PodParley PodParley
InfosecTrain cover art

All Episodes

InfosecTrain — 1505 episodes

#
Title
1

Mastering US Privacy | Your CIPPUS First-Attempt Success Strategy

2

AI Auditing Masterclass: Mastering ISO/IEC 42001 for GRC Leaders

3

AI Media Mastery: Creating the Future with Sora & Nano Banana

4

Pass CISM Exam 2026 | Roadmap Transitioning from Security Tech to Strategy

5

CCSP 2026 Masterclass: Navigating the New Cloud Security Frontier

6

Building Your AI Second Brain: Mastering NotebookLM & Oboe

7

The Future of Privacy Leadership: ISO 27701:2026 Explained

8

AI Risk Management for Leaders | Governance, Trust & Accountability in 2026

9

Privacy Engineering in the AI Era A CIPT Perspective on Data Protection

10

The Future of GRC: Governance, Risk & Compliance in the Age of AI

11

ISO 42001 Explained: Defining Your Organization’s Role in the AI Ecosystem

12

CRISC Explained: Enterprise Risk Strategies for the Age of AI

13

Why AI Governance is the Most In-Demand Skill for 2026

14

Mastering the Red Team: Beyond Penetration Testing

15

Build Your Own AI Agent: From PDF To Email Draft

16

Cybersecurity: The New Front Line of National Security

17

LlamaCoder & Agentic AI: The End of Manual Browsing

18

OBO + Consensus AI | Ending the Era of AI Hallucinations

19

DPDPA for DPOs | Navigating AI Risk and Accountability in 2026

20

SailPoint IdentityIQ 8.5 | Modernizing Identity Governance with AI and Teams

21

Perplexity AI The End of Search Engines as We Know Them

22

How to Become a GRC Auditor: The Complete Roadmap 2026

23

The CISOs Nightmare: Why 2026 is No Longer About the Hacker

24

Mastering IAPP AIGP | Roadmap to AI Governance Excellence

25

Mastering Claude AI | The Thoughtful Assistant for Research & Writing

26

Master the CompTIA Security+ in 2026

27

ANI, AGI, & ASI: Navigating the 3 Levels of AI Evolution

28

The Soul of AI: Why the Model is the Real Operating System

29

SLM vs. LLM | Why the Future of AI is Small, Local, and Secure

30

Wazuh for SOC Analysts | The Ultimate Open-Source SIM & XDR Strategy

31

How to Crack ISSAP: Security Audit Strategy & Exam Tips

32

Canva AI Secrets: How to Use AI in Canva for 2026

33

Gemini vs. Lovart Which AI Generates Better Images in 2026

34

ISO/IEC 42001 AI Governance & Implementation Bootcamp

35

NotebookLM Explained: How AI Is Rewriting the Way We Learn in 2026

36

ElevenLabs & The AI Voice Revolution From Text to Reality

37

ISACA’s AAISM: Securing the Intelligent Enterprise

38

Agentic AI Explained: The Shift from Assist to Act in 2026

39

The Azure Secure Admin Roadmap: AZ-104 + AZ-500 in 2026

40

How to Stay Safe Online | Cybersecurity Awareness for Everyone

41

AWS Security Specialty (SCS-C03) Exam Guide: Mastery & Practice

42

Gemini AI Masterclass: Transforming Google Workspace Productivity

43

Firewall Evasion: 3 Sneaky Ways Hackers Bypass Defense

44

The AI Blueprint: Designing a Practical Governance Framework

45

Beyond the Screen: Top 5 Soft Skills Every Infosec Pro Needs

46

How to Build an Enterprise Security Program: Complete Step-by-Step Guide

47

The AI Auditor Your Career Roadmap to ISOIEC 42001

48

VoIP: How Your Voice Becomes Data (And How to Secure It)

49

ISO/IEC 42001: The Global Blueprint for AI Governance

50

Top 20 TCP/IP Protocols for 2026: The 600 Exabyte Surge

51

WAF: The Layer 7 Shield Your Web Apps Need in 2026

52

GDPR Proof: The 7 Pillars of Data Accountability

53

Cryptanalysis Exposed: How Hackers Crack the Uncrackable

54

DNS Floods vs. DDoS: Protecting the Internet's Address Book

55

AI Agents vs. Bots The Future of Autonomous DevSecOps

56

DevSecOps & Compliance 2026: Automating Your Security Guardrails

57

Amazon Kinesis: Mastering Real-Time Data & Video Streams

58

Amazon Athena Simplified: Secure SQL Analytics for Cloud Professionals

59

Security Architecture Explained: Zero Trust, AI, and Quantum

60

7 Security Architecture Mistakes to Avoid in 2026

61

AWS RAM Explained: Mastering Secure Multi-Account Resource Sharing

62

AI Skills Shaping Cybersecurity Careers in 2026

63

CEH vs. OSCP: Choosing Your Ethical Hacking Career Path

64

Key Vault vs. Managed Identity Azure Security Showdown

65

Azure PIM Explained: Managing and Securing Privileged Access

66

Azure Sentinel Explained: The Cloud-Native SIEM & SOAR Solution

67

CCSP Exam Accelerator: Ace your Cloud Security exam on Your First Attempt

68

Simplifying Cloud Security Governance: Policies, Tech, and Compliance Mastery

69

Google vs Microsoft vs Zoho: 2026 Workspace Kings

70

Mastering Cyber Law GDPR, HIPAA, and Global Compliance 2026

71

DevSecOps 2026: AI, Zero Trust, and Security Trends Explained

72

Amazon ECR Explained: Securing Your Container Supply Chain with AWS

73

Digital Forensics Playbook 2026: AI, Cloud, and the Deepfake Defense

74

Top 10 Digital Forensic Tools Every Investigator Must Know

75

2026 SailPoint IdentityIQ Exam Guide: Your Complete Prep Roadmap

76

Web Browser Forensics Uncovering Hidden Digital Evidence

77

Rise of AI in SOC: Transforming Cyber Defense with Smarter Threat Response

78

What Is SD WAN and How It Works Explained

79

What Is Endpoint Detection and Response EDR Explained

80

Complete AI Governance Training CAIGS Key Highlights and Differentiators

81

Master BCMS Implementation with ISO 22301 The Ultimate Resilience Guide

82

Crypto Shredding Explained The Modern Way to Destroy Data Securely

83

Boost Productivity with AI in Spreadsheets A Complete Practical Guide

84

Phishing-Resistant MFA The Future of Secure Authentication

85

Automated Incident Response How Automation Transforms Modern Cyber Defense

86

Understanding Cryptanalysis: Techniques, Attack Types & Ethical Applications

87

Top Network Sniffing Techniques Every Ethical Hacker Must Know

88

What Is WHOIS Footprinting? A Beginner’s Guide to Ethical Hacking Recon

89

Why Sovereign Cloud Matters: Data Control, Compliance & Security Explained

90

Key Features of Amazon GuardDuty: Strengthening Cloud Threat Detection

91

DevSecOps vs Rugged DevOps: Building Secure & Resilient Software

92

HackerGPT Explained AI-Powered Cybersecurity for Ethical Hackers

93

Splunk Infrastructure Monitoring Explained | Real-Time Observability for Modern IT

94

Policy-as-Code Explained | Automating Security, Compliance & DevSecOps

95

Future-Ready Cloud Security 2026 | Top AI Tools & Emerging Trends

96

Master ISO 42001 | Build a Career in AI Governance & Compliance

97

Cloud FinOps Explained | Smarter Cloud Cost Management for Modern Businesses

98

Understanding Network Scanning: Strengthening Cybersecurity from the Ground Up

99

Exploring the Types of Threat Hunting | Proactive Cyber Defense Strategies

100

Understanding Information Systems Auditing | Importance, Process & Career Path

101

Building Cyber Resilience | How to Prepare, Respond & Recover from Cyber Attacks

102

Understanding the Core Components of Artificial Intelligence Build a Strong AI Foundation

103

AI, Cybersecurity & Data Protection Securing Innovation in the Age of Intelligence

104

Master CCZT Certification Your Complete Guide to Zero Trust & Cloud Security

105

The Global AI Revolution | How Artificial Intelligence Is Reshaping Power and Nations

106

Future Skills for Cybersecurity in the Age of AI | Expert Insights from CompTIA

107

Ace the New CRISC Exam 2025 Proven Prep Strategy & Expert Tips

108

Crack the CCSP Exam Expert Tips for First-Time Success

109

A+ & Network+ Explained | Your Ultimate Guide to Starting an IT Career

110

Mastering ISACA AAIA Certification | Your Complete Guide to AI Auditing

111

How AI is Transforming Cybersecurity | Benefits, Risks & Controls

112

Complete AI Roadmap for Beginners | Hidden Skills for Career Acceleration

113

Crack Your SOC Interview | Top Questions & Expert Tips

114

AI Governance Explained | How to Manage AI Agents in Your Organization

115

CCZT Complete Masterclass | Step-by-Step Guide for Zero Trust Architecture

116

Master ISO 27001 Implementation | Step-by-Step Practical Insights

117

Want to Master Azure in 2025? Start with This AZ-104 & AZ-500 Crash Course

118

CISSP Exam Hacks from Experts Secrets to Pass on Your First Try

119

Cyber Security Full Course for Beginners | Complete Career Roadmap

120

DevSecOps in the Age of AI and Automation | Secure DevOps Explained

121

SailPoint Overview & Key Capabilities Career Opportunities in SailPoint & IAM

122

Ace the CC Exam on Your First Attempt | Cybersecurity Certification Tips

123

AI in Cybersecurity: Practical Implementation & Real-World Impact

124

Red Team Masterclass: Crafting & Executing Cyber Attacks (Part 2)

125

Red Team Masterclass: Crafting & Executing Cyber Attacks (Part 1)

126

Simplifying ISO 8583 Secure Payment Messaging Masterclass

127

Public Key Cryptography Simplified Encryption, Decryption & DigiNotar Hack (Superhero Edition)

128

PCI-DSS Masterclass 2025: Payment Security, Compliance & Cardholder Data Protection

129

Mastering GRC: Cloud Security Best Practices & Structures

130

Cloud Security for Business Transformation CCSP Insights That Matter

131

AI Governance Masterclass: Designing Responsible & Ethical AI Systems

132

Crack Cybersecurity Interviews: Threat Hunting & DFIR Q&A Guide

133

Certified DPO Guide 2025: GDPR, DPDP & Privacy Careers Explained

134

Penetration Testing Interview Prep 2025: Top Interview Questions & Answers Explained Part - 2

135

Penetration Testing Interview Prep 2025: Top Interview Questions & Answers Explained Part - 1

136

SOC Analyst Masterclass: Threats, Response & Career Roadmap Part - 2

137

SOC Analyst Masterclass: Threats, Response & Career Roadmap Part - 1

138

ISSAP 2025 Syllabus Update: What’s Really Changing?

139

Top 5 RSA Archer Use Cases Every GRC Professional Must Know

140

Mastering Splunk: Real Business Use Cases That Drive Results

141

Best Threat Hunting & DFIR Techniques Revealed by Cybersecurity Expert

142

How AI Threat Intelligence Transforms Red & Blue Team Strategies

143

A Day in the Life of a Security Architect

144

Breaking the Code: Advanced Pentesting Masterclass - Part 2

145

Breaking the Code: Advanced Pentesting Masterclass - Part 1

146

AWS Cloud Computing: Part 2 – Basics to Infrastructure Explained

147

AWS Cloud Computing: Part 1 – Basics to Infrastructure Explained

148

Mastering Third-Party Risk: The Ultimate TPRM Guide

149

ISO 27001 Audit Masterclass: Part 2 – Audit Execution & Success

150

ISO 27001 Audit Masterclass: Part 1 – Audit Execution & Success

151

CISM Study Guide 2025: Pass the CISM Exam on Your First Attempt

152

CompTIA Security+ Bootcamp Part 2 |How to Pass Exam on First Attempt

153

CompTIA Security+ Bootcamp Part 1 | Master the First 8 Modules of SY0-701

154

CCSP Domain 6 Mastered | Legal, Risk & Compliance in the Cloud

155

CCSP Domain 5 Explained | Cloud Operations & Security Management

156

CCSP Exam Prep 2025 | Domain 4: Cloud Application Security Essentials

157

CCSP Exam Prep 2025 | Domain 3: Cloud Platform & Infrastructure Security

158

CCSP Exam Prep 2025 | Deep Dive into Domain 2: Cloud Data Security

159

CCSP Exam Prep 2025 | Deep Dive into Domain 1: Cloud Concepts, Architecture & Design

160

CISSP Exam Prep 2025 | Deep Dive into Domain 1: Security & Risk Managementk Management

161

AWS Interview Prep 2025 | Advanced Questions & Expert Answers – Part 2

162

Top AWS Interview Questions & Answers 2025 | Land Your Cloud Job – Part 1

163

CIPT Exam Prep 2025: Smart Strategies to Ace Your First Attempt

164

Web App Pentesting Essentials: Stay Ahead of Threats in 2025

165

AZ-104 + AZ-500: Your Ultimate Azure Career Roadmap

166

Security Architecture Unlocked: Myths, Realities & Career Roadmap

167

CEH v13 Prep Part 2: Last-Minute Tips, Exam Strategy & Rapid Review

168

CEH v13 Prep Part 1: Hacking Phases, Exam Strategy & Real-World Insights

169

PenTest+ Prep Part 2: Advanced Techniques, Exam Strategy & Career Roadmap

170

PenTest+ Prep Part 1: Kickstart Your Journey with Core Tools, Frameworks & Attack Techniques

