Cybersecurity Expertise
Portfolio showcasing skills, experiences, and contributions in cybersecurity field.
📚 Books Authored
Ethical Hacking and Penetration, Step by Step with Kali Linux (2014)
A comprehensive guide for aspiring ethical hackers, covering definitions, concepts, and practical tools for penetration testing using Kali Linux.
(Ethical Hacking and Penetration, Step by Step with Kali Linux)
Enterprise Security Architecture: A Guide to Infosec Management (2015)
Provides a top-down approach to building a business-driven security architecture, aligning information security controls with business strategy.
(RASSOUL GHAZNAVI ZADEH: ESA: What Is It and How Does it Work?)
Kali Linux – Hacking Tools Introduction
Introduces various hacking tools available in Kali Linux, offering insights into their usage for ethical hacking purposes.
(Ethical Hacking and Penetration, Step by Step with Kali Linux)
Hacking and Securing Web Applications
Focuses on techniques and tools for testing and securing web applications against common vulnerabilities.
(Rassoul Ghaznavi-zadeh (Author of Ethical Hacking and Penetration, Step ...)
🎓 Udemy Training Modules
Rassoul Ghaznavi Zadeh is a prolific instructor on Udemy, with over 100,000 students enrolled in his courses.
Identity and Access Management (IAM)
Covers components of IAM, including Privileged Account Management (PAM) and Identity Governance and Administration (IGA), with practical labs and examples.
Palo Alto Firewalls – Installation and Configuration
Provides step-by-step instructions on setting up Palo Alto Firewalls, from initial installation to advanced configurations.
(Palo Alto Firewalls - Installation and Configuration - Udemy)
Penetration Testing with Kali Linux – A Complete Guide!
Offers end-to-end solutions for testing web and network security using Kali Linux, including building test labs and performing reconnaissance.
Developing a Security and Compliance Program with GenAI
Focuses on building security and compliance programs leveraging Generative AI technologies.
(Rassoul Zadeh | Author, trainer and Senior Security Expert | Instructor)
Data Security Strategy for Organizations
Discusses strategies for implementing data security measures within organizational frameworks.
đź“° ISACA Journal Articles
Information Security Architecture: Gap Assessment and Prioritization
Explores methodologies for assessing and prioritizing gaps in information security architecture.
(Information Security Architecture: Gap Assessment and ... - ISACA)
Enterprise Security Architecture—A Top-down Approach
Discusses implementing security architecture using frameworks like SABSA, COBIT, and TOGAF.
✍️ Other Notable Contributions
LinkedIn Articles:
"What is a risk scenario and how to define it"
"Quantitative Risk Assessment using Factor Analysis"
"Components of a good security awareness program"
"IT Architecture Design Principles and Considerations"
(What is a risk scenario and how to define it - LinkedIn, Quantitative Risk Assessment using Factor Analysis of ... - LinkedIn, Components of a good security awareness program | Rassoul Ghaznavi Zadeh, IT Architecture Design Principles and Considerations - LinkedIn)
Personal Blog:
"ESA: What Is It and How Does it Work?"
"Generic Architecture Design Principles and Considerations"
(RASSOUL GHAZNAVI ZADEH: ESA: What Is It and How Does it Work?, RASSOUL GHAZNAVI ZADEH: Generic Architecture Design Principles and ...)