در ابتداي دولت!
زدن تو دهني با شدت زياد
بر دهان …… گوياني است
كه با جان، مال، عقيده، اعتقاد، عمر،….. ملت ايران در حال گيم هستند!


‎-آگاهي-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.09
🔥 Researchers publish a proof-of-concept exploit for a critical vulnerability (CVE-2021-1675) affecting Microsoft Windows operating systems
Details — https://thehackernews.com/2021/06/researchers-leak-poc-exploit-for.html

International law enforcement agencies seized the domain, servers and logs of the Russia-based DoubleVPN service for providing a safe haven for cybercriminals to cover their tracks.
Read: https://thehackernews.com/2021/06/authorities-seize-doublevpn-service.html


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.10
5.1.3 Log Security
Infrastructure and system-level administrators need to protect the integrity and availability of log data, and often protect its confidentiality as well. Section 5.1.2 describes log storage and archival practices, which support availability. Additional security considerations for securing logs on systems, in storage, and in transit include the following:
Limit access to log files. Users should not have any access to most log files unless some level of access is necessary for creating log entries. If so, users should have append-only privileges and no read access if possible. Users should not be able to rename, delete, or perform other file-level operations on log files.
Avoid recording unneeded sensitive data. Some logs may record sensitive data, such as passwords, that does not need to be logged. When feasible, logging should be configured not to record information that is not required and would present a substantial risk if accessed by unauthorized parties.
Protect archived log files. This could include creating and securing message digests for the files, encrypting log files, and providing adequate physical protection for archival media.
Secure the processes that generate the log entries. Unauthorized parties should not be able to manipulate log source processes, executable files, configuration files, or other components of the log sources that could impact logging.
Configure each log source to behave appropriately when logging errors occur. For example, logging might be considered so important for a particular log source that the log source should be configured to suspend its functionality completely when logging fails. Another example is handling full log files, as described in Section 5.1.2.
Implement secure mechanisms for transporting log data from the system to the centralized log management servers, if such protection is needed and not provided automatically by the log management infrastructure. Many transport protocols, such as FTP and Hypertext Transfer Protocol (HTTP), do not provide protection. An administrator might need to upgrade a system’s logging software to a version that has additional security features, or to encrypt the logging communications through a separate protocol such as Internet Protocol Security (IPsec) or SSL.


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.10