171

SOC Analyst Essentials Part 2: Mastering Logs, Vulnerabilities & Threat Intel

172

SOC Analyst Essentials Part 1: Inside the Security Operations Center

173

CISSP Domain 7: Master Security Operations Like a Pro

174

CISSP Domain 4: Zero-Trust & Network Security Unlocked

175

CISA Domain 3 Mastery: Systems Acquisition & Development Explained

176

CISM Exam Prep: Top Tips & Practice Questions to Pass First Try

177

Nail Your ISO 27001 Lead Auditor Interview: Pro Tips & Must-Know Skills

178

CIPP/E Hacked: First-Attempt Success Strategies for 2025

179

CISM Domain 1 Mastery: InfoSec Governance Essentials

180

Privacy Leadership Unlocked: Mastering the DPO Role in 2025

181

Mastering AI Governance: Ethics, Risks & Solutions Explained

182

CCSP Exam Success: Pro Tips & Practice for Part 2 Mastery

183

CCSP Exam Success: Top Tips to Ace Part 1 of Your Prep

184

Future-Proof DevSecOps with AI: Automation, Security & 2025 Trends

185

ISO 27001 Lead Implementer Interview Essentials: Top Tips & Techniques

186

ISSAP Exam Prep: Top Questions & Proven Strategies for Cybersecurity Architects

187

Cloud-Powered AI: Securing Innovation Without Compromising Privacy

188

CISA Domain 1 Explained: Master the IS Audit Process with Confidence

189

DevSecOps in 2025: Top Trends, Tools & Future-Proof Strategies

190

Hack Like a Pro: Advanced Penetration Testing Masterclass

191

Explore SailPoint: Identity Governance Demo & Career Blueprint

192

CRISC Domain 2 Explained: Master IT Risk Assessment & Mitigation

193

RSA Archer Demo & Career Guide: Master GRC Tools for the Future

194

CIPM in Action: How to Build & Manage a Strong Privacy Program

195

Logical Access Control Audits: Step-by-Step for Security & Compliance

196

AI Governance Explained: Balancing Innovation with Compliance

197

Web Security Essentials: Stop SQL Injections & Modern Web Attacks

198

ISO 42001 Lead Auditor: AI Governance, Risk & Compliance Essentials

199

SOC Masterclass: Tools, Roles & Real-Time Threat Response Strategies

200

CISSP Domain 6: Security Assessment & Testing Strategies Explained

201

CompTIA Security+ Guide: Skills, Exam Tips & Cybersecurity Career Paths

202

CGRC Domain 2: Mastering System Scope, Boundaries & Risk Assessment

203

AI in Cybersecurity: Next-Gen Tools for Smarter, Faster Threat Defense

204

Proactive Threat Hunting: Techniques to Detect & Stop Attacks Early

205

CISA Domain 2 Explained: IT Governance & Management Deep Dive

206

IAPP AIGP Certification: Essentials for AI Governance & Career Growth

207

How to Become a DPO in 2025: Skills, Certs & Career Path

208

RSA Archer Blueprint: Step-by-Step Guide to GRC Mastery

209

AI & Governance: Why Responsible Oversight Matters for the Future

210

CISM Exam Prep: Proven Strategies & Practice Question Walkthroughs

211

CISA Exam Strategy: Study Plan, Domains & Practice Question Tips

212

ISO 27001 LA vs LI: Roles, Skills & Career Path Comparison

213

Network Scanning & NMAP: Master the Fundamentals of Reconnaissance

214

Red Teaming Explained: Benefits, Roles & Attack Lifecycle

215

Offensive Security Explained: Ethical Hacking, Pen Testing & Hacker Roles

216

CIPT Certification Explained: Privacy in Tech for IT Professionals

217

DevSecOps in 2025: Top Trends & Predictions You Need to Know

218

India’s Draft DPDPA Rules Explained: Key Impacts & Expert Insights

219

Cryptography for Beginners: How Secure Is Your Data?

220

Azure AZ-104 & AZ-500: Your Dual-Certification Roadmap to Success

221

Your Path to CISM Certification | Proven Strategies for Success

222

Gen Z & Digital Wellness | Are We Raising a Secure Generation?

223

Introducing the World’s First AI Assurance Certifications by ISACA!

224

Military to Cybersecurity What I Wish I Knew

225

How IAM Protects Your Digital Identity | The Future of Cybersecurity

226

How to Begin Your Penetration Testing Career | Skills, Certs & Advice

227

Governance, Risk, and Compliance (GRC) Interview Questions

228

Cybercrime Uncovered: The Dark Truth & How to Stay Safe | CyberTalks by InfosecTrain

229

Data Privacy Officer Interview Questions & Concepts

230

Understanding CGRC & RMF: A Must-Know for Cybersecurity Leaders

231

Inside the SOC: Expert Insights from the Frontlines

232

Data Privacy & AI: DPDPA Insights with Sarika Malhotra

233

CyberTalks with InfosecTrain: Architecting Security through DevSecOps

234

How to Become a Cloud Security Engineer: Step-by-Step Guide

235

Advanced Cloud Governance: Strategies for a Secure Cloud Future

236

Mastering Cloud Security for Enterprises: A Pro Guide

237

CyberTalks with InfosecTrain :Insider Secrets to Become a CISO

238

CyberTalks Ep. 2 : Unlock Game-Changing Cybersecurity Career Insights!

239

CyberTalks Ep. 1: Unlock Game-Changing Cybersecurity Career Insights!

240

Understanding India's Draft DPDPA Rules | Expert Insights

241

Discover the Hidden Value of CCAK Certification with Cloud Experts

242

CISO’s Role in Modern Cybersecurity: Protecting the Digital Frontier

243

Cultivating a Culture of Cybersecurity: with InfosecTrain CEO Deepti Kalra

244

Understanding the Cloud Shared Responsibility Model with Krish & Prabh

245

Common Threats in the Cloud: Expert Insights by Prabh & Krish

246

What is Cloud Governance? Exclusive Talk with Prabh & Krish

247

CISSP 2024 Insights: Bridging the Gap Between 2021 and 2024

248

How to Get Started With AWS Cloud? | AWS Account Creation | What is Amazon EC2?

249

An Overview of AWS Cloud Storage Services | Benefits of AWS Cloud Storage

250

Why IAPP CIPP/E Training & Certification with Infosectrain?

251

Future of Cybersecurity in 2025 | Cybersecurity Trends for 2025 | Cybersecurity Scope in 2025

252

How to Start a Career in Cyber Security? | Start a Cybersecurity Career in 2024

253

How to Make a Career in Red Team & Pentesting | Career in Cybersecurity : Red Teaming / Pentesting

254

What is Security Risk Assessment and How Does It Work? | Types of Risk Assessment

255

What is Enterprise Security Architecture? | How Dose cybersecurity Architecture work in Enterprises

256

What is OT Security? | Why OT security is important? | What are OT Cyber Security Challenges

257

Building Privacy Management System in Organization | What is Privacy Management?

258

Understanding Packets and Protocols | Wireshark Guide to Network Analysis

259

Introduction and Understanding of Wireshark | Comprehensive Wireshark Guide

260

Effective CISM Exam Strategies for Success | Think Like a Manager

261

Types of Password Attacks Password

262

CEH Module 7: Malware Threats

263

Top Sample Questions for CISM Exam Preparation

264

Essential Guidelines for CISM Exam | Follow These Guidelines to Crack the CISM Exam

265

Top CISM Exam Preparation Tips | Crack the CISM Certification Expert Strategies

266

Crack the CISM Certification: Expert Insights

267

Why to Learn Splunk? | SOC Analyst Roles and Responsibilities

268

How does Splunk store all that data? | Splunk Hot and Cold Storage

269

CEH Module 6- System Hacking

270

Why Choose GCP Combo Training with InfosecTrain

271

Top 5 Highest Paying Cybersecurity Jobs 2025

272

What Operations Carried out in Splunk?

273

Splunk EXPERT Reveals Proven Strategies | Why to Learn Splunk?

274

How to Prepare for the CISSP Exam: Expert Tips & Practice Questions

275

What Is Splunk? | Splunk Tutorial For Beginners | Splunk Careers

276

CISSP Exam Overview: Structure, Domains, and Key Tips

277

Identity and Access Management (IAM) in Cloud Security

278

CISSP Certification Explained: Benefits & Career Boost

279

Difference Between Azure Bastion and jumpbox?

280

How to Create an Azure Virtual Network?

281

Top Network Protocol Analyzer Tools

282

Top Azure Security Expert Shares Best Practices for 2025

283

Top Security Practices for VMs & Containers

284

IAM Explained: Simplify User Access & Protect Your Data

285

The Future of Cloud Security: Key Challenges to Watch in 2024

286

Traditional Security v/s Cloud Security: What It Means for Our Future

287

PCI-DSS vs. GDPR

288

Future of DevSecOps: 10 Game-Changing Trends for 2025

289

What is DevSecOps? Overview and Key Insights

290

What is RSA Archer?

291

DevOps vs DevSecOps: A Complete Comparison

292

Amazing Ways Caching Makes Browsing Faster

293

GRC Metrics and Key Performance Indicators (KPIs)

294

Secure Your Code: Best Practices for Developers Explained

295

HTTP Request Methods explained

296

Master the Art of Presentations with the IBC Model

297

Nail Your Presentation Like a Pro

298

Elements of Confident Body Language to Boost Your Presence

299

What Is a Data Retention Policy?

300

What is Administrative Control? Learn Key Security Practices Now!

301

Benefits of IAPP Certifications in Building a Strong Data Protection Framework

302

What is Risk? Clear Examples You Need to Know!

303

How to Develop a Professional Attitude for Career Growth Fast?

304

How User Actions Impact IT General Controls (ITGC)?

305

Top 30+ Essential Cloud Computing Terms

306

How to Layer Security Controls: The Key to Ultimate Protection!

307

The Importance of ITGC in Organizations: Security and Compliance

308

How Physical Controls Protect Your Assets: The Ultimate Guide

309

What are IT General Controls (ITGC)?

310

Top Interview Questions for Chief Information Security Officer

311

Risk Identification Strategies: How to Identify & Mitigate Risks!

312

Proven Strategies for Success in Your CISSP Journey

313

The Best CISSP Study Materials: Learning Guide for 2025

314

Top Interview Questions for Information Security Manager

315

NIST-Based Risk Integration Strategy: Secure Your Organization Today!

316

Top Mistakes to Avoid on Your CISSP Journey – Watch This First

317

Phishing-Resistant MFA vs. Standard MFA

318

Top Interview Questions for Risk and Information Systems Control Officer

319

NIST Risk Management Framework Explained – Secure Your Organization!

320

Treating Risk: Essential Strategies for Effective Risk Management!

321

Technical Controls Explained: The Key to Cyber Defense Success!

322

What are Security Controls? Understanding the Basics of Cyber Defense!

323

CISSP 2024 Explained: Exam Updates & More

324

What are Data Privacy Challenges?

325

How do Viewers Respond to Human Influencers vs. Virtual Influencers

326

CISSP 2024 Domain 1 Series: Key Concepts – CIA Triad

327

Why IT Audits Matter: A Step-by-Step Practical Guide to Success

328

What is Digital Forensics?

329

How to Prepare for the CISM Exam: Expert Advice & Insider Tips

330

Deepfakes and Synthetic Media in Cybercrime

331

What's New in the Network Security Course from InfosecTrain?

332

What is Cloud Gaming

333

What is Piping and Redirection in Linux?

334

Tips to Avoid Falling Victim to Fake Apps

335

Top Data Anonymization Techniques

336

Top Networking Commands

337

What is a Managed Security Service Provider (MSSP)?

338

What is Application Security?

339

Proven Techniques for Enhancing Cloud Security in 2025

340

DOS and DDOS Attacks: What They Are and How to Defend

341

Ten Must-Have Endpoint Security Tools for 2025

342

Importance of Regular Network Vulnerability Assessments

343

Future of Security Operations Centers (SOCs)

344

Insights-as-a-Service

345

What is Microsoft Power BI Tool?

346

Secure Software Development Concepts and Methodologies

347

What is Terraform?

348

GRC Analyst Interview Questions

349

How to Choose the Right Cloud Certification

350

Power BI vs Tableau What's the Best Choice for Business Insights?

351

The Future of GRC_ Tools, Trends, and Career Pathways

352

What is Software Defined Networking (SDN)?

353

What is Data as a Service (DaaS)

354

Top ISMS Consultant Interview Questions

355

Advanced Penetration Testing: Mastering Exploit Tactics (2/2)

356

Types of SSL Certificates

357

Interview Questions for Information Security Analyst

358

Advanced Penetration Testing: A Deep Dive - Master the Art of Ethical Hacking! [1/2]

359

A Complete Guide to OWASP & Mobile Application Security

360

What is the Principle of Least Privilege?

361

What is Password Policy? | How a Strong Password Policy Protects Your Data?

362

Advanced Security Architecture Modelling: Integrating SOA, IoT, SCADA, and SABSA

363

What's New in Certified Ethical Hacker v13 AI ( CEH v13 AI)?

364

Website Cookies Explained - How They Affect Your Privacy

365

APT 38 The Lazarus Group: Hidden Secrets of State-Sponsored Hacking

366

What Cookies are Important for Privacy?

367

Data Analytics EXPERT Reveals Top Business Secrets

368

Benefits of SSCP Certification

369

What is the Shared Responsibility Model

370

CISA Exam Preparation Strategy 2024

371

Top Skills to Future-Proof Your Career in 2024

372

What is SOC (Security Operations Center)? | InfosecTrain Explains It All

373

Crack the CCSP Code: 10 Secrets to Ace the Exam

374

What’s New in Certified Ethical Hacker v13: AI Updates You Need to Know

375

How to Build a Successful Career in IAM with SailPoint IdentityIQ

376

What is Incident Response Management?

377

Security+ Exam Requirements

378

In-House SOC vs Outsourced: Which is Best for Your Business?

379

What is Cloud Security Posture Management (CSPM)?

380

APT 29 Cozy Bear: The Conspiracy That Will Blow Your Mind!

