Roozbeh Noroozi

Roozbeh Noroozi

CISSP(#403042), PMP(#1722779), ECSA, CEH,COBIT

View articles by Roozbeh Noroozi

کاهش شدید قدرت استدلال دانش آموزان و آینده امنیت سایبری ایران

کاهش شدید قدرت استدلال دانش آموزان و آینده…

January 4, 2025

23 likes2 comments

Hunting APT with Syscall monitoring: Real Scenario

Hunting APT with Syscall monitoring: Real…

December 8, 2024

39 likes3 comments

CISO and Fear, Uncertainty, and Doubt (FUD) cycle

CISO and Fear, Uncertainty, and Doubt (FUD)…

November 26, 2024

14 likes

Building a Holistic Security Architecture with BMIS and COBIT

Building a Holistic Security Architecture…

November 24, 2024

16 likes2 comments

Understanding Risk Appetite and Tolerance in Cyber Threat Hunting

Understanding Risk Appetite and Tolerance in…

November 18, 2024

11 likes

Deep dive into data: Unstructured threat hunting using data mining techniques and python

Deep dive into data: Unstructured threat…

November 17, 2024

21 likes

Why as an ISSMP we do not measure SOC performance by threat hunting ?

Why as an ISSMP we do not measure SOC…

November 16, 2024

16 likes

Advise to do Threat hunting as a CISSP

Advise to do Threat hunting as a CISSP

November 15, 2024

19 likes

key factors in designing systems that process sensitive data as an ISSMP

key factors in designing systems that…

November 13, 2024

14 likes

How ISSMP use PMP (PMBOK)

How ISSMP use PMP (PMBOK)

November 12, 2024

11 likes

Key Steps for an ISSMP to Effectively Leverage RFIs in CTI

Key Steps for an ISSMP to Effectively…

November 10, 2024

12 likes

Conducting a Privacy Impact Assessment (PIA) as an ISSMP

Conducting a Privacy Impact Assessment (PIA)…

November 10, 2024

12 likes

What is the meaning of high-water measurement of impact in ISSMP content ?

What is the meaning of high-water…

November 9, 2024

2 likes

Real example of detecting APTs by NetFlow

Real example of detecting APTs by NetFlow

November 8, 2024

15 likes

Managing DNS Over HTTPS (DoH) and DNS Over TLS (DoT) Traffic as a SOC Analyst

Managing DNS Over HTTPS (DoH) and DNS Over…

November 8, 2024

22 likes

Defining and Creating a Security Master Plan (SMP) as an Information Systems Security Manager Professional (ISSMP)

Defining and Creating a Security Master Plan…

November 8, 2024

19 likes

The Role of Security Operations (SecOps) in Detecting and Defending Against APTs

The Role of Security Operations (SecOps) in…

November 8, 2024

8 likes

NOP sledding دلیل وجودی

NOP sledding دلیل وجودی

February 14, 2020

3 likes

  قدم بزرگ مایکروسافت در راستای افزایش توانمندی افراد در مالکیت هویت و حریم شخصی خود

قدم بزرگ مایکروسافت در راستای افزایش…

February 13, 2018

16 likes

آموزش هکر اخلاق گرا CEH

آموزش هکر اخلاق گرا CEH

August 6, 2016

19 likes2 comments

  翻译: