The United States federal government now has a say in this. The Office of Foreign Assets Control (OFAC) of the Department of the Treasury has issued a ruling indicating that any company that pays a ransom to get their data back will be subject to fines.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
Learn Python the Hard Way 3rd edition.pdf
3.9 MB
LEARN PYTHON THE HARD WAY
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
What is Impacket?
Impacket is a collection of Python classes for working with network protocols. Impacket is focused on providing low-level programmatic access to the packets and for some protocols (e.g. SMB1-3 and MSRPC) the protocol implementation itself. Packets can be constructed from scratch, as well as parsed from raw data, and the object oriented API makes it simple to work with deep hierarchies of protocols. The library provides a set of tools as examples of what can be done within the context of this library.
A description of some of the tools can be found at:
https://www.secureauth.com/labs/open-source-tools/impacket
https://github.com/ptswarm/impacket
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
Impacket is a collection of Python classes for working with network protocols. Impacket is focused on providing low-level programmatic access to the packets and for some protocols (e.g. SMB1-3 and MSRPC) the protocol implementation itself. Packets can be constructed from scratch, as well as parsed from raw data, and the object oriented API makes it simple to work with deep hierarchies of protocols. The library provides a set of tools as examples of what can be done within the context of this library.
A description of some of the tools can be found at:
https://www.secureauth.com/labs/open-source-tools/impacket
https://github.com/ptswarm/impacket
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
SecureAuth
Resource Hub
Explore SecureAuth's resources to learn more about better workforce and customer identity and access management.
“When planning for cloud application development, security teams first need to work with application development groups to perform threat modeling ✌🏼👍🏽and risk assessment👍🏽👍🏽👍🏽 for the deployment types that they envision.”
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
cissp sybex practice tests.pdf
13 MB
Information Systems Security Professional
Practice Tests
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
Practice Tests
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
https://www.edyoda.com/course/101
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
CompTIA CySA_ Practice Exams_ A - Dion, Jason.pdf
3.9 MB
CySA+ CS0-002 Exam q-a
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
comptia-cysa-cs0-002-exam-objectives.pdf
123.3 KB
CySA+ CS0-002 Exam Topics Notes
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
Forwarded from cissp (Alireza Ghahrood)
comptia-cysa-cs0-002-exam-objectives.pdf
123.3 KB
CySA+ CS0-002 objectives
https://github.com/austinsonger/Incident-Playbook
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
GitHub
GitHub - austinsonger/Incident-Playbook: GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors…
GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly] - austinsonger/Incident-Playbook
https://github.com/CyberSecurityUP/Awesome-Cloud-PenTest
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
GitHub
GitHub - CyberSecurityUP/Awesome-Cloud-PenTest
Contribute to CyberSecurityUP/Awesome-Cloud-PenTest development by creating an account on GitHub.
https://proxyscrape.com/free-proxy-list
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
ProxyScrape
📄 Free Proxy List - Updated every 5 minutes
Free HTTP, Socks4 and Socks5 proxies. Download all available working proxies on the internet in these proxy lists in no time! Proxies Updated every 5 minutes.
07 Storage Reliability Technologies.pdf
4.6 MB
capacities in order to obtain a larger storage space. The RAID technologies that we will be mentioning in this module is more related towards data protection. In other words, when the physical devices fails, RAID is able to prevent the loss of data.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
08 Common Advanced Storage Technologies.pdf
4.4 MB
By striping the data on the hard disk to achieve block access of data, it reduces the
mechanical seek time of the drive and improves the data access speed.
By reading the data simultaneously from few drives in the array (Parallel Access), it reduces the total mechanical seek time of the drives and improves the data access speed.
By mirroring or parity check methods, it achieves redundant data protection in the drives.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
mechanical seek time of the drive and improves the data access speed.
By reading the data simultaneously from few drives in the array (Parallel Access), it reduces the total mechanical seek time of the drives and improves the data access speed.
By mirroring or parity check methods, it achieves redundant data protection in the drives.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
ECIH Review Questions.pdf
244.2 KB
EC Council Certified Incident Handler (ECIH) v2.0 Review Questions
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
PCI_DSS.pdf
1.2 MB
Mapping PCI DSS v3.2.1 to the NIST Cybersecurity Framework v1.1
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
LinuxFormatAnnual.pdf
40.6 MB
علاقه مندان به لينوكس
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
Elastic Guide to Threat Hunting.pdf
6.9 MB
The Elastic Guide to Threat Hunting
شكار تهديدات با الستيك
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
شكار تهديدات با الستيك
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
Found a good source for questions -cissp
https://www.examtopics.com/exams/isc/cissp/view/
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
https://www.examtopics.com/exams/isc/cissp/view/
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
Examtopics
CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
Free, Actual and Latest Practice Test for those who are preparing for Certified Information Systems Security Professional
.
.
CRISCReviewManual.pdf
6.5 MB
Introduction to IT Risk Management
The definition of risk has changed over time, and several definitions are currently in use. They ultimately convey the same meaning: risk is the combination of the probability of an event and its consequence. This definition is intentionally broad because risk is a business factor that has the potential to influence both positive and negative outcomes. In the context of IT, risk is often seen as an adverse factor that can threaten an organization’s assets or otherwise cause harm. Several factors are considered when evaluating risk, including the mission of the organization, its assets, threat and vulnerability, likelihood, and consequences (also called impact). These terms will be further explored in each of the chapters in this review manual.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
The definition of risk has changed over time, and several definitions are currently in use. They ultimately convey the same meaning: risk is the combination of the probability of an event and its consequence. This definition is intentionally broad because risk is a business factor that has the potential to influence both positive and negative outcomes. In the context of IT, risk is often seen as an adverse factor that can threaten an organization’s assets or otherwise cause harm. Several factors are considered when evaluating risk, including the mission of the organization, its assets, threat and vulnerability, likelihood, and consequences (also called impact). These terms will be further explored in each of the chapters in this review manual.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21