381

What is SOC as a Service (SOCaaS)

382

Web Application Security: The Secret to Hack-Proof Apps Part 2

383

Web Application Security: The Secret to Hack-Proof Apps Part 1

384

Web Application Basics: A Quick Guide for Beginners

385

How to Implement ISO 27001:2022 Like a Pro – Step-by-Step Guide

386

7 Principles of Privacy by Design

387

What Just Happened in Lebanon? Understanding Synchronized Explosions

388

Certified Ethical Hacker (CEH) Exam Prep : Step-by-Step Breakdown to Certification | Day 2

389

Commonly Asked ISC2 CC Exam Questions with Answers Part-2

390

Certified Ethical Hacker (CEH) Exam Prep : Step-by-Step Breakdown to Certification | Day 1

391

OSI Model vs. TCP/IP Model

392

Top 5 Best CRISC Study Resources

393

CyberWatch Weekly Top 3 Cybersecurity News From September 3rd Week

394

CISSP Domain 1: Applying Effective Supply Chain Risk Management

395

Security Automation Tools

396

Decoding Security Operations: A Complete SOC 101 Crash Course!

397

Role of Ethical Hackers in Incident Response

398

What's New in CCSK V5 Exam? | Latest CCSK V5 Exam Features and Updates Revealed

399

What is Data Classification and Its Components?

400

What are the Benefits of Threat Modeling?

401

What are the Information Security Program Metrics?

402

CyberWatch Weekly: Top 3 Cybersecurity News From September 2nd Week

403

What is PentestGPT?

404

Most Trending Ethical Hacking Interview Questions

405

Use Cases and Key Capabilities of Microsoft Sentinel

406

Top 5 Pillars of Cloud Security

407

Understanding The EU AI Act

408

What is Azure Data Factory (ADF) Integration Runtime?

409

What are the 7 phases of the Cyber Kill Chain?

410

CCSP Exam Requirements

411

Vulnerability Assessment vs Penetration Testing: What’s the Difference in VAPT?

412

What next after CISM?

413

CompTIA Security+ Exam Practice Questions [Part-2] | Security+ Exam Questions and Answers

414

What is CISM?

415

CompTIA Security+ Exam Practice Questions [Part-1] | Security+ Exam Questions and Answers

416

What is Privileged Access Management (PAM)?

417

Typical Roles and Responsibility in GRC

418

Kickstart Your Cybersecurity Career with SSCP Certification!

419

Trust and Transparency in Cloud Computing

420

Top 10 Methods for Securing Mobile Devices and Applications

421

Shoulder Surfing: Definition and Prevention Strategies

422

How to Crack ISO 27001:2022 Lead Auditor Exam | Responsibilities of ISO Lead Auditor

423

Crack the CISSP Exam: Top Strategies You Need to Know!

424

What is Infrastructure as Code (IaC)?

425

What is Mobile Device Management (MDM)

426

CISA Certification: CISA Exam Tips, Tricks & Certification Benefits

427

Introduction to Digital Forensics | Career in Digital Forensics

428

Understanding of Third-Party Risk Management

429

Tips to Maintain Strong Cloud Security

430

CCSP Certification: CCSP Exam Tips, Tricks & Certification Benefits

431

Why Choose Advanced Threat Hunting & DFIR Training Course with InfosecTrain?

432

Data Handling Policy and Its Advantages

433

What is SQL Injection

434

Azure Certification Paths: Explore Your Options

435

What is the Cloud Controls Matrix (CCM)?

436

Penetration Testing Tools

437

What is Rainbow Table Attack?

438

Risk vs. Incident: Understanding Key Differences in Cybersecurity

439

Exploring Different Types of Control Categories | By Prabh Nair

440

Top 5 Ways to Combat Rising OAuth SaaS Attacks

441

CISM Exam: Strategies, Practice Tips & Key Benefits!

442

What is Defense in Depth & Secure Your Business!

443

Top 10 Cybersecurity Technologies

444

How to Migrate On-Premises Virtual Machines to AWS?

445

Top Vulnerability Assessment Tools

446

What is VPC Flow Logs in AWS?

447

What is Cyber Threat Hunting and DFIR? | Steps of Malware Attack Explained

448

What is Internet Control Message Protocol (ICMP)?

449

Types of Vulnerability Assessment Tools

450

Future Scope of Cybersecurity in 2024

451

What is ISO 31000?

452

Vulnerability Classification and Assessment Type

453

Data Link Layer of OSI Model

454

Cracking the AWS Interview: In-Depth Scenario-Based Questions

455

Network Security Interview Success: Scenario-Based Preparation Series

456

AWS Config vs. AWS CloudTrail

457

On-Premise vs Cloud Computing

458

Understanding the Role of a Privacy Program Manager: Key Responsibilities

459

How to Implement DPDPA in Your Organization: A Step-by-Step Roadmap

460

Mastering in Your ISO 27001 Audit Interview: Scenario-Based Training

461

DPDPA vs GDPR: Comprehensive Comparison and Key Differences

462

Scenario-Based Interview Prep Series for SOC Analysts_ Ace Your Next Interview!

463

Incident Management Plan vs. Disaster Recovery Plan

464

What are the Challenges of Cloud Forensics?

465

Compliance and Regulatory Updates for 2024

466

Ace Your Penetration Tester Interview: Scenario Based Prep Guide

467

Penalties for Non-Compliance with the DPDP Act: What You Need to Know

468

Microsoft Azure Interview Prep: Scenario-Based Guide

469

What is RSA Archer Questionnaire

470

Grounds for Processing Personal Data under the DPDP Act

471

How to Ace Scenario Based Interview on Cloud Security?

472

Understanding Organizational Obligations under the DPDP Act, 2023

473

What are Vulnerability Scoring Systems and Databases?

474

Enhance Your CEH Skills with Module 5: Vulnerability Analysis

475

Dark Web and Its Impact on Data Privacy

476

What is an SSRF?

477

What is Cryptojacking

478

Complete Overview of Rights Granted under DPDP Act

479

What’s New in CCSK v5?

480

Overview of DPDP Act, 2023: Everything You Need to Know

481

Material Scope of DPDP Act: Crucial Details You Can’t Miss

482

How is AI Transforming the Digital World?

483

What is AWS API Gateway?

484

GDPR vs DPDPA: Comprehensive Comparison and Key Differences

485

The Future of DevSecOps: Trends and Predictions for 2024

486

Is Your Data Safe? Understanding Personal Data under DPDP ACT

487

What is Azure Information Protection (AIP)?

488

What is AWS CloudHSM?

489

Data Protection Officer Training: Essential Course for Indian Professionals

490

Key Stakeholders: Definition, Benefits and How To Identify

491

What is an Endpoint Protection Platform (EPP)

492

How to Become a Chief Information Security Officer (CISO)?

493

Highlights of the DPDP Act | DPDP Act Highlights

494

What is Website Defacement Attack

495

Data Privacy vs. Data Security: Essential Differences for 2024

496

What is Compliance? The Role of Privacy Revealed

497

Security Tips to Protect Your Business's Information

498

What is Privacy? Explore the Different Types of Privacy

499

What is AWS KMS

500

What is IAM and Monitoring in the Cloud

501

Tips to Pass (ISC)² Certified in Cybersecurity (CC) Exam | Cybersecurity Certification for beginners

502

Deep Dive into Enumeration in CEH Module 4

503

Exploring CEH Module 3: Scanning Networks

504

Mastering the CISSP Mindset: Top 10 Tips for Success!

505

Beginner's To Intermediate levels Guide to Microsoft Sentinel Infosectran Course

506

SIEM vs. SOAR

507

CRISC Domain 1 - Governance

508

What is Cryptography

509

What is Security as Code (SaC)?

510

Top Breach and Attack Simulation (BAS) Tools

511

What is Identification, Authentication, Authorization IAA Cybersecurity

512

What is Stack Overflow in Cybersecurity?

513

What is Infrastructure-as-a-Service (IaaS) in Cloud Computing?

514

Top Cybersecurity Technologies You Must Know in 2024

515

Key Components of Microsoft Sentinel

516

What is a Supply Chain Attack

517

VPN: An Evolution of Secure Remote Access

518

What is a GhostTouch Attack?

519

Cracking CISSP Domain 7: Security Ops Decoded (Part 2) | InfosecTrain

520

What is Vulnerability Analysis?

521

Cracking CISSP Domain 7: Security Ops Decoded (Part 1)

522

What is PCI-DSS Compliance Framework

523

What are the Different Types of Risk in an Organization?

524

How to Become a DevSecOps Engineer in 2024?

525

Ethical Hacking in Cloud Computing

526

Introduction to DevSecOps Maturity Model

527

Is a DevSecOps Career Right for You in 2024?

528

How to Prevent Session Hijacking Attacks?

529

What is Race Condition Vulnerability

530

DevOps Vs. DevSecOps

531

What is LogShield APT Detection Framework?

532

Top Benefits of CCSP Certification for 2024

533

Firewall vs. Antivirus

534

Unlock Cyber Leadership: Your Guide to CCISO Success | CISO Exam Structure and Preparation Tips

535

Benefits of ISO/IEC 27001 Compliance for Organizations

536

What is Web API Hacking Methodology?

537

Cloud Misconfigurations That Cause Data Breaches

538

Azure Firewall vs. Azure Network Security Groups (NSGs)

539

Think Like an Auditor: Secrets to Effective Auditing | What’s New in CISA 2024?

540

Audit Techniques and Tools for ISO 27001 Lead Auditors

541

ISO 27001 Lead Auditor Interview Questions for 2024

542

Cloud Security Auditing Best Practices 2024

543

Cryptography DECODED: Unlocking the Secrets of Secure Communication

544

How to Become an ISO 27001 Lead Auditor?

545

What is Cloud Data Classification?

546

How CySA+ Can Elevate Threat Hunting & Incident Response? | Boost Your Cybersecurity Skills

547

Building Secure & Compliant Cloud Environments with CCSK

548

Skills Needed to Become a Successful CISO

549

SailPoint IdentityIQ Masterclass A Comprehensive Journey from Zero to Master

550

Best Practices for Managing Digital Footprints

551

Importance of BYOD Security

552

A Comprehensive Guide to IoT Security

553

CyberArk Basics to Advanced Ultimate Training Tutorial

554

A Beginner's Guide to Common Network Protocols

555

Why do Hackers Use Kali Linux

556

Unleash the Power of DevSecOps: A Hands-on Adventure

557

How Does the Internet Work?

558

Risk Management Secrets: Techniques Used by Industry Leaders [Day 2]

559

DKIM, SPF, and DMARC: Enhancing Email Security in the Digital Age

560

Unlocking the Secrets of Effective Security Controls: Day 1 Deep Dive

561

IAM on Google Cloud: A Beginner’s Guide to Ultimate Access Control (Episode 4)

562

Understanding Cyberbullying: Types & Impacts

563

GCP Load Balancer Secrets Revealed: Optimize Your Cloud Performance! (Episode 3)

564

Why is Getting Certified in SailPoint IdentityIQ Beneficial for Your Career

565

Step-by-Step Success with Google Cloud Tips from the Pros (Episode 2)

566

Step-by-Step Success with Google Cloud Tips from the Pros (Episode 1)

567

Tips for Recognizing Secure Websites

568

Step-by-Step: Becoming a Data Protection Officer in the Digital Age

569

Risk Management Lifecycle

570

A Practical Guide to Online Account Takeovers

571

Log Management Secrets_ Boosting Your SOC’s Efficiency! [Session 2]

572

CompTIA Security+ Certification Exam Latest Practice Questions (E2)

573

Ensuring Availability: Key Concerns & Prevention

574

Securing Integrity: Key Concerns & Prevention

575

How SOCs Work: The Key to Stopping Cyber Threats in Their Tracks! [Session 1]

576

Protecting Confidentiality: Key Concerns & Prevention

577

CompTIA Security+ Certification Exam Practice Questions (E1)

578

How to Pass CCSP on Your First Attempt in 4 Easy Steps

579

The Dark Web What it is and How to Stay Safe?

580

How CISOs Can Leverage Cloud Security Governance [Day 2]

581

The Role of Biometrics in Data Security and Privacy

582

How CISOs Can Leverage Cloud Security Governance [Day 1]

583

Types of Ransomware

584

Mastering CISM: Thinking Like a Manager for CISM Success

585

DNS Protocols and Attacks

586

Disaster Recovery (DR) Strategies

587

Certify Your Privacy IQ: Essential Learning for CIPT | CIPT – Introduction and Coverage

588

Two-Step Verification vs. Multi-Factor Authentication

589

Stages of a Cyberattack

590

How to Prevent the Most Common Cyber Attacks?

591

Cloud Security Insights Azure Infrastructure and Security

592

What Is Threat Hunting? | Threat Hunting Techniques | Secrets of Effective Threat Hunting

593

CISSP 2024 Insights: Bridging the Gap Between 2021 and 2024

594

Mastering the Art of Web APT | What is Authentication? | Authentication in HTTP [2/2]

595

What is Web Application? | Web Application vs Website | Unlock the secrets of web APT

596

What is Digital Forensics? | Understanding Volatility Framework

597

Best Practices for Cloud Incident Response

598

5 Reason to Learn Threat Hunting

599

Best Backup Management Tools on Cloud in 2024

600

What is Incident Response? | Phases of Incident Response

601

OSI Model: A Comprehensive Guide for Exam and Interview

602

How to Implement ISO 27001? | Navigating ISO 27001 Implementation

603

SC-300 Exam Guide | Advanced Identity Governance & Access Control | SC300 Actual Exam Question

604

SC-300 Exam | Microsoft Identity and Access Administrator | SC-300 Actual Exam Question

605

Steps for Implementing DLP in the Cloud

606

Decoding Threat Intelligence Reports

607

Role of a Certified Incident Handler in Cybersecurity Landscape

608

CISA Old vs CISA new syllabus Comparison | ISACA CISA syllabus update 2024

609

Exploring Module 02 of EC Council's CEH: Footprinting and Reconnaissance

610

What is DPDP Act? | How to Become a Certified Data Protection Officer?

