Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Skip to main content
This rough draft SOP will provide a substantial road map on how to build and manage a SOC and or a Cyber Intelligence Operations Center.
    • by 
    •   19  
      SocCISACyber SecurityCyber Forensics
    • by 
    • CISA
A summary of my study notes for CISA, which I passed on the first time.
    • by 
    • CISA
    • by 
    •   6  
      CISAInternal AuditingExternal and Internal AuditingAudit
"In today’s information-driven business environment, enterprise systems and processes capture an ever-increasing amount of data. To derive meaningful and actionable information from this data, businesses are compelled to commit... more
    • by 
    •   40  
      Information SecurityMachine LearningData MiningNetwork Security
NIST created the Cyber Security Framework in 2017 to serve as an implementation vehicle to address requirements of an Obama Administration Executive order. I provided feedback to NIST on the CSF development. I have deployed the CSF core... more
    • by 
    •   13  
      Information SecurityCISACyber SecurityFirewall
    • by 
    •   5  
      EducationSecurityCISACareer Development
Anyone who wants to take a major leap in the information security domain must know the reasons why he/she is pursuing a CISSP certification anyway. There are many benefits that set it apart than the general information security courses.... more
    • by 
    •   8  
      CISACybersecurityCISSPCyber Security
Are you aspired to become one of the top-rated project management people in your organization? And ambitious enough to get what you want from your career. Well! The right way to proceed is to attain PMP Certification.
    • by 
    •   11  
      Project ManagementCISACEHAzure
Hi friends, are you looking for Certification in CyberSecurity? Great, you know basically major challenge is "Which is the most suitable certification for you". In this Paper, we tried to explain two of the best certification. CISM and... more
    • by 
    •   8  
      Information SecurityCybercrimesComputer SecurityCyberspace
    • by 
    •   7  
      Risk assessmentCISAHumansImmunization
    • by 
    •   5  
      CISAPMPCIACFE
    • by 
    • CISA