a.ghahrood cert 2016(certificates

71

Upload: alireza-ghahrood

Post on 14-Apr-2017

62 views

Category:

Documents


1 download

TRANSCRIPT

Satya NadellaChief Executive OfficerPart No. X18-83687

Microsoft Certified Solutions Expert

ALIREZA SHABAN GHAHRODHas successfully completed the requirements to be recognized as a Microsoft® Certified SolutionsExpert: Private Cloud.

Date of achievement: 12/30/2014

Certification number: F146-6099

Inactive Date: 12/30/2017

Certificate of Completion U.S. Small Business Administration

"Your Small Business Resource"

This is to recognize

Alireza Shaban Ghahrod

for completing the online course

Cybersecurity for Small Businesses

Jan 18, 2015

Learning is a treasure that will follow its owner everywhere.

SBA Office of Entrepreneurial Development

http://www.sba.gov/training

Certificate of Completion U.S. Small Business Administration

"Your Small Business Resource"

This is to recognize

Alireza Shaban Ghahrod

for completing the online course

Strategic Planning for Small Businesses

Jan 18, 2015

Learning is a treasure that will follow its owner everywhere.

SBA Office of Entrepreneurial Development

http://www.sba.gov/training

Certificate of Completion U.S. Small Business Administration

"Your Small Business Resource"

This is to recognize

Alireza Shaban Ghahrod

for completing the online course

UnDefined

Jan 18, 2015

Learning is a treasure that will follow its owner everywhere.

SBA Office of Entrepreneurial Development

http://www.sba.gov/training

Alireza Shaban Ghahrod

Analyst Webcast: Advanced Network Protection with McAfee Next Generation Firewall

December 15, 2014

January 07, 2015

1

Alireza Shaban Ghahrod

Continuous Monitoring and Mitigation: Responding to Emerging Threats

February 6, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Detecting Evil on Windows Systems - An In-Depth Look at the DFIR Poster

April 3, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

SIEM-plifying security monitoring: A different approach to security visibility

February 13, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

The 20 Critical Controls: A Security Strategy

January 13, 2015

January 17, 2015

1

Alireza Shaban Ghahrod

FOR572 Advanced Network Forensics and Analysis Preview: DHCP and DNS, "The Correlators"

September 8, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

SANS Asia-Pacific Series: A Taste of SANS SEC660 - Advanced Penetration Testing: Attacking Network Devices

March 5, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

What Your CISO Wants

April 10, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

The Critical Security Controls and the StealthWatch System

February 20, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Cyber Security Metrics and Measuring Vulnerability

August 12, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

SANS Financial Services Cyber Security Trends and Challenges Briefing

March 7, 2014

October 20, 2014

4

Alireza Shaban Ghahrod

Get Smart: Consuming Threat Intelligence to Advance your Cyber Security Program

September 4, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Sneak Peek at the Cyber Threat Intelligence Summit

January 17, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Sneak Peek at the SANS San Francisco Cybersecurity Training Event

June 5, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Network Segmentation Best Practices for Defense

September 30, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Enabling Network Monitoring to Become System Intelligence

October 9, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Designing and Implementing a Honeypot on a SCADA Network

July 2, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Industrial Control System (ICS) Cybersecurity Response to Physical Breaches - A How-To Guide

February 4, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Incident Response Part 1: Incident Response Techniques and Processes: Where We Are in the Six-Step Process

August 14, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Needs of a Modern Incident Response Program

June 11, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Log and Event Management Survey

October 6, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Making Log and Event Management Easy for SMBs

March 12, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Malware Analysis Essentials Using REMnux w/ Lenny Zeltser

April 17, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

The Power of Lossless Packet Capture (1G-100G) & Real-time Netflow

March 24, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Next Generation Endpoint Security to Stay Ahead of Evolving Advanced Targeted Threats

October 17, 2014

November 29, 2014

1

Alireza Shaban Ghahrod

OpenSSL "Heartbleed" Vulnerability

April 9, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Patch Pwnage: Ripping Apart Microsoft Patches to Build Exploits

October 8, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Building a Content Security Policy

August 19, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Security Without Scanning for Today's Hybrid Datacenter

February 14, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

SIEM, Security Intelligence and the Critical Security Controls

April 23, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Using a SOC as a Security Force Multiplier

June 25, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

10 Ways To Rock Your SOC

May 7, 2014

October 20, 2014

1

Alireza Shaban Ghahrod

Top 10 1/2 Things That Can Undermine Your Security Program

November 19, 2014

November 29, 2014

1

Alireza Shaban Ghahrod

Ramping Up Your Phishing Program

October 30, 2014

November 16, 2014

1

Alireza Shaban Ghahrod

SANS 2nd Survey on the State of Information Security in Health Care Institutions: Part 2

December 11, 2014

January 07, 2015

1

Alireza Shaban Ghahrod

Top 3 Threats to Retail IT Security and How You Can Defend your Data

October 21, 2014

November 16, 2014

1

Alireza Shaban Ghahrod

Top 10 1/2 Things That Can Undermine Your Security Program

November 19, 2014

January 07, 2015

1

Alireza Shaban Ghahrod

Watering Hole Attacks: Detect End-User Compromise Before the Damage is Done

October 22, 2014

November 16, 2014

1

Alireza Shaban Ghahrod

COMP001020968720

January 21, 2016

EXP DATE: 01/21/2019

Code: R3GFXHCG33EESVVKVerify at: http://verify.CompTIA.org

Alireza Shaban Ghahrod

COMP001020226070

January 21, 2016

EXP DATE: 01/21/2019

Code: 26WE9CXDG3VEC0SGVerify at: http://verify.CompTIA.org

Alireza Shaban Ghahrod

COMP001020226070

January 21, 2016

EXP DATE: 01/21/2019

Code: R3GFXHCG33EESVVKVerify at: http://verify.CompTIA.org

CERTIFICATE .. <=l~A~A------------------------

This is to certify that

ALIREZA SHABAN GHAHROOD

Has attended and passed the following thirty two

ISO 27001 : Implementing

Delivered by QMS

14th January 2016

MEA - 2016 - 1 - 14 - 006

Certified by: P ~ A~ Head Of Training QMS Academy MEA

This Certificate Remains the property of QMS and is bound by condition of contracts