611

Exploring Module 01 of EC Council’s CEH: Introduction to Ethical Hacking

612

What Ethical Hacking Skills Do Professionals Need?

613

SOC Scenario-Based Interview Questions

614

Cybersecurity Operations With CySA+ | What Is CompTIA CySA+ Certification? | Why is CySA+ important?

615

Benefits of CCISO Certification

616

How to Ace Your Cloud Computing Interview?

617

How to Pass ISACA CRISC in First Attempt?

618

Top Security Measures in SOC

619

What has changed in PMBOK Guide - Seventh Edition?

620

How to Ace Certified Cloud Security Professional (CCSP) Exam in First Try

621

The GRC Framework A Practical Guide to GRC Importance of GRC

622

Organizational Governance in CRISC

623

Mastering CyberArk What is Privileged Access Management PAM

624

Privacy Concerns on Social Media Platforms

625

Key Differences Between RSA Archer and ServiceNow

626

Unlocking SailPoint Identity IQ Common Interview Questions and Answers

627

How to Pass CISA in the First Attempt | InfosecTrain

628

Types of Cloud Firewalls

629

5 Reasons You Should Consider Getting PMP® Certification Training from InfosecTrain

630

Top Trending Cybersecurity Jobs in 2024

631

Ethical Hacking Practice Questions for 2024 CEH Interview QA Part 5

632

Ethical Hacking Practice Questions for 2024 | Ethical Hacking Interview QA (Part 4)

633

Ethical Hacking Practice Questions for 2024 Ethical Hacking Interview QA Part 3

634

Why Choose PMP Training Course with InfosecTrain?

635

Importance of Governance, Risk, and Compliance

636

CompTIA Security+ Interview Questions for 2024

637

What is Load Balancing? | How Load Balancers work?

638

VR and AR: Data Privacy Risks for 2024?

639

Free SOC Interview Questions and Answers | SOC Interview Q&A | SOC Interview [Day-8]

640

How to Stop Phishing with Security Awareness?

641

Top 10 API Security Best Practices

642

How to Prevent Data Breaches?

643

Threat Hunting Masterclass-Techniques, Tools, and Tips for Beginners

644

Free SOC Interview Questions and Answers SOC Interview QA SOC Interview Day 7

645

What is DarkGate Malware and Its Impact?

646

Free SOC Interview Questions and Answers SOC Interview QA SOC Interview Day6

647

Introduction to DevSecOps | What is Software Development Lifecycle?

648

How to Clear CIPT in The First Attempt? | Tips and Strategies by JAI | #InfosecTrain

649

Free SOC Interview Questions and Answers | SOC Interview Q&A | SOC Interview [Day-5]

650

Brute Force Attack vs. Dictionary Attack

651

Free SOC Interview Questions and Answers | SOC Interview Q&A | SOC Interview [Day-4]

652

Top OT Security Threats

653

How to Prepare for CSSLP Exam? | Tips to Pass the CSSLP Exam | CSSLP Exam Tips

654

Ethical Hacking Practice Questions for 2024 | Ethical Hacking Interview Questions and Answers

655

What is the SailPoint Identity Hub?

656

Master the CIPP/E Exam: Top Q&A Secrets Revealed!

657

Free SOC Interview Questions and Answers | SOC Interview Q&A | SOC Interview [Day-3]

658

Free SOC Interview Questions and Answers | SOC Interview Q&A | SOC Interview [Day-2]

659

How to Become an IT Auditor in 2024?

660

AWS CloudHSM vs. AWS KMS

661

Free SOC Interview Questions and Answers | SOC Interview Q&A | SOC Interview [Day-1]

662

How to pass the CISA Exam | CISA Exam Preparation Strategy 2024

663

The Best GRC NIST Practical Course - Preview & Scope

664

What are the Challenges of Container Security?

665

Data Security Challenges in the Cloud Environment

666

The Career Scope of Learning SailPoint IdentityIQ

667

Free Defensive Security Interview Questions Part 10 Cyber Security Interview Questions

668

Free Defensive Security Interview Questions [Part 9] | Cyber Security Interview Questions

669

Top Cloud Certifications Roadmap

670

Free Defensive Security Interview Questions [Part 8] | Cyber Security Interview Questions

671

Free Defensive Security Interview Questions [Part 7] | Cyber Security Interview Questions

672

Top Benefits of SailPoint

673

Free Defensive Security Interview Questions [Part 6] | Cyber Security Interview Questions

674

Free Defensive Security Interview Questions [Part 5] | Cyber Security Interview Questions

675

Free Defensive Security Interview Questions [Part 4] | Cyber Security Interview Questions

676

CEH Certified Ethical Hacker Exam Free Practice Questions 2024 - Part 2

677

CEH Certified Ethical Hacker Exam Free Practice Questions 2024 Part 1

678

Free Masterclass on Advanced Penetration Testing Fundamentals [Session 4]

679

Unlock the Power of ISO 27001 with a FREE Lead Implementer Practical Hands-on Session!

680

Free Masterclass on Advanced Penetration Testing Fundamentals [Session 3]

681

Emerging Trends in DevSecOps Tools in 2024

682

What are Cloud Service Level Agreements?

683

Free Masterclass on Advanced Penetration Testing Fundamentals [Session 2]

684

Free Masterclass on Advanced Penetration Testing Fundamentals [Session 1]

685

Open Source Threat Intelligence: Benefits and Challenges

686

Career Guide to Becoming a SOC Analyst in 2024 with this ROADMAP

687

Crack CCSP Certification: Proven Tips for Exam Success

688

ICS Network Architecture and Protocols

689

What is PCI- SSC and Its Importance?

690

Unlocking Career Opportunities: DPO Ready with a IAPP CIPM! [Session 2]

691

Unlocking Career Opportunities: DPO Ready with a IAPP CIPM! [Session 1]

692

Understanding Privileged Access Security: Risks, Solutions, and Mitigation Strategies

693

AWS Interview QA Series - AWS Certified Security Specialty: Domain 1

694

What is Azure Firewall ? | Implementing Azure Firewall in an Azure Virtual Network

695

Top Tools for Website Security Audit

696

10 Skills DevSecOps Engineers Must Master in 2024

697

Free Masterclass on Cybersecurity Expert Course

698

Cloud Data Lifecycle

699

Free Masterclass for ISO 27001 Training [Session 4] | Understanding Stage 2 Audit

700

Free Masterclass for ISO 27001 Training [Session 3] |

701

Free Masterclass for ISO 27001 Training [Session 2]

702

Free Masterclass for ISO 27001 Training [Session 1]

703

Why Cloud Security Governance Training Course with InfosecTrain?

704

Free Security Operations Center SOC Fundamentals Training Session 3

705

Free Security Operations Center SOC Fundamentals Training Session2

706

Free Security Operations Center SOC Fundamentals Training Session1

707

Top Must-Have Qualities of a CISO

708

How Does CyberArk Work For PAM?

709

What is Identity & Access Management (IAM)? | The Key Components of Identity & Access Management

710

Benefits of Network Scanning

711

What are Call Forwarding Scams?

712

What is Archer Integrated Risk Management (IRM)?

713

Top Information Security Interview Questions

714

Free Certified Information Privacy Manager Certification Training | How To Clear CIPM in 30 Days?

715

What is Governance Risk Management Framework?

716

Free Session on IAPP CIPT Training | How to Clear IAPP CIPT certification

717

Free Defensive Security Interview Questions [Part 3] | Cyber Security Interview Questions

718

Free Defensive Security Interview Questions [Part 2] | Cyber Security Interview Questions

719

What is Blue-Green Deployment?

720

Top 30 Cybersecurity Terms You Need to Know

721

Free Defensive Security Interview Questions [Part 1] | Cyber Security Interview Questions

722

Biggest Cybersecurity Attacks in 2023

723

FREE Cyber Security Tutorial | Cyber Security Training for Beginner (PART 8)

724

FREE Cyber Security Tutorial | Cyber Security Training for Beginner (PART 7)

725

FREE Cyber Security Tutorial | Cyber Security Training for Beginner (PART 6)

726

Authentication Vs. Authorization

727

Top SaaS Security Checklist in 2024

728

FREE Cyber Security Tutorial | Cyber Security Training for Beginner (PART 5)

729

FREE Cyber Security Tutorial | Cyber Security Training for Beginner (PART 4)

730

FREE Cyber Security Tutorial | Cyber Security Training for Beginner (PART 3)

731

Free Microsoft Azure security [Exam AZ 500] certification Training - Session 2

732

Free Microsoft Azure security [Exam AZ 500] certification Training - Session 1

733

FREE Cyber Security Tutorial | Cyber Security Training for Beginner (PART 2)

734

FREE Cyber Security Tutorial | Cyber Security Training for Beginner (PART 1)

735

AWS Interview Questions & Answers - 2024 | AWS Interview Questions [Part 4] | AWS Training

736

IRM vs. GRC vs. ERM

737

Top Cybersecurity Trends in 2024

738

Top Cloud Computing Trends In 2024

739

What is GRC (Governance, Risk, and Compliance)? | Bridging the GRC Gap | Implementing GRC Solutions

740

Top AWS Interview Questions and Answers | AWS Cloud Interview Questions [Part 3]

741

CCSP Q&A Session | CCSP Last Minute Prep Q&A Session | CCSP Practice Questions and Answers

742

What is Cloud Security Governance? | Advance Cloud Security Governance

743

Career Scope of ISO 27001 Certification

744

Tips to Follow while Preparing for the CPENT Exam

745

What is GRC Archer? | Overview of GRC Archer Tool

746

What is SOC? | Types of SOC– SOC 1, SOC 2 and SOC 3 | SOC Report Template

747

What is Native & Third Party Tools? | Implementing & Performing Periodic Assessments

748

Top Footprinting Tools

749

What is Threat? | What is Vulnerability? | What is Risk? | Cloud Specific Challenges

750

Understanding Cyber Threats | Understanding Indicators of Compromise (IoCs)

751

What is SIEM? | Why do we need SIEM? | SIEM Architecture

752

What’s new in IBM QRadar SIEM?

753

How to Secure Hybrid Cloud Environments?

754

What’s new in CompTIA Security+ SY0-701? | What is the difference between the SY0-601 & SY0-701

755

What is Security Operations Center (SOC)? | Why do we need SOC? | Job Roles in SOC

756

What's security terminology? | What's a Spoofing Attack? | Types of Traffic

757

Difference between Wired and Wireless Network | What are the topologies of a LAN?

758

What is subnetting in IPv4? | Configuring IPv4 Addresses and Static Routes

759

Implementing Ethernet Virtual LANs | Creating Multiswitch VLANs Using Trunking

760

What is Deepfake AI?

761

Sending Ethernet Frames With Switches | Using Half Duplex With LAN Hubs | Wide-Area Network

762

AI-Powered Cybersecurity Threats in 2023

763

An Overview of LANs | Building Physical Ethernet LANs with UTP

764

Introduction to TCP/IP Networking | TCP/IP Networking Model | IP Routing Basics

765

PCI-DSS Implementer Interview Questions

766

What’s New in the CISSP Certification Exam in 2024?

767

How to Prevent Broken Access Control Vulnerability?

768

What is Computer Forensics? | Roles and Responsibilities of a Forensic Investigator

769

How to Protect Your Identity Online?

770

Introduction to Incidents and Incident Management | Overview of Incident Management Processes

771

Roles and Responsibilities of Security Operations Center (SOC) | Key Functions & Operations of a SOC

772

Introduction to Defensive Security | Types of Cyber Threats | Different Cyber Threat Actors

773

What are Cloud Application Security Controls?

774

What is Virtual Private Server (VPS)?

775

What is New in CompTIA Security+ SY0-701?

776

What is ISO 27001 Lead Auditor? | Roles and Responsibilities of an ISO 27001 Lead Auditor

777

Top PCI-DSS Interview Questions

778

What is ISO 27001 Lead Implementer? | Roles & Responsibilities of an ISO 27001 LI [Day 1]

779

CI/CD Pipeline Security in DevSecOps

780

Mastering Offensive Security Day 4: Network Security and Exploitation

781

PCI DSS Scenario-Based Interview Questions

782

Mastering Offensive Security Day 3 Web Application Security

783

Advantages and Disadvantages of Firewalls

784

Mastering Offensive Security Day 1 : Introduction to Offensive Security

785

Top AWS Interview Questions and Answers | AWS Cloud Interview Questions [Part 2]

786

How Nmap Works?

787

Top AWS Interview Questions and Answers | AWS Cloud Interview Questions [Part 1]

788

Cyber Warfare in the Crossfire Growing Threats Amid Israel-Gaza Conflict

789

How the Israel-Hamas War Impacts the Cybersecurity Industry?

790

Top Vulnerability Analysis Tools

791

What is Cross-Site Scripting (XSS)? | How does Cross-Site Scripting Work?

792

Top Ethical Hacking Interview Questions and Answers | Ethical Hacker Interview (Part 2)

793

Understanding External Entities in XML | Protecting Against XML External Entity Injection

794

What is Server Side Request Forgery (SSRF) with Real-world Examples?

795

What is GRC (Governance, Risk, and Compliance)?

796

What is Container Security in the Cloud?

797

What is SQL Injection? | SQL Injection Mitigation & Prevention

798

Attributes to Look for in a GRC Platform

799

What is Insecure Deserialization? | Mitigation for Insecure Deserialization

800

What is CSRF? | What is Cross Site Request Forgery with Example?

801

Top GRC Tools for Your Organization

802

GRC Interview Questions

803

What is Authentication? | Broken Authentication & Mitigation Explained

804

What Is LLMNR Poisoning? | How does LLMNR poisoning work?

