SC-900: Microsoft Security, Compliance, and Identity Fundamentals Microsoft Official Practice Test
https://lnkd.in/d62RhNW
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
https://lnkd.in/d62RhNW
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
lnkd.in
LinkedIn
This link will take you to a page that’s not on LinkedIn
گاهی آدم باید اونقدر خوب باشه که ببخشه، اما اونقدر احمق نباشه که دوباره اعتماد کنه!
-🤲🏻-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
-🤲🏻-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
لیستی از مجموعه خشونت هایی که در زمان ازدواج در حق زنان میشه
-🥸-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
-🥸-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
در صورت درگيري با ويروس كرونا، از دست دادن كار و …
قيمت امتحانات بين المللي مايكروسافت با هر قيمتي
صرفا ١٥$ با شرايط و زمان محدود🙃
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
قيمت امتحانات بين المللي مايكروسافت با هر قيمتي
صرفا ١٥$ با شرايط و زمان محدود🙃
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.12
https://pythonforcybersecurity.com/courses/python3-for-infosec-professionals/
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
Microsoft_Incident_Response_Playbook_1625239159.pdf
440.6 KB
response playbook: Phishing investigation ,…. Of microsoft
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
During a supply-chain attack, hackers compromised the website of Mongolian Certificate Authority and replaced legitimate MonPass CA client software with a backdoored version to distribute malware.😀😀
Details: https://thehackernews.com/2021/07/mongolian-certificate-authority-hacked.html
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
Details: https://thehackernews.com/2021/07/mongolian-certificate-authority-hacked.html
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
This media is not supported in your browser
VIEW IN TELEGRAM
شما یادتون نمیاد ولی ما ساعتها به این خیره میشدیم😂
-😙-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
-😙-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
Security_AWS_Cloud_1625220749.pdf
21.5 MB
Practical Guide to
AWS Cloud Security
Security in the AWS Cloud
به شدت كاربردي👍🏽
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
AWS Cloud Security
Security in the AWS Cloud
به شدت كاربردي👍🏽
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
“Companies using on-premises environments have been leveraging DevOps processes to create close coordination between the developers, who create new applications, and operations, which provides the virtual machines they run on. The cloud brings a whole host of services to automate all aspects of the infrastructure deployment and management that on-premises services are unable to match.”
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
EWhy a Framework?
Regardless of the existing level of operations maturity, security teams face common needs:
• Adapting to changing business demands and evolving threats
• Obtaining management support for necessary resources and changes in IT or other areas
• Demonstrating improvement and providing risk assessment and forecasting
• Reducing the burden of satisfying auditors that security operations are compliant
A security framework, with its recommended set of security processes and controls, along with a risk assessment and management approach to match the appropriate set of controls to the business and threat environment, is an efficient way to meet these needs. Using an established framework can take the guesswork out of the process for smaller organizations, while allowing larger and more mature security operations to justify their decisions and resource requests to management and auditors
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
Regardless of the existing level of operations maturity, security teams face common needs:
• Adapting to changing business demands and evolving threats
• Obtaining management support for necessary resources and changes in IT or other areas
• Demonstrating improvement and providing risk assessment and forecasting
• Reducing the burden of satisfying auditors that security operations are compliant
A security framework, with its recommended set of security processes and controls, along with a risk assessment and management approach to match the appropriate set of controls to the business and threat environment, is an efficient way to meet these needs. Using an established framework can take the guesswork out of the process for smaller organizations, while allowing larger and more mature security operations to justify their decisions and resource requests to management and auditors
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
1. Which of the following is concerned with policy and direction?
a) Capacity management
b) Governance
c) Service design
d) Service level management
2.Software and technology are examples of which of the four Ps?
a) Processes
b) Performance
c) Products
d) Partners
03. Who normally chairs a change advisory board (CAB)?
a) Change initiator
b) Service owner
c) Change manager
d) Business relationship manager
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
a) Capacity management
b) Governance
c) Service design
d) Service level management
2.Software and technology are examples of which of the four Ps?
a) Processes
b) Performance
c) Products
d) Partners
03. Who normally chairs a change advisory board (CAB)?
a) Change initiator
b) Service owner
c) Change manager
d) Business relationship manager
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
04. Which process will regularly analyze incident data to identify discernable trends?
a) Service level management
b) Problem management
c) Change management
d) Event management
05. What is the MAIN reason for a service provider to understand the five aspects of service design?
a) To prevent security breaches in mission critical services
b) To ensure a holistic, results-driven approach
c) To allow service design to cut costs
d) To prevent breaches of service level agreements (SLAs)
06. Which three are the characteristics of ITIL guidance that help to make it successful?
a) Prescriptive, best practice and solution specific
b) Publicly available, prescriptive and best practice
c) Vendor neutral, non-prescriptive and best practice
d) Publicly available, solution specific and vendor neutral
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
a) Service level management
b) Problem management
c) Change management
d) Event management
05. What is the MAIN reason for a service provider to understand the five aspects of service design?
a) To prevent security breaches in mission critical services
b) To ensure a holistic, results-driven approach
c) To allow service design to cut costs
d) To prevent breaches of service level agreements (SLAs)
06. Which three are the characteristics of ITIL guidance that help to make it successful?
a) Prescriptive, best practice and solution specific
b) Publicly available, prescriptive and best practice
c) Vendor neutral, non-prescriptive and best practice
d) Publicly available, solution specific and vendor neutral
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
07. A significant, unresolved problem is likely to cause major business disruption. Where is this MOST LIKELY to be escalated to?
a) IT service continuity management
b) Availability management
c) Incident management
d) Change management
08. Which is the BEST description of a service request?
a) A request from a user for information, advice or for a standard change
b) Anything that the customer wants and is prepared to pay for
c) Any request or demand that is entered by a user via a self-help web-based interface
d) Any request for change (RFC) that is low-risk and which can be approved by the change manager without a change advisory board (CAB) meeting
09. Which is an objective of service transition?
a) To negotiate service levels for new services
b) To ensure that service changes create the expected business value
c) To reduce the impact of business critical service outages on key services
d) To plan and manage entries in the service catalogue
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
a) IT service continuity management
b) Availability management
c) Incident management
d) Change management
08. Which is the BEST description of a service request?
a) A request from a user for information, advice or for a standard change
b) Anything that the customer wants and is prepared to pay for
c) Any request or demand that is entered by a user via a self-help web-based interface
d) Any request for change (RFC) that is low-risk and which can be approved by the change manager without a change advisory board (CAB) meeting
09. Which is an objective of service transition?
a) To negotiate service levels for new services
b) To ensure that service changes create the expected business value
c) To reduce the impact of business critical service outages on key services
d) To plan and manage entries in the service catalogue
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
https://www.udemy.com/course/practical-ethical-hacking-for-beginners/?couponCode=4JULYFREE
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
Printnightmare All Techniques and Mitre Att&ck Map by Joas
Active Directory: https://lnkd.in/eCvqMNR
Windows Server 2016: https://lnkd.in/ePpbNZc
PoC Printnightmare: https://lnkd.in/eQB4HAS
ACLs Fix Printnightmare: https://lnkd.in/e_kr5Sz
Windows 10 PoC 1: https://lnkd.in/ejxBm-Y
Windows 10 PoC 2: https://lnkd.in/eyBYXMH
Windows 10 PoC 3: https://lnkd.in/e44Kfub
Windows Server 2019: https://lnkd.in/e3wxgyB
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
Active Directory: https://lnkd.in/eCvqMNR
Windows Server 2016: https://lnkd.in/ePpbNZc
PoC Printnightmare: https://lnkd.in/eQB4HAS
ACLs Fix Printnightmare: https://lnkd.in/e_kr5Sz
Windows 10 PoC 1: https://lnkd.in/ejxBm-Y
Windows 10 PoC 2: https://lnkd.in/eyBYXMH
Windows 10 PoC 3: https://lnkd.in/e44Kfub
Windows Server 2019: https://lnkd.in/e3wxgyB
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.13
lnkd.in
LinkedIn
This link will take you to a page that’s not on LinkedIn
هرشب
بعد از خارج شدن از محل كار
زیر شانههای وطنم را میگیرم
دستش را تکیه میدهم
به کمرگاه صخرهای در کوهستان
همين حوالي
و باهم
نقشهء فرار میکشیم
-!ندارد-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
بعد از خارج شدن از محل كار
زیر شانههای وطنم را میگیرم
دستش را تکیه میدهم
به کمرگاه صخرهای در کوهستان
همين حوالي
و باهم
نقشهء فرار میکشیم
-!ندارد-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
TCP_IP_for_beginners.pdf
11.7 MB
Tech book
"TCP/IP Protocol, for beginners:
The Ultimate Beginner's Guide to Learn TCP/IP protocol Step by Step", 2021.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
"TCP/IP Protocol, for beginners:
The Ultimate Beginner's Guide to Learn TCP/IP protocol Step by Step", 2021.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
MTK6765 Bootrom protection and unlocked password protection
https://github.com/MTK-bypass/bypass_utility
Aggressive compile-time optimizations for JavaScript via dynamic symbolic VM execution
https://github.com/undefinedbuddy/optimizr
Threat Research👍🏽
Kaseya supply‑chain attack
https://www.welivesecurity.com/2021/07/03/kaseya-supply-chain-attack-what-we-know-so-far
Red Team Tactics
1. Inconsistent Behavior of Go's CGI and FastCGI Transport May Lead to XSS...
https://www.redteam-pentesting.de/de/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
2. IDOR (Insecure Direct Object References)
https://medium.com/@aysebilgegunduz/everything-you-need-to-know-about-idor-insecure-direct-object-references-375f83e03a87
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
https://github.com/MTK-bypass/bypass_utility
Aggressive compile-time optimizations for JavaScript via dynamic symbolic VM execution
https://github.com/undefinedbuddy/optimizr
Threat Research👍🏽
Kaseya supply‑chain attack
https://www.welivesecurity.com/2021/07/03/kaseya-supply-chain-attack-what-we-know-so-far
Red Team Tactics
1. Inconsistent Behavior of Go's CGI and FastCGI Transport May Lead to XSS...
https://www.redteam-pentesting.de/de/advisories/rt-sa-2020-004/-inconsistent-behavior-of-gos-cgi-and-fastcgi-transport-may-lead-to-cross-site-scripting
2. IDOR (Insecure Direct Object References)
https://medium.com/@aysebilgegunduz/everything-you-need-to-know-about-idor-insecure-direct-object-references-375f83e03a87
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
GitHub
GitHub - MTK-bypass/bypass_utility
Contribute to MTK-bypass/bypass_utility development by creating an account on GitHub.
آينده از آن، هوش مصنوعي و يادگيري ماشين هست، با توجه به حملات عجيب و غريب و زير و دي و منفي دي😜شما براي اين ترند چه طرح هاي در آتي در دستور كار داريد.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.14