Channels

infosectrain01

75 Followers

InfoCentral

32 Followers

Info Central Clips

6 Followers

InfosecTrain09

4 Followers

InfoCentral

3 Followers

info central

0 Followers
  1. Introduction to PCI DSS | Key Requirements of PCI DSS | PCI DSS Compliance

    Introduction to PCI DSS | Key Requirements of PCI DSS | PCI DSS Compliance

    1.18K
  2. Why SOC (Security Operations Center) Training with Infosectrain?

    Why SOC (Security Operations Center) Training with Infosectrain?

    25
  3. CCAK, ISO 27001 LA & CEH InfosecTrain Review | Samipan Das success story CCAK, ISO 27001 LA & CEH

    CCAK, ISO 27001 LA & CEH InfosecTrain Review | Samipan Das success story CCAK, ISO 27001 LA & CEH

    16
  4. Certified Protection Professional (CPP) Exam Structure and CPP Preparation Plan

    Certified Protection Professional (CPP) Exam Structure and CPP Preparation Plan

    994
  5. InfosecTrain Celebrating the Grand Opening of New Office in Noida

    InfosecTrain Celebrating the Grand Opening of New Office in Noida

    4
  6. What's New in ISO 27001:2022 | ISO 27001 History | ISO 27001:2013 Minor Updates

    What's New in ISO 27001:2022 | ISO 27001 History | ISO 27001:2013 Minor Updates

    28
  7. PCI DSS Compliance Roadmap | Understanding PCI DSS | PCI-DSS Q&A Session

    PCI DSS Compliance Roadmap | Understanding PCI DSS | PCI-DSS Q&A Session

    850
  8. What is ISO 27001 Lead Auditor? | Roles and Responsibilities of an ISO 27001 Lead Auditor (Day 2)

    What is ISO 27001 Lead Auditor? | Roles and Responsibilities of an ISO 27001 Lead Auditor (Day 2)

    53
  9. What is Archer? | What is Integrated Risk Management? | RSA Archer Tools?

    What is Archer? | What is Integrated Risk Management? | RSA Archer Tools?

    26
  10. What is the Key Difference between AWS Guardduty and Detective?

    What is the Key Difference between AWS Guardduty and Detective?

    9
  11. What is AWS S3 Object Lock? | How to use Amazon S3 Object Lock?

    What is AWS S3 Object Lock? | How to use Amazon S3 Object Lock?

    6
  12. Day - 2: CISO AWARENESS PROGRAM The SOC Blueprint | Increasing Attack Surface | Threat Landscape

    Day - 2: CISO AWARENESS PROGRAM The SOC Blueprint | Increasing Attack Surface | Threat Landscape

    30
  13. How Automation Impacts Network Management? | Navigating Networks: A CCNA Journey [Part 2]

    How Automation Impacts Network Management? | Navigating Networks: A CCNA Journey [Part 2]

    66
  14. What is a virtual private cloud (VPC)? | Why is VPC Used? | Key Features of a VPC

    What is a virtual private cloud (VPC)? | Why is VPC Used? | Key Features of a VPC

    2
    0
    34
  15. Day - 1 CISO AWARENESS PROGRAM The SOC Blueprint | What is Soc? | Traditional SOC Vs Mordern SOC

    Day - 1 CISO AWARENESS PROGRAM The SOC Blueprint | What is Soc? | Traditional SOC Vs Mordern SOC

    44
    1
  16. What is Android Architecture? | Multi Tiered Architecture | Android Layeres Architecture

    What is Android Architecture? | Multi Tiered Architecture | Android Layeres Architecture

    19
  17. 5 Important Facts About Data Privacy You Must Know

    5 Important Facts About Data Privacy You Must Know

    7
  18. What is CCNA? | What is VLAN and Why it is Used? [Part 1]

    What is CCNA? | What is VLAN and Why it is Used? [Part 1]

    2
    0
    107
  19. CCSP Exam Preparation | CCSP Exam Tips & Tricks [Part 1]

    CCSP Exam Preparation | CCSP Exam Tips & Tricks [Part 1]

    27
  20. What is Insecure Deserialization? | Mitigation for Insecure Deserialization

    What is Insecure Deserialization? | Mitigation for Insecure Deserialization

    36
  21. What's security terminology? | What's a Spoofing Attack? | Types of Traffic

    What's security terminology? | What's a Spoofing Attack? | Types of Traffic

    39
  22. What is Incident Handling in cyber security? | Introduction to Incident Response

    What is Incident Handling in cyber security? | Introduction to Incident Response

    2
  23. Day 3 : Protecting personal information | Password security and management

    Day 3 : Protecting personal information | Password security and management

    6
  24. What is Android Architecture? | Multi Tiered Architecture | Android Layeres Architecture

    What is Android Architecture? | Multi Tiered Architecture | Android Layeres Architecture

    10