805

What is Evil-Winrm | Evil-winrm Tool For Penetration Testing

806

What is Mimikatz? | Blue Screen of Death using Mimikatz

807

What is a Pass-the-Hash Attack (PtH)? | Pass the hash (PtH) attacks: How they work

808

What is PsExec? | How to Use PsExec? Step-by-Step Guide

809

What is CrackMapExec? | How to install CrackMapExec on Kali Linux

810

CIPP vs. CIPT

811

Roles and Responsibilities of OT Security Professionals

812

OT vs. IT: The Key Differences

813

What is BloodHound? | How to Install and Setup BloodHound

814

What are the DevSecOps Practices for Security? | Embracing DevSecOps: Achieving Security Excellence

815

Top Ethical Hacking Interview Questions and Answers | Ethical Hacker Interview (Part 1)

816

Cracking the Security Operations Center (SOC) Interview | Expert Tips by Bharat

817

How to Secure an OT Network?

818

Key Components of OT: Empowering Industrial Control & Monitoring

819

Difference Between SSO and Federated Identity Management

820

Understanding IBM QRadar | Key Components of IBM QRadar

821

What is Operational Technology (OT)?

822

PCI DSS Compliance Roadmap | Understanding PCI DSS | PCI-DSS Q&A Session

823

What are the Different Types of Exploits?

824

Azure Interview Questions and Answers in 2023 | Azure Interview Tips | AZ Interview Secrets [Part 5]

825

MGM Cyberattack Fallout: How Hackers Used Social Engineering to Infiltrate

826

Introduction to CISM | Scope of CISM | CISM Exam Syllabus

827

What is Network Penetration Testing?

828

Why choose the DevSecOps Engineer course from InfosecTrain?

829

CCSP Exam Preparation | CCSP Exam Tips & Tricks [Part 2]

830

CCSP Exam Preparation | CCSP Exam Tips & Tricks [Part 1]

831

Bengaluru IT Professional Falls Victim to a Sophisticated Scam, Loses Rs 97,000

832

How to Become a Cyber Security Expert?

833

How to Identify Vulnerable Third-Party Software?

834

Azure Interview Questions and Answers in 2023 | Azure Interview Tips | AZ Interview Secrets [Pare 4]

835

Why Choose DevSecOps Practical Course with InfosecTrain?

836

What is Domain 7 of CISSP? | Exam Prepare for the CISSP Domain 7 : Security Operations

837

Difference Between Penetration Testing and Vulnerability Assessment

838

Introduction to Threat Intelligence | Decoding Cyber Threats | Lifecycle of Threat Intelligence

839

What is IAM? | What is PAM? | What is IGA? | IAM Domains & Upskilling

840

What is Advanced Vulnerability Assessment | How to Stay Ahead of the Attackers

841

Top Interview Questions for Threat Hunters | Threat Hunting Interview Questions

842

Roadmap to Digital Personal Data Protection Bill : DPDP Implementation

843

How Automation Impacts Network Management? | Navigating Networks: A CCNA Journey [Part 2]

844

What is Session Management?

845

What is Wiretapping in Cybersecurity?

846

Top AWS Interview Questions and Answers to Ace in 2023

847

Latest Cybersecurity News

848

What is CCNA? | What is VLAN and Why it is Used? [Part 1]

849

CIPM Exam Road Map | CIPM Exam Resources | CIPM Exam Strategy [Part 3]

850

CIPPM Introduction And Coverage | Data Assessment | Transfer Impact Assessment [Part 2]

851

IAPP CIPM Workshop: Your Roadmap to Privacy Leadership | What is Data Privacy [Part 1]

852

Breaking Through the Cloud Security Skills Gap with EC-Council’s CCSE

853

Top Penetration Testing Interview Questions 2023 | Penetration Testing Interview & Answers! Part 2

854

Top Reasons to Explore a Career in Cybersecurity

855

Why are Ransomware Attacks Increasing?

856

IAM and its importance in the cloud | What is Cloud? | Different Vendors of Cloud

857

Overview of the CISM Exam Format & Structure | Tips for Creating CISM Study Plan

858

What is Vishing Scams? | How to Protect Yourself from Vishing Scams? | How to Stay Safe?

859

What is AVRecon Malware? | Tips to Protect Yourself from AVRecon Malware

860

How to Protect Against Sniffing Attacks?

861

Edge Computing vs. Cloud Computing

862

Top Penetration Testing Interview Questions and Answers -Cybersecurity Careers

863

Day - 2: CISO AWARENESS PROGRAM The SOC Blueprint | Increasing Attack Surface | Threat Landscape

864

Types of DDoS Attacks?

865

Day 3- GRC Archer Administrator Masterclass _ Reporting and Data Import

866

Day - 1 CISO AWARENESS PROGRAM The SOC Blueprint _ What is Soc_ _ Traditional SOC Vs Mordern SOC

867

Microsoft Azure Interview Questions | Part 3-Microsoft Azure Interviews with Expert Questions

868

Microsoft Azure Interview Questions | Part 2-Microsoft Azure Interviews with Expert Questions

869

GRC Archer Administrator Masterclass | How to Create an Application from Scratch?

870

What is AWS S3 Object Lock? | How to use Amazon S3 Object Lock?

871

CIPT vs. CIPM

872

Day 1- GRC Archer Administrator Masterclass | Basic Terminology in Archer

873

Top DevSecOps Interview Questions

874

Fundamental Principles of Information Security

875

Microsoft Azure Interview Questions | Microsoft Azure Interviews with Expert Questions

876

What is a Zero-Trust Cybersecurity Model?

877

Spear Phishing vs. Whaling

878

Most Asked Interview Questions for Penetration Testing

879

How do I keep EBS volumes safe? | 5 Ways to Protect EBS Volumes

880

What is AWS CLI?

881

Top Penetration Testing Trends to Follow

882

How to Protect Yourself from Juice Jacking Attacks?

883

Difference Between Internal and External Penetration Testing

884

What is WormGPT | Difference between WormGPT and ChatGPT

885

How do Phishing and Spoofing Attacks Impact Businesses?

886

What are 5 Key Services in AWS? | AWS Cloud Services

887

A Tribute To Kevin Mitnick Most Wanted Hacker & Cybersecurity Professional

888

Incident Response in the Cloud (AWS) | Phases of Incident Response | AWS Native tools used for IR

889

Types of Viruses

890

Interview Questions for Incident Handler

891

What is the Key Difference between AWS Guardduty and Detective?

892

Black Box vs. White Box vs. Grey Box Penetration Testing

893

Physical Architecture of Network

894

Top 25 AWS Interview Questions

895

What is Android Architecture? | Multi Tiered Architecture | Android Layers Architecture

896

Cyber Attack vs. Data Breach

897

CRISC Exam Approach and Preparation | What is CRISC? | CRISC Exam Approach

898

Common Wireless and Mobile Device Attacks

899

CISSP Practice Exam Questions and Answers | CISSP Q&A Review Session

900

What's New in CYSA+ (CS0-003)? | Major Changes to the CompTIA CySA+

901

What is Phishing Attack? | Email Phishing Attack | Social Media Phishing Attack

902

CCAK, ISO 27001 LA & CEH InfosecTrain Review | Samipan Das success story CCAK, ISO 27001 LA & CEH

903

CISA Infosectrain Review | CISA Success Story | Aakriti Garg CISA Gladiator

904

Types Of Malware

905

Why IAPP CIPP/E Certification Training with Infosectrain?

906

What is Incident Handling in cyber security? | Introduction to Incident Response

907

What is GRC? | How can you start a career in IT Audit?

908

What is Azure Sentinel architecture and Data Collection? | Key Capabilities of Microsoft Sentinel

909

Introduction to Cybersecurity Framework

910

Certified Protection Professional (CPP) Exam Structure and CPP Preparation Plan

911

CISSP Practice Tests | CISSP QA and Course Review | CISSP Practice Questions

912

CISSP Question and Answer Practice _ Prepare for CISSP Exam _ CISSP Exam 2023 _ InfosecTrain

913

Introduction to PCI DSS | Key Requirements of PCI DSS | PCI DSS Compliance

914

CCSP & CISSP InfosecTrain Review | Umesh Pandey Success Storie CCSP & CISSP

915

CISSP & CISM InfosecTrain Review | Ravi Teja Success Storie CISSP & CISM

916

CompTIA PenTest+ vs. EC Council’s CEH

917

Day-12: What is security monitoring? | What are logs and how they are monitored?

918

Day - 11: Overview of Threat Detection | Event vs. Incident | What is Incident Response?

919

Day - 10: What is SOC? | Roles and functions of SOC | Tools and Techniques used in SOC

920

Day -9: What is Cloud Service Models? | Cloud Deployment Models | Future of Cloud Computing

921

Day - 8: What is Cloud Computing? | What is cloud? | Cloud vs On-premises

922

Day - 7: Type of Mobile Platform | Rooting v/s Jailbreaking | Stock Android Vs. Custom Rom

923

Day -10: 2023 Latest Cyber Security Interview Questions and Answers

924

Day - 9: What is chain of custody? | Order of Volatility | Miter Att&ck | Cryptography

925

Day - 8: What is Volatile and Non Volatile Data? | Network Forensic | WireShark

926

Why is AWS a Better Choice?

927

Day - 7: what is Digital Forensic? | Types of Cyber Crime | General Forensic Process

928

Day - 6: What is Penetration Testing? | Ethical Hacking Vs. Malicious Activities

929

CIPM InfosecTrain Review | CIPM Success Stories | Parag Kulkarni CIPM Gladiator

930

What is Mobile Cloud Computing?

931

GuardDuty vs. Detective

932

Why Choose the Data Protection Officer Course with InfosecTrain?

933

MAC Flooding Attack

934

Challenges and Benefits of Application Security

935

Defense with Kali Purple | Understanding Kali OS | Exploring Tools and Application

936

What's New in AZ-500? | Deep Dive into Key Topics | AZ-500 Q&A Session

937

Day - 6: What is Threat Intelligence? | Benefits & Stages of Cyber Threat Intelligence

938

How to Deal with Cyber Extortion?

939

MITRE ATT&CK: Meaning, Uses, Benefits

940

Day - 5 : Introduction to Cross Site Scripting | XSS (Cross Site Scripting) Practical

941

Day - 4: What is Password Cracking Techniques | Types of Password Attacks | Rainbow Table

942

Day- 3: What is Ethical Hacking? | Ethical Hacking Phases | Enumeration

943

Day - 2 Introduction to Kali Linux | Basic Linux Commands | What is IP Address?

944

Day - 1: What is Information Security? | CIA Triad | Red Team and Blue Team

945

Day - 5: What is Social Engineering and It's Techniques | Types of Social Engineering

946

Day 4 : What is Cyberbullying and Cyber Etiquettes? | How to report cyberbullying?

947

Day 3 : Protecting personal information | Cyberbullying and Cyber Etiquettes

948

What is AWS S3 Glacier?

949

Role of Blockchain in Cybersecurity

950

Day 2 : What is security? | Information security vs Cybersecurity vs Privacy

951

Day 1 : What is a Network? | Types of networks | What is Internet?

952

Is Chat GPT Cyber Secure? | ChatGPT For Cybersecurity | ChatGPT Privacy Issues!

953

What is Information Security Lifecycle Management ?

954

Top AWS Cost Optimization Tools

955

How to become a Malware Analyst?

956

NIST Cybersecurity Framework 2.0

957

What is a command-line interface (CLI)? | Pros and Cons of Using AWS CLI

958

RSA Archer Interview Questions

959

How to prevent DDoS attacks?

960

AWS vs. Azure: How are they different?

961

Top Network Security Tools

962

Top Tools To Manage Your Apps In The Cloud?

963

What is Malware? | Types of Malware | Malware Attack

964

Why Use DevOps On Azure?

965

What Is Password Cracking?

966

What is a Trojan Horse Virus? | Types of Trojan | How Does Trojan Work?

967

AWS EC2 vs. Lambda: Exploring Compute Options in the Cloud

968

OT Network Architecture | OT Cybersecurity Controls | Introduction to ICS/OT Pentesting

969

Vendor-Specific Vs. Vendor-Neutral Certification in Cloud Security

970

What is ICS/OT Cybersecurity? | IT vs OT | OT Communication Protocols

971

What is a virtual private cloud (VPC)? | Why is VPC Used? | Key Features of a VPC

972

What is AWS Elastic Beanstalk? | Elastic Beanstalk Uses | Advantage of AWS Beanstalk

973

How to Build a Successful Career in Cloud Security in 2023

974

Top Azure Developer Tools

975

Roles and Responsibilities of a Network Administrator

976

What is Archer? | What is Integrated Risk Management? | RSA Archer Tools?

977

What's New in AWS Certified Security Specialty | AWS Certified Security Specialty Q&A

978

Unveiling OSINT Techniques | Key Concepts of OSINT | Importance and Benefits of OSINT

979

Interview Prep for Security Operations Center (SOC) | SOC Interview Questions

980

History of Cyber Kill Chain | Steps of Cyber Kill Chain

981

Top Business Analyst Interview Questions To Ace That Job Interview

982

Common Cyber Attacks and Ways to Prevent Them

983

Active Attack vs. Passive Attack

984

Introduction to Data Privacy | Regulations around Data Privacy | DPO activities

985

AWS Certified Security Specialty Exam Prep Masterclass | InfosecTrain

986

Top Tools and Software for Ethical Hacking

987

Top Security Analyst Certifications

988

Introduction To Azure Security | Network Security on Azure | InfosecTrain

989

Introduction to Governance, Privacy, Identity and Compliance Capabilities

990

Bug Bounty Vs. Vulnerability Disclosure Programs

991

Core Azure Solution and Management Tools | Azure Monitoring Service | Azure Serverless Technology

992

Uncover the Secrets of the CISSP and ISSAP Exams - Strategy Tips from InfosecTrain

993

Azure Cloud Fundamentals | What is Azure? | Key Azure Services

994

Top Ethical Hacking Tools Trending In 2023

995

OT/ICS Security Interview Questions

996

How to Make a Career Transition to OT Security

997

What's New in ISO 27001:2022 | ISO 27001 History | ISO 27001:2013 Minor Updates

998

Introduction to Operational Technology

999

Database Services in AWS | Explore databases in AWS | Networking in AWS

1000

AWS Compute Services | What is serverless? | Introduction to AWS Lambda

1001

Introduction to OT Security

1002

Public Cloud Platforms | Top Public Cloud Providers | AWS Vs. Azure Comparison

1003

Unlock the Mystery of Cloud Computing: Discover Its Incredible Benefits!

