CISO as a Service
5.16K subscribers
4.74K photos
770 videos
1.89K files
6.99K links
Founder @ DiyakoSecureBow | CISO as a Service (vCISO)
About Me
http://about.me/Alirezaghahrood

Follow Me on
🔵LinkedIn
https://www.linkedin.com/in/AlirezaGhahrood
🔴YouTube
https://www.youtube.com/AlirezaGhahrood
X
https://twitter.com/AlirezaGhahrood
Download Telegram
The United States federal government now has a say in this. The Office of Foreign Assets Control (OFAC) of the Department of the Treasury has issued a ruling indicating that any company that pays a ransom to get their data back will be subject to fines. 


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
Learn Python the Hard Way 3rd edition.pdf
3.9 MB
LEARN PYTHON THE HARD WAY


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
What is Impacket?
Impacket is a collection of Python classes for working with network protocols. Impacket is focused on providing low-level programmatic access to the packets and for some protocols (e.g. SMB1-3 and MSRPC) the protocol implementation itself. Packets can be constructed from scratch, as well as parsed from raw data, and the object oriented API makes it simple to work with deep hierarchies of protocols. The library provides a set of tools as examples of what can be done within the context of this library.
A description of some of the tools can be found at:
https://www.secureauth.com/labs/open-source-tools/impacket

https://github.com/ptswarm/impacket


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
“When planning for cloud application development, security teams first need to work with application development groups to perform threat modeling ✌🏼👍🏽and risk assessment👍🏽👍🏽👍🏽 for the deployment types that they envision.”


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
cissp sybex practice tests.pdf
13 MB
Information Systems Security Professional
Practice Tests


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
https://www.edyoda.com/course/101


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
CompTIA CySA_ Practice Exams_ A - Dion, Jason.pdf
3.9 MB
CySA+ CS0-002 Exam q-a


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
comptia-cysa-cs0-002-exam-objectives.pdf
123.3 KB
CySA+ CS0-002 Exam Topics Notes


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
Forwarded from cissp (Alireza Ghahrood)
comptia-cysa-cs0-002-exam-objectives.pdf
123.3 KB
CySA+ CS0-002 objectives
07 Storage Reliability Technologies.pdf
4.6 MB
capacities in order to obtain a larger storage space. The RAID technologies that we will be mentioning in this module is more related towards data protection. In other words, when the physical devices fails, RAID is able to prevent the loss of data.


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
08 Common Advanced Storage Technologies.pdf
4.4 MB
 By striping the data on the hard disk to achieve block access of data, it reduces the
mechanical seek time of the drive and improves the data access speed.
 By reading the data simultaneously from few drives in the array (Parallel Access), it reduces the total mechanical seek time of the drives and improves the data access speed.
 By mirroring or parity check methods, it achieves redundant data protection in the drives.


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
ECIH Review Questions.pdf
244.2 KB
EC Council Certified Incident Handler (ECIH) v2.0 Review Questions


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
PCI_DSS.pdf
1.2 MB
Mapping PCI DSS v3.2.1 to the NIST Cybersecurity Framework v1.1


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
LinuxFormatAnnual.pdf
40.6 MB
علاقه مندان به لينوكس


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
Elastic Guide to Threat Hunting.pdf
6.9 MB
The Elastic Guide to Threat Hunting
شكار تهديدات با الستيك


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
CRISCReviewManual.pdf
6.5 MB
Introduction to IT Risk Management
The definition of risk has changed over time, and several definitions are currently in use. They ultimately convey the same meaning: risk is the combination of the probability of an event and its consequence. This definition is intentionally broad because risk is a business factor that has the potential to influence both positive and negative outcomes. In the context of IT, risk is often seen as an adverse factor that can threaten an organization’s assets or otherwise cause harm. Several factors are considered when evaluating risk, including the mission of the organization, its assets, threat and vulnerability, likelihood, and consequences (also called impact). These terms will be further explored in each of the chapters in this review manual.


‎-آگاهي رساني امنيت سايبري-

Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21