comptia-cysa-cs0-002-exam-objectives.pdf
123.3 KB
CySA+ CS0-002 Exam Topics Notes
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.20
Forwarded from cissp (Alireza Ghahrood)
comptia-cysa-cs0-002-exam-objectives.pdf
123.3 KB
CySA+ CS0-002 objectives
https://github.com/austinsonger/Incident-Playbook
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
GitHub
GitHub - austinsonger/Incident-Playbook: GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors…
GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly] - austinsonger/Incident-Playbook
https://github.com/CyberSecurityUP/Awesome-Cloud-PenTest
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
GitHub
GitHub - CyberSecurityUP/Awesome-Cloud-PenTest
Contribute to CyberSecurityUP/Awesome-Cloud-PenTest development by creating an account on GitHub.
https://proxyscrape.com/free-proxy-list
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
ProxyScrape
📄 Free Proxy List - Updated every 5 minutes
Free HTTP, Socks4 and Socks5 proxies. Download all available working proxies on the internet in these proxy lists in no time! Proxies Updated every 5 minutes.
07 Storage Reliability Technologies.pdf
4.6 MB
capacities in order to obtain a larger storage space. The RAID technologies that we will be mentioning in this module is more related towards data protection. In other words, when the physical devices fails, RAID is able to prevent the loss of data.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
08 Common Advanced Storage Technologies.pdf
4.4 MB
By striping the data on the hard disk to achieve block access of data, it reduces the
mechanical seek time of the drive and improves the data access speed.
By reading the data simultaneously from few drives in the array (Parallel Access), it reduces the total mechanical seek time of the drives and improves the data access speed.
By mirroring or parity check methods, it achieves redundant data protection in the drives.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
mechanical seek time of the drive and improves the data access speed.
By reading the data simultaneously from few drives in the array (Parallel Access), it reduces the total mechanical seek time of the drives and improves the data access speed.
By mirroring or parity check methods, it achieves redundant data protection in the drives.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
ECIH Review Questions.pdf
244.2 KB
EC Council Certified Incident Handler (ECIH) v2.0 Review Questions
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
PCI_DSS.pdf
1.2 MB
Mapping PCI DSS v3.2.1 to the NIST Cybersecurity Framework v1.1
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
LinuxFormatAnnual.pdf
40.6 MB
علاقه مندان به لينوكس
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
Elastic Guide to Threat Hunting.pdf
6.9 MB
The Elastic Guide to Threat Hunting
شكار تهديدات با الستيك
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
شكار تهديدات با الستيك
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
Found a good source for questions -cissp
https://www.examtopics.com/exams/isc/cissp/view/
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
https://www.examtopics.com/exams/isc/cissp/view/
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
Examtopics
CISSP Exam - Free Actual Q&As, Page 1 | ExamTopics
Free, Actual and Latest Practice Test for those who are preparing for Certified Information Systems Security Professional
.
.
CRISCReviewManual.pdf
6.5 MB
Introduction to IT Risk Management
The definition of risk has changed over time, and several definitions are currently in use. They ultimately convey the same meaning: risk is the combination of the probability of an event and its consequence. This definition is intentionally broad because risk is a business factor that has the potential to influence both positive and negative outcomes. In the context of IT, risk is often seen as an adverse factor that can threaten an organization’s assets or otherwise cause harm. Several factors are considered when evaluating risk, including the mission of the organization, its assets, threat and vulnerability, likelihood, and consequences (also called impact). These terms will be further explored in each of the chapters in this review manual.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
The definition of risk has changed over time, and several definitions are currently in use. They ultimately convey the same meaning: risk is the combination of the probability of an event and its consequence. This definition is intentionally broad because risk is a business factor that has the potential to influence both positive and negative outcomes. In the context of IT, risk is often seen as an adverse factor that can threaten an organization’s assets or otherwise cause harm. Several factors are considered when evaluating risk, including the mission of the organization, its assets, threat and vulnerability, likelihood, and consequences (also called impact). These terms will be further explored in each of the chapters in this review manual.
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
CISO Role_1555720684.pdf
399.6 KB
Ciso role
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
CISM QA.pdf
24.3 MB
نمونه سوالات cism - isaca
مدير امنيت
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
مدير امنيت
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
https://socprime.com/en/blog/zoom-service-hardening-guide/
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
SOC Prime
Zoom Service Hardening Guide | SOC Prime
A practical guide to hardening the service hinged on Zoom and CheckPoint recommendations; usable SIEM content based on Zoom reports available over API, proxy logs and workstation logs
Cyber Intelligence Tradecraft Report: The State of Cyber Intelligence Practices in the United States (Study Report and Implementation Guides)
راهنماي جامع و ارزشمند
https://resources.sei.cmu.edu/library/asset-view.cfm?assetID=546578
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
راهنماي جامع و ارزشمند
https://resources.sei.cmu.edu/library/asset-view.cfm?assetID=546578
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
SEI Digital Library
Cyber Intelligence Tradecraft Report: The State of Cyber Intelligence Practices in the United States (Study Report and Implementation…
This report details the findings of a study the SEI conducted at the request of the United States Office of the Director of National Intelligence. In the report, we present current best practices and common challenges in cyber intelligence.
Sample-CISSP-Student-Guide.pdf
2.5 MB
چكيده رسمي
دوره
C i s s p
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
دوره
C i s s p
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
casp_comptia_advanced_security_practitioner.pdf
22.6 MB
متخصص امنيت پيشرفته
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
Blue Team Cheatsheet.pdf
13.2 MB
كتابچه كاربردي امنيت دفاع سايبري، مختص تيم هاي آبي و اعضاي مراكز عمليات امنيت سايبري
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
-آگاهي رساني امنيت سايبري-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
برای فریب دادن
عدهای را شیر میکنند و
عدهای را خر...
مواظب باشید حیوان صفت نشوید،
بازنده، بازنده است چه درنده چه چرنده.
-🥸-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21
عدهای را شیر میکنند و
عدهای را خر...
مواظب باشید حیوان صفت نشوید،
بازنده، بازنده است چه درنده چه چرنده.
-🥸-
Up2date 4 Defence Today,
Secure Tomorrow
@CisoasaService
1400.04.21