1004

Transitioning to OT Security: Key Concepts and Career Opportunities | InfosecTrain

1005

How to Secure the Hybrid Cloud?

1006

What is a Load Balancer in Cloud Computing?

1007

5 Important Facts About Data Privacy You Must Know

1008

Real-World Applications of Cloud Computing

1009

Cybersecurity Foundation Course Interview Questions & Answers | Cybersecurity Interview Preparation

1010

Future of Cybersecurity in 2023 | Cybersecurity Trends for 2023 | Cybersecurity Scope in 2023

1011

GPT-4 AI Powered Microsoft Security Copilot- Future of Comprehensive Security

1012

How to Defend Against Network Security Threats?

1013

Information Security Management | What is Access Control | What is Security Policy?

1014

Roles and Responsibilities of Incident Handler

1015

ISO Certification process | ISO Certification bodies | ISO Fundamental concepts and principles

1016

What is ISO? | Advantages of ISO/IEC 27001 | The ISO/IEC 27000 Family of Standards

1017

Cloud storage security | Cloud Networking Security | Introduction to AWS infrastructure

1018

Introduction to Power BI | Connecting to Data Sources in Power BI | Basic Calculations in Power BI

1019

Case Studies of Data Science | Data Science Project Preparation and Project Presentation

1020

How to Start a Career in Cyber Security? | Start a Cybersecurity Career in 2023

1021

Roles and Responsibilities of a CISO

1022

Introduction to My SQL | SQL Syntax and Queries | Connecting to My SQL

1023

What is Tableau introduction? | Creating Visualizations in Tableau | Basic Calculations in Tableau

1024

Virtualization in cloud | Docker vs Container | Types of Hypervisors

1025

Top Network Security Interview Questions That You Should Know

1026

What is Threat Modeling?

1027

Defensive Cybersecurity Approach for Organizations

1028

What is Regression Analysis with Example? | Model Evaluation & Selection | Regularization Techniques

1029

What is Classification Algorithms? | Decision Tree and Random Forests | Model Evaluation Metrics

1030

Decision Tree Visualization | Practical in Jupiter | Introduction to R Programming

1031

Data Cleaning & Pre-processing in R | Data Visualization with ggplot2 | Statistical Concepts in R

1032

Introduction To Cloud Computing | Limitation of Cloud | Service & Development Models

1033

Web Application Basics | OWASP Introduction | Exploiting Vulnerabilities of Web Application

1034

Introduction to Wireless Networks | Types of Wireless Encryption | Wireless Hacking Tools

1035

CCSP Last Minute Prep Q&A Session | CCSP Exam Preparation | CCSP Exam Questions

1036

Interview Questions for Cybersecurity Analyst in 2023

1037

How to Become a Cybersecurity Incident Responder?

1038

Denial of Service Attacks | Categories of Dos and DDos | DDos and Botnet | Dos Tools

1039

Data Frames in Pandas | Data Visualization | Basic Statistical Concepts

1040

Introduction to Data Science | Introduction to Python | Introduction to Jupyter Notebook

1041

What's Privilege Escalation? | Methods to Escalate Privileges | Covering the Tracks by Clearing Logs

1042

What is Malware and It's Types | Creating a Malware | Intro to Malware Analysis

1043

What is Sniffing? | Types of Sniffing | Sniffing Techniques

1044

What is AWS RDS?

1045

What is Enumeration? | Introduction to Metasploit Framework | Exploiting Vulnerabilities

1046

How to Prepare for CIPP/E Exam? | Benefits of European Privacy Exam | InfosecTrain

1047

What is Nmap and How will it Work? | Banner Grabbing | Scan Beyond IDS and Firewall

1048

How Vulnerable is GCP’s Multicloud Workload Solution?

1049

Top interview questions for Data Privacy Engineer

1050

How to Protect User Data?

1051

US Based Privacy Regulations

1052

What is SOP and CORS? | Cyber Security | Ethical Hacking InfosecTrain

1053

How To Improve Your Organization’s Security Posture?

1054

Reconnaissance Through Search Engines | Website Reconnaissance | Introduction To Scanning

1055

Introduction to Attack | Introduction to Penetration Testing | Penetration Testing Methodology

1056

Physical Security in an Enterprise | Physical Security Controls | Air Gaps

1057

How Redundancy can Increase availability? | Fault Tolerance Vs Redundancy | Backups and its Types

1058

What is Digital Forensics? | Chain of Custody | Tools Used in Digital Forensics

1059

What is Endpoint Encryption and how it works? | Remote File Encryption | InfosecTrain

1060

What is Networking and IP Address? | How Does It Work? | InfosecTrain

1061

How Black Swans Are Changing the Cybersecurity Landscape | InfosecTrain

1062

What is GDPR and its 7 Principles?

1063

How to comply with GDPR?

1064

What is CCSP Certification? | Career in Cloud Computing | InfosecTrain

1065

What is Data Privacy? | Types of Data | Data Privacy Controls | Data Privacy Laws

1066

Introduction to Packet Analysis | Mobile Device Security | Device Security

1067

Data Protection vs. Data Security

1068

Cyber Security Vs. Information Security | What is Hacking? | Types of Hackers | InfosecTrain

1069

An Introduction to Cryptography | Encryption and its Types | What is Encoding?

1070

Top Cloud Computing Interview Questions

1071

Network Security Appliances | What is a Firewall & It's Types? | What is Endpoint Security?

1072

CISSP InfosecTrain Review | CISSP Success Stories | Sunitha CISSP Gladiator

1073

What is Social Engineering | Types of Social Engineering Basics | InfosecTrain

1074

Risk Analysis, Evaluation, and Assessment

1075

Advanced Interview Questions for Threat Hunting

1076

CompTIA PenTest+ Domain 5: Tools and Code Analysis

1077

Basics of WAN | WAN Transmission Technology | Network Troubleshooting Tools | InfosecTrain

1078

What are the Routing and Switching? | Dynamic and Static Routing | Types of Switching | InfosecTrain

1079

Introduction of Networking Media | Bounded Network Media | Cybersecurity Foundation

1080

CompTIA PenTest+ Domain 4: Reporting and Communication

1081

CompTIA PenTest+ Domain 3: Attacks and Exploits

1082

How to Install Kali Linux ISO in Virtual Box | InfosecTrain

1083

Introduction to Types of Shell | What is Shells? | InfosecTrain

1084

What is Threat Intelligence? | Importance of Threat Intelligence | InfosecTrain

1085

What are the HTTP Methods? | Using HTTP Methods | InfosecTrain

1086

CompTIA PenTest+ Domain 2: Information Gathering and Vulnerability Scanning

1087

Basic Concepts of Web Applications | Fundamentals of Web Applications | InfosecTrain

1088

CompTIA PenTest+ Domain 1: Planning and Scoping

1089

What are the Basics of Networking? | Network Types | Networking Models | InfosecTrain

1090

PHP Code Injection | Step By Step Guide | Bug Bounty Hunting |InfosecTrain

1091

What is OS Command Injection? | Operating System Command Injection Tutorial | InfosecTrain

1092

Introduction to Netcat | What is NetCat? | How NetCat Works? | InfosecTrain

1093

Needs to Be a Hacker | All about Hacking | InfosecTrain

1094

What is Metasploit Framework? | Metasploit For Beginners | InfosecTrain

1095

Career Path For A Data Privacy Professional

1096

Threat Hunting: Methodologies, Tools and Tips

1097

What is PAM | Benefits & Need of Privileged Access Management | InfosecTrain

1098

What is Stage Hardening? | What is Stage Work Hardening? | InfosecTrain

1099

What is Encryption and Decryption ? | Encryption & Decryption | InfosecTrain

1100

What is Disaster Recovery? | Disaster Recovery Overview | InfosecTrain

1101

What is a Cyber Vault Services? | CyberVault Services | InfosecTrain

1102

How to Create and Manage Automatic Onboarding Rules | InfosecTrain

1103

How to Start a Career in Cloud Security? | Career in Cloud Security | InfosecTrain

1104

What is Azure API Management?

1105

What is XAMPP server | What is XAMPP used | InfosecTrain

1106

Why Should you Learn CCSK Plus Training & Certification with InfosecTrain

1107

Installation of CyberArk Privileged Session Manager | Privileged Session Manager | InfosecTrain

1108

What is CYSA+ Certification? | Cybersecurity Analyst+ | CompTIA CySA+

1109

What is privileged session manager? | Benefits of Privileged Session Manager | InfosecTrain

1110

Which Cloud Service Provider is Best? | How to Start Career in Cloud Computing | InfosecTrain

1111

Red Teaming Persistence Technique

1112

What is ISO 27001 and Why is it Important for Organizations? | InfosecTrain

1113

How to Start Career in Cloud Computing | Cloud Computing Prerequisites | InfosecTrain

1114

What is OSI Model | Layers of OSI Model | InfosecTrain

1115

How To Exploit Windows 7 | Window 7 Exploitation | InfosecTrain

1116

What is a CyberArk Vault? | Why CyberArk Vault Is Still Important? | InfosecTrain

1117

What is CyberArk Report | Reports in CyberArk | InfosecTrain

1118

What is Stand Alone Architecture | Standalone Architecture |InfosecTrain

1119

CyberArk Basic Troubleshooting Steps | What is CyberArk? | InfosecTrain

1120

Types of Security Controls

1121

Types of Privileged Users | Why You Need Privileged Account Management | InfosecTrain

1122

What is the Difference Between Secrecy and Privacy | Secrecy Vs. Privacy | InfosecTrain

1123

How to prepare for CISA Certification | CISA Domain | CISA Exam Structure

1124

How to Start a Cyber Security Career in 2023 Cyber Security Scope InfosecTrain

1125

Masterclass Cloud Security Practitioner | Become a Cloud Security expert

1126

An Introduction to Bug Bounty | Bug Bounty for beginners

1127

How to Pass CISM in First Attempt? | Coffee with Prabh | InfosecTrain

1128

CISSP InfosecTrain Review | CISSP Success Stories | Akash CISSP Gladiator

1129

Data Privacy Day : How to Begin a Career in Data Privacy with GDPR Certification

1130

Data Privacy Day : 3 Things You Must Know About Data Privacy

1131

What is CyberArk | CyberArk Full Introduction | InfosecTrain

1132

All you Need to Know About Becoming a Cloud Engineer in 2023

1133

ISO/IEC 27017 2015 Cloud Computing Guidelines InfosecTrain

1134

What is the important part of Incident Response? | Cloud IR Post Incident Activities

1135

How to Perform a Cloud Security Assessment?

1136

Cloud Provider Roles and Responsibilities | Career in Cloud Computing | InfosecTrain

1137

Roles and Responsibilities of a Threat Hunter

1138

Importance of Information Security Programs for Businesses

1139

ISO 27001 Security Awareness Training and Compliance

1140

Highest-Paying Jobs in the Cloud Domain

1141

Risk and Challenges of Cloud Computing | Platform Risks in Cloud Security | InfosecTrain

1142

Common Concerns for Cloud Data Privacy | Cloud Computing Security Concerns | InfosecTrain

1143

Common Interview Questions for ISO 27001

1144

Requirements For Effective Threat Hunting

1145

Lead Implementer Interview Questions

1146

What are the Essential Pillars of Cyber Security?

1147

Compliance and Audit Management in the Cloud | Cloud Audit and Compliance | InfosecTrain

1148

Top Trending Kali Linux Tools

1149

Primary Cloud Administrative Concerns | Cloud System Administrator | InfosecTrain

1150

Data Privacy Primary Roles and Responsibilities | Data Privacy Laws | InfosecTrain

1151

All About DNS Spoofing

1152

What is Cloud Security Governance | Architecture of Cloud Computing Security Governance

1153

What is Cloud Audit Management | Auditing Cloud Security | InfosecTrain

1154

Rebuild Your SOC with Next Generation SIEM Features

1155

How to Become an IT Auditor in 2023?

1156

How to Respond to a Data Breach?

1157

Certification of Cloud Controls | Cloud Security Controls | InfosecTrain

1158

Application Migration Strategies

1159

Phases of AWS Migration

1160

Career Path For Cybersecurity

1161

BC&DR Within and Outside of The CSP | Business Continuity and Disaster Recovery (BCDR) Solution

1162

Business Continuity and Disaster Recovery (BCDR) Solution in Cloud | BCDR Cloud Solutions

1163

Skills Needed to Become an Information Security Analyst

1164

What is Attestation in Cloud Computing? | Attestation of Cloud Control | InfosecTrain

1165

Docker vs. Virtual Machines

1166

Top Data Privacy Certifications

1167

Cloud Deployment Model In Cloud Computing | Public Cloud vs Private Cloud vs Hybrid Cloud

1168

Why Choose The Internal Hands-On Audit Course From InfosecTrain?

1169

How AI and ML are Used in Cybersecurity?

1170

What You Must Know About Data Privacy?

1171

Cloud Security Engineer Interview Questions & Answers | Cloud Security Engineer QA for 2023

1172

How Ethical Hacking is Significant for Corporates?

1173

Why Learn AWS in 2023?

1174

CCSP Practice Questions for 2023 | CCSP Exam Preparation | CCSP Exam Practice Q&A

1175

How to Build a Successful Career in Network Security in 2023?

1176

The Digital Personal Data Protection Bill, 2022: Analysis

1177

What Is GDPR? | Introduction to US Privacy Laws | InfosecTrain

1178

Introduction and Benefits of Cloud Services | What is IT Cloud Services? | InfosecTrain

1179

What’s New in ISO 27001?

1180

What is Risk Management? | Risk Management Process | InfosecTrain

1181

What Is IT Governance Framework? | Basics of Corporate Governance | InfosecTrain

1182

What is eDiscovery? | Introduction to E-Discovery | InfosecTrain

1183

How to Build a Successful Career in Cloud Auditing in 2023?

1184

Basics Of Network Security | Network Security Model | InfosecTrain

1185

NIST Cloud Computing Reference Architecture | Cloud Computing Architecture | InfosecTrain

1186

What is IaaS, PaaS & SaaS in Cloud Computing | Cloud Computing Services Models

1187

Types of Firewalls in Network Security

1188

What is Cloud Governance and (ERM) Enterprise Risk Management?

1189

Cloud Service and Deployment Models | Cloud Computing Deployment Models | InfosecTrain

1190

Top 10 Cloud Service and Advantages | Advantages of Cloud Computing | Infosectrain

1191

How to Build a Successful Career in Security Testing in 2023?

1192

Benefits of Cloud Security | Security Services and Security Goals | InfosecTrain

1193

Cloud Deployment Models : Public Cloud vs Private Cloud vs Hybrid Cloud

1194

Day 1:Machine Learning for Cybersecurity | Introduction to Python | InfosecTrain

1195

What is a Network Security Administrator?

1196

Day 2: Machine Learning for Cybersecurity | Introduction to Machine Learning | InfosecTrain

1197

Day - 3 Machine Learning for Cybersecurity Bootcamp by Nawaj | InfosecTrain

1198

What is Threat Hunting? | Useful Threat Hunting Tools | InfosecTrain

1199

What is CRISC? | Who Needs CRISC ? & it's Benefits | InfosecTrain

1200

(ISC)² ® CSSLP Domain 8: Secure Software Supply Chain (11%)

1201

Cloud Auditing Masterclass and CCAK Certification Prep | CCAK QA Session | InfosecTrain

1202

CSSLP Domain 7: Secure Software Deployment, Operations, Maintenance

1203

CSSLP Domain 6 Secure Software Lifecycle Management

1204

(ISC)² ® CSSLP Domain 5: Secure Software Testing (14%)

1205

What is the Cyber Kill Chain Process?

1206

(ISC)² ® CSSLP Domain 4: Secure Software Implementation

1207

(ISC)² ® CSSLP Domain 3: Secure Software Architecture and Design

1208

(ISC)² ® CSSLP Domain 2: Secure Software Requirements (14%)

1209

IAM & SailPoint Career Guide | IAM Role in Organization Information Security | InfosecTrain

1210

ISC2’s CSSLP Domain 1: Secure Software Concepts (10%)

1211

Day 3 Cloud Security Masterclass | Encryption and Key Management in Cloud | InfosecTrain

1212

Day 2 Cloud Security Masterclass | Threat Detection Tools in AWS | InfosecTrain

1213

Day 1 Cloud Security Masterclass | AWS Well-Architected Framework | InfosecTrain

1214

Top Tools Covered in CEH v12

1215

How Do I Get My First Job In SOC?

1216

Everything You Need To Know About SOC Expert Course

1217

Day 2 All About AWS Security Speciality | Native Security Tools in AWS | InfosecTrain

1218

Day-1 All About AWS Security Speciality | Introduction to AWS cloud Security | InfosecTrain

1219

Top Trending Cybersecurity Jobs in 2023

1220

Top Cybersecurity Courses to Choose in Your Country

1221

Why Choose CCAK from InfosecTrain?

1222

Domain 5 of AZ-204: Connect to and Consume Azure Services & Third-Party Services

1223

Day 1 Cyber Security Fundamentals | Introduction to Cybersecurity | InfosecTrain

1224

Why Learn Certified Ethical Hacker (CEH) With InfosecTrain?

1225

Day - 3 Cyber Security Fundamentals | What is Web Application and Their Attacks | InfosecTrain

1226

Day 2 Cyber Security Fundamentals | Social Engineering Attacks and Malware | InfosecTrain

1227

Domain 4 of AZ-204: Monitor, Troubleshoot and Optimize Azure Solutions

1228

Why Choose CDPP with InfosecTrain?

1229

All About Data Privacy

1230

InfosecTrain Trainer Testimonial | Feedback from SAAZ RAI | InfosecTrain

1231

CompTIA Security+ Interview Questions & Answers| Security+ Practice Questions (SY0-601)

1232

Bug Bounty Beginner's Guide 2022 | Bug Bounty Crowd Security Testing

1233

How to Become an IT Lead Auditor?

1234

How To Prepare For CISSP Exam in 2023

1235

How To Prevent Zero-Day Attacks?

1236

Roles and Responsibilities of a Data Protection Officer

1237

Keypoint of IAPP CIPP/E | Introduction of IAPP CIPP/e and CIPM | InfosecTrain

1238

CISM Vs. CRISC

1239

Phishing Scams Trending in 2022

1240

What's new in C|EH v12?

1241

Types of Network Security Attacks

1242

How to Pass the CISA Exam | CISA Q&A Session | InfosecTrain

1243

InfosecTrain Trainer Testimonial Feedback from Rajesh Sandheer InfosecTrain

1244

CISSP InfosecTrain Review | CISSP Success Stories | Ravinder CISSP Gladiator

1245

Top Beginner Level Certifications in Information Security

1246

Top Security Testing Certifications that led in 2022

1247

Day 2 : CISSP Question Practice | CISSP Practice Tests | CISSP Exam practice questions

1248

Day - 1 CISSP Question Practice | CISSP Practice Tests | CISSP Exam Questions

1249

What is SOC Analyst Job description, Salary & skills Security Operations Center Analyst

1250

What is Multi-Cloud Network Architecture?

1251

why do you need cryptography? | What is Cryptography | Introduction to Cryptography

1252

What is File System in SOC? | InfosecTrain

1253

What is System Base Forensics in SOC Team | InfosecTrain

1254

How to become a Security System Engineer?

1255

CISSP or CISM: Which is right for you? | CISSP vs CISM | InfosecTrain

1256

Day 2: Cyber Security Masterclass | Cyber Security Full Course | Cyber Security

1257

Cloud Practitioner Interview Questions

1258

Benefits of Getting CCSP Certified

1259

Day 3: Cyber Security Masterclass | Cyber Security Full Course | Cyber Security

1260

Day 4 : Cyber Security Masterclass | Cyber Security Full Course | Cyber Security

1261

What is Real-Time Monitoring in SOC | Functions of SOC Team | InfosecTrain

1262

Day 1: Cyber Security Masterclass | Cyber Security Full Course | Cyber Security

1263

Cybersecurity Trends in 2023

1264

Uber Has Been Hacked | UBER HACKED by 18year old? | How a Teenager Hacked Uber | Uber hack

1265

Cyber Security Vs. Cloud Computing

1266

Expert Masterclass Introducing CEH v12 | What is CEH? | Certified Ethical Hacker CEH v12

1267

What Makes our Clients Choose InfosecTrain? | Why Choose Course With InfosecTrain?

1268

How to Prepare for CISSP Domain 1 | Security & Risk Management | How to Pass CISSP Exam

1269

What is Threat Hunting and How Can You Do it Right?

1270

AWS Interview Questions Part 10 | AWS Interview Questions And Answers | AWS Training | Infosectrain

1271

AWS Interview Questions Part 9 | AWS Interview Questions And Answers | AWS Training | Infosectrain

1272

AWS Interview Questions Part 8 | AWS Interview Questions And Answers | AWS Training | Infosectrain

1273

Why is Learning AWS Important for Employees?

1274

AWS Interview Questions Part 6 | AWS Interview Questions And Answers | AWS Training | Infosectrain

1275

Hands on Internal Audit Masterclass | What is Internal Audit? | Types of Internal Audits

1276

AWS Interview Questions Part 7 | AWS Interview Questions And Answers | AWS Training | Infosectrain

1277

What Is GRC? | Governance Risk Management Compliance | Why a GRC Framework?

1278

How to Configure Azure Front Door Service as an Application Gateway | InfosecTrain

1279

What's New in AWS Certified Solutions Architect Associate | SAA-C02 vs. SAA-C03 | AWS SAAC

1280

Day 2 - Prepare for Data Privacy | Introduction of IAPP CIPP/e and CIPM | European Privacy

1281

Day 1 - Prepare for Data Privacy | Introduction of IAPP CIPP/e and CIPM | European Privacy

1282

AWS Interview Questions Part 5 | AWS Interview Questions And Answers | AWS Training | Infosectrain

1283

AWS Interview Questions Part 4 | AWS Interview Questions And Answers | AWS Training | Infosectrain

1284

How to Control Network Access on Your Azure Subnet with Azure Firewall

1285

AWS Interview Questions Part 3 | AWS Interview Questions And Answers | AWS Training | InfosecTrain

1286

How To Manage Azure Active Directory Identities: A Step-by-Step Guide

1287

AWS Interview Questions And Answers | AWS Interview Questions Part 2 | AWS Training | Infosectrain

1288

What is Penetration Testing?

1289

Red Team Vs. Blue Team

1290

Difference between IP Address and MAC Address

1291

Azure Cloud Connectivity: How to Connect using VPN and Express Route

1292

AWS Interview Questions Part 1 | AWS Interview Questions And Answers | AWS Training | Infosectrain

1293

What is HSM (Hardware Security Module)? | Overview of HSM | Cloud Hardware Security Module

1294

Data Science Interview Questions | Data Science Interviews | Data Science Tutorial | InfosecTrain

1295

Cloud Security Best Practices

1296

What is Trusted Execution Environment (TEE) | TEE (Trusted Execution Environment)

1297

What is TPM? | TPM 2.0 using Windows 11 | TPM -Trusted Platform Module

1298

What is HSM (Hardware Security Module)?

1299

Becoming a Cybersecurity Professional without a Tech Degree

1300

What’s new in CompTIA A+?

1301

Cloud Security Interview Questions and Answers | Cloud Computing Interview | InfosecTrain

1302

Masterclass on Advanced Penetration Testing | Ethical Hacking Lifecycle | InfosecTrain

1303

Security Operations Center SOC Interview Preparation | SOC Interview Preparation

1304

All About SQL (Structured Query Language) Masterclass Day 3 | InfosecTrain

1305

Top AWS Architect Interview Questions In 2022

1306

All About SQL (Structured Query Language) Masterclass Day 2 | InfosecTrain

1307

All About SQL (Structured Query Language) Masterclass Day 1 | InfosecTrain

1308

What’s New in Certified Ethical Hacker CEH v12 | CEH New Version

1309

All About IAPPs CIPP/E, CIPM, and CIPT Training Course from InfosecTrain

1310

How to become a Chief Privacy Officer?

1311

Types of IT Security Audit

1312

Top 10 Data Science Applications and Use Cases | Data Science Skills

1313

How to Prepare for CSSLP Exam | CSSLP Exam Tips | Tips to Pass the CSSLP Exam

1314

Top interview questions for AWS Solutions Architect

1315

What is Ransomware Attack Anatomy? | Types, Protection and Removal

1316

What's New in CCSP 2022 Domain 4 Cloud Application Security | Tips for CCSP Domain 4

1317

What's New in CCSP Domain 3 Cloud Platform Infrastructure Security | Tips for CCSP Domain 3

1318

Why choose SailPoint over some other Tool?

1319

How to Prepare for CISSP Domain 5 | Identity and Access Management | InfosecTrain

1320

How to prepare for CISA Exam | Introduction to CISA | CISA Faqs

1321

Top Cybersecurity Interview Questions

1322

What is Docker and its benefits?

1323

What is Amazon GuardDuty?

1324

Top Methodologies to Improve Penetration Testing

1325

All You Need to Know About Web Hunting | Threat Hunting | InfosecTrain

1326

Overview of MITRE ATT&CK Navigator | Security Testing | InfosecTrain

1327

AWS Certifications: What You Need to Know | Career Benefits of AWS Certifications

1328

What is Cloud Migration? Strategy, Process, and Tools

1329

How does Microsoft Sentinel work?

1330

What is Network Traffic Hunting? l How does it Work? l Threat Hunting

1331

SOC Analyst Interview Questions & Answers | Part 1 | Questions for SOC Analyst Interview

1332

What is Extended Enterprise Risk? | Types of Enterprise Risk

1333

Identity: Rise of New Security Pillar | Cloud-Based Identity Solution

1334

Concept of Cyber Kill Chain & Threat Hunting | Cyber Kill Chain | Threat Hunting

1335

Why choose “Data Science with Cybersecurity” with InfosecTrain?

1336

Phases of Ethical Hacking

1337

Top Vulnerability Analyst Interview Questions

1338

AWS Penetration Testing Tools

1339

Curse of Free Downloads | Ways to Prevent Computer Security Threats

1340

How to Protect Organizations from Cyberattacks?

1341

Top Trending Cloud Certification In 2022

1342

Interview Questions for Microsoft Sentinel

1343

TCP Vs. UDP

1344

Docker Image vs. Container: What You Need to Understand!

1345

Azure Storage Account Security | Authentication Method in Storage Account

1346

Day 2 : PIMS Implementation | Secure Development Policy | ISO 27701 Privacy

1347

DAY 1 : PIMS Implementation | Introduction of Privacy Information Management System

1348

Best Practices to Secure SaaS Applications

1349

EC-Council CCISO Domain 1: Governance, Risk, and Compliance

1350

DevOps Vs. SysOps

1351

ISACA CDPSE Domain 3: Data Lifecycle

1352

Introduction to AWS Architect Certifications | AWS Learning Paths

1353

ISACA CDPSE Domain 2 : Privacy Architecture

1354

ISACA CDPSE Domain 1: Privacy Governance

1355

Cloud Engineer vs. DevOps Engineer

1356

Cloud Storage Best Practices

1357

Emerging Cyber Threats in 2022

1358

Benefits of EC-Council Certified Cloud Security Engineer (C|CSE)

1359

Career Scope as a SOC Professional

1360

How to prepare for C|PENT Exam?

1361

Infosectrain Review - CCSP | Success Stories | @Richa Agrawal CCSP Gladiator

1362

Infosectrain Review - CISSP | Success Stories | @Anwar Hussain CISSP Gladiator

1363

What is Threat Hunting 101 | Scope and Industry | Threat Hunting Tools

1364

What's New in CCSP 2022 Domain 2 Cloud Data Security | Tops tips for CCSP 2022

1365

What's New in CCSP 2022 | CCSP Domain 1 Part 2 | Tops tips for CCSP 2022

1366

What's New in CCSP 2022 | CCSP Domain 1 Part 1 | Tops tips for CCSP 2022

1367

Everything You Need to Know For CompTIA CySA+ | InfosecTrain

1368

Cloud Security Fundamentals | What is Cloud Security? | Secure Your Cloud By Rishabh

1369

What is Reconnaissance? Where you can do Reconnaissance ? | Reconnaissance Tool | day 2 CEH

1370

What is Ethical Hacking? Learn Ethical Hacking | Learn CEH Day 1 | InfosecTrain

1371

What is Cryptography | Types of Cryptography | InfosecTrain

1372

DAY 2 : Data Science For Cyber Security using Python

1373

DAY 1 : Data Science For Cyber Security using Python

1374

What is IoT? | How IoT Works? | InfosecTrain

1375

What is Multi-factor Authentication | InfosecTrain

1376

What is DNS Cache Poisoning and Firewall? | InfosecTrain

1377

What is Privilege Escalation? | InfosecTrain

1378

What is DoS & DDos Attack? | Categories of DOS and DDOS Attacks | InfosecTrain

1379

What is Scanning In Ethical Hacking? | How to use Scanning in Ethical Hacking? | InfosecTrain

1380

Nmap Step by Step tutorial | InfosecTrain

1381

Nmap Options Explained | InfosecTrain

1382

How to Prepare for ISACA CDPSE | What is Privacy ? | CDPSE Exam Preparation

1383

TCP - Three-way handshake in detail | TCP 3-Way Handshake Process | InfosecTrain

1384

What is Reconnaissance in ethical hacking? | InfosecTrain

1385

What are the Types of Hacker in cyber security | InfosecTrain

1386

What are Security Threat Actors? | Types of Threat Actors | InfosecTrain

1387

Security Controls in Cyber Security | Security Control Function | InfosecTrain

1388

What is Classful IP Address? | InfosecTrain

1389

The Five Types of SOC Models | InfosecTrain

1390

What is a Subnet Mask? | InfosecTrain

1391

What is Three way and four way handshake | Difference Between 3-way & 4-way Handshake

1392

What is SYN Flood Attack? | How Can we prevent SYN Flood Attack? | InfosecTrain

1393

What is Reconnaissance in Cybersecurity? | Activity of Reconnaissance | InfosecTrain

1394

What is Network Topology? | How Many Types of Network Topology? | InfosecTrain

1395

What is Data Visualization? | Types of Data Visualization | InfosecTrain

1396

What is Internet Assigned Number Authority? | InfosecTrain

1397

Prepare for CISSP Exam | CISSP Exam Domains | CISSP Question and Answer practice | InfosecTrain

1398

IP Address Classes explained | InfosecTrain

1399

Dynamic Host Configuration Protocol Explained | How DHCP works? | InfosecTrain

1400

What is Pyramid of Pain in details? | InfosecTrain

1401

What is Network Security? | Types of Network Security | InfosecTrain

1402

What is Cluster Analysis? | Cluster Analysis in Detail? | InfosecTrain

1403

What is CIA Triad? | Confidentiality, Integrity and Availability | InfosecTrain

1404

What is a DHCP Starvation Attack? | InfosecTrain

1405

Incident Response in Detail? | How many stages in Incident Response? | InfosecTrain

1406

An Introduction to Bug Bounty | What is Bug Bounty | How can I become a Bug Bounty Expert?

1407

What is Data Privacy? | Why data privacy is important? | InfosecTrain

1408

What is AWS IAM | AWS Identity and Access Management | InfosecTrain

1409

Infosectrain Review - ISO : 27001 Lead Auditor | Success Stories | Mohammad Haziq ISO Gladiator

1410

CISA Practice Questions | CISA Exam Preparation | CISA Q&A Part 3 | InfosecTrain

1411

CISA Practice Questions | CISA Exam Preparation | CISA Q&A Part 2 | InfosecTrain

1412

Introduction to CISA Exam | How to Attempt CISA Exam | CISA Practice Q&A | CISA Q&A Part 1

1413

CCSP Domain 6: Legal, Risk and Compliance | InfosecTrain

1414

CCSP Domain 5: Cloud Security Operations | InfosecTrain

1415

CCSP Domain 4 : Cloud Application Security | Identity and Access Management | InfosecTrain

1416

CCSP Domain 3: Cloud Platform & Infrastructure Security | InfosecTrain

1417

CCSP Domain 2 : Cloud Data Security | Data Security Life Cycle | InfosecTrain

1418

CCSP Domain 1 : Cloud Concepts, Architecture, and Design | InfosecTrain

1419

Introduction to CCSP | About CCSP Training | What is CCSP certification? | InfosecTrain

1420

CRISC Practice Q&A | CRISC Exam Interview Question Preparation | InfosecTrain

1421

Infosectrain Review - CISSP | Success Stories | Siddesh CISSP Gladiator

1422

Day 2 : Become Expert in Cloud Security Practitioner | What is Security as a Service | InfosecTrain

1423

Day 1 : Become Expert in Cloud Security Practitioner | Introduction to Cloud | InfosecTrain

1424

What are Threat Intelligence & Threat Hunting? | InfosecTrain

1425

Kusto Query Language (KQL) | Scalar Operation and Function | Day 2- KQL

1426

Kusto Query Language (KQL) | What is KQL? | Use of KQL? | Day 1- KQL

1427

RedTeam : Attacks in Active Directory | Day 4: RedTeam | InfosecTrain

1428

RedTeam : What is Active Directory | Terminologies in Active Directory | Day 3: RedTeam

1429

RedTeam : What is Metasploit Framework | Day 2: RedTeam | InfosecTrain

1430

RedTeam : What is Red Team Kill Chain | Day 1: RedTeam | InfosecTrain

1431

Day 2: Data Science Project using Python | Machine Learning | InfosecTrain

1432

Day 1: Data Science Project using Python | What is Data Science? | InfosecTrain

1433

What is Cloud Security Practitioner? | Cloud Security Practitioner | InfosecTrain

1434

CyberArk Basic to Advanced | What is CyberArk? | InfosecTrain

1435

Day 2: Purview of Cyber Security | Evolution Of Attacks | InfosecTrain

1436

Day 1: Purview of Cyber Security | What is information security | InfosecTrain

1437

CCSP Exam Preparation | CCSP Questions Practice | InfosecTrain

1438

Day 2: SOC -The Central Nervous System of Security | What is SIEM | InfosecTrain

1439

Day 1: SOC -The Central Nervous System of Security | What is SOC | InfosecTrain

1440

Infosectrain Review - CISSP | Success Stories | Balakrishnan CISSP Gladiator

1441

Infosectrain Review - CISSP | Success Stories | Santosh Patnaik CISSP Gladiator

1442

Infosectrain Review - CISSP | Success Stories | Anil Gangwani CISSP Gladiator

1443

Infosectrain Review - CISSP | Success Stories | Akhil Verma(Paytm Money) CISSP Gladiator

1444

Infosectrain Review - CISM | Success Stories | Zeshan Ahmad CISM Gladiator

1445

Infosectrain Review - CISM | Success Stories | JAIKISHAN SAH CISM Gladiator

1446

Infosectrain Review - CISM | Success Stories | Harshit Mathur CISM Gladiator

1447

Infosectrain Review - CEH | Success Stories | Pranay Paliwal CEH Gladiator

1448

What is DoS & DDoS Attack? | Difference between DoS & DDoS | InfosecTrain

1449

What is Authentication and Authorization? | InfosecTrain

1450

What is a Firewall? | Types of Firewall? | InfosecTrain

1451

Infosectrain Review - CCSK | Success Stories | Sathyapriya G CCSK Gladiator

1452

Infosectrain Review - CISM | Success Stories | Anand CISM Gladiator

1453

Infosectrain Review - CISSP | Success Stories | Cornelius Okudzeto CISSP Gladiator

1454

Infosectrain Review - CISSP | Success Stories | SAINATH CISSP Gladiator

1455

Infosectrain Review - CISSP | Success Stories | Shriya CISSP Gladiator

1456

Infosectrain Review - CISSP | Success Stories | Vivek Dwivedi CISSP Gladiator

1457

Infosectrain Review - ISO 27001 | Success Stories | Dheeraj Simha ISO Gladiator

1458

CCSK Exam Prep | CCSK Certification path | InfosecTrain

1459

Threat Hunting & Threat Intelligence | InfosecTrain

1460

OSINT for Infosec Professionals | What is OSINT? | InfosecTrain

1461

What's New in AWS Certified Solutions Architect -Associate (SAA-C03) | InfosecTrain

1462

MITRE For Red Teaming | What is Red Team? | MITRE Attacks Framework | InfosecTrain

1463

CISM Domain 1 – Information Security Governance | CISM Preperation | InfosecTrain

1464

Whats New in CISM 2022 | CISM 2022 New Syllabus | InfosecTrain

1465

Data Privacy Europe and GDPR Certification Prep | CIPP/E Introduction | InfosecTrain

1466

Data Science Career Guide - Interview Preparation | Interview Questions | InfosecTrain

1467

DAY 2: CEH v11 with Question Practice | CEH Practice questions | InfosecTrain

1468

DAY 1: CEH v11 with Question Practice | Introduction to CEH v11 | InfosecTrain

1469

GRC Bootcamp | Governance Risk Management Compliance | InfosecTrain

1470

Prepare for CCSP certification Exam | What is CCSP? | CCSP Domains | InfosecTrain

1471

Day 2 : Basics of Cloud Computing By Yash | Microservices | Azure Services | InfosecTrain

1472

Day 1 : Basics of Cloud Computing | Cloud Models | Cloud Services | InfosecTrain

1473

Day 3 : SOC Prep for the Best | Career in SOC | Interview Preparation | InfosecTrain

1474

Day 2 : SOC Need of Era | Domains of SOC | SOC Services | InfosecTrain

1475

Day1 : SOC Demystifying | SOC Types | SOC Models | SOC Functions | InfosecTrain

1476

SOC Analyst Online Training Course

1477

Payment Card Industry Data Security Standard (PCI-DSS) Training online

1478

Introduction of AWS Cloud Penetration Testing

1479

Network Security Introduction By Sanyam

1480

CCSK Introduction By Krish

1481

JCP Day 19 | Introduction To Digital Forensics | InfosecTrain

1482

JCP Day 18 | Incident Response by Ashish | InfosecTrain

1483

JCP Day 17 | Identity And Access Management by Ashish | InfosecTrain

1484

JCP Day 16 | Python Scripting by Ashish | InfosecTrain

1485

JCP Day 15 | Web scraping and python for Pentesters | InfosecTrain

1486

JPC Day 13 | Methodology and Hacking by Sanyam | Infosectrain

1487

JCP Day 12 | Scripting, Information Gathering & Enumeration By Sanyam | InfosecTrain

1488

JPC Day 11 | Introduction to Red Teaming & Python For Pentesters by Sanyam | InfosecTrain

1489

JPC Day 10 | Cloud Hacking & Cloud Security and Security Tool by Yash | InfosecTrain

1490

JCP Day 9 | Threats, Vulnerabilities and Attack based on cloud by Yash | InfosecTrain

1491

JCP Day 8 | Introduction To Azure Environment by Yash | InfosecTrain

1492

JPC Day 7 | What is Container Technology? | Cloud Security by Yash | InfosecTrain

1493

JCP Day 6 | what is Cloud Computing? | Cloud Security by Yash | InfosecTrain

1494

JPC Day 5 | Social Engineering Attacks & Cryptography by Srikanth | InfosecTrain

1495

JCP Day 4 | Different Types of Cyber Attacks and Counter Measures by Srikanth | InfosecTrain

1496

JCP Day 3 | Different Types of Malwares by Srikanth | InfosecTrain

1497

JCP Day 2 | What is Hacking Methodology by Srikanth | InfosecTrain

1498

JPC Day 1 | Introduction to IS, CS & Careers in Cybersecurity by Srikanth | InfosecTrain

1499

SIEM (Security Information & Event Management) | SIEM Methodologies | Splunk In-Depth | InfosecTrain

1500

Web Application Testing | OWASP Top 10 | Cyber Security Training | InfosecTrain

1501

Network Assessment & Pen Testing | What is VAPT ? | Vulnerability Assessment | Infosectrain

1502

How to Detect Phishing Attacks | What is PHISHING ? | Infosec Train

1503

What is QRadar ? Introduction to QRadar | IBM Security QRadar SIEM

1504

DAY 2 : CompTIA Security+ (SY0-601) Exam Preparation By Sanyam Negi | InfosecTrain

1505

DAY 1 : CompTIA Security+ (SY0-601) Exam Preparation By Sanyam Negi | InfosecTrain