Channels

infosectrain01

75 Followers

InfoCentral

32 Followers

Info Central Clips

6 Followers

InfosecTrain09

4 Followers

InfoCentral

3 Followers

info central

0 Followers
  1. Denial of Service Attacks | Categories of Dos and DDos | DDos and Botnet | Dos Tools

    Denial of Service Attacks | Categories of Dos and DDos | DDos and Botnet | Dos Tools

    2
    0
    280
  2. Day - 11: Overview of Threat Detection | Event vs. Incident | What is Incident Response?

    Day - 11: Overview of Threat Detection | Event vs. Incident | What is Incident Response?

    5
  3. InfosecTrain Celebrating the Grand Opening of New Office in Noida

    InfosecTrain Celebrating the Grand Opening of New Office in Noida

    4
  4. Introduction to CISM | Scope of CISM | CISM Exam Syllabus

    Introduction to CISM | Scope of CISM | CISM Exam Syllabus

    41
  5. Introduction to TCP/IP Networking | TCP/IP Networking Model | IP Routing Basics

    Introduction to TCP/IP Networking | TCP/IP Networking Model | IP Routing Basics

    26
  6. Certified Protection Professional (CPP) Exam Structure and CPP Preparation Plan

    Certified Protection Professional (CPP) Exam Structure and CPP Preparation Plan

    988
  7. Day 1- GRC Archer Administrator Masterclass | Basic Terminology in Archer

    Day 1- GRC Archer Administrator Masterclass | Basic Terminology in Archer

    50
  8. Introduction to My SQL | SQL Syntax and Queries | Connecting to My SQL

    Introduction to My SQL | SQL Syntax and Queries | Connecting to My SQL

    56
  9. Day 3- GRC Archer Administrator Masterclass | Reporting and Data Import

    Day 3- GRC Archer Administrator Masterclass | Reporting and Data Import

    64
  10. What is ISO? | Advantages of ISO/IEC 27001 | The ISO/IEC 27000 Family of Standards

    What is ISO? | Advantages of ISO/IEC 27001 | The ISO/IEC 27000 Family of Standards

    213
  11. What's New in ISO 27001:2022 | ISO 27001 History | ISO 27001:2013 Minor Updates

    What's New in ISO 27001:2022 | ISO 27001 History | ISO 27001:2013 Minor Updates

    27
  12. What is Enumeration? | Introduction to Metasploit Framework | Exploiting Vulnerabilities

    What is Enumeration? | Introduction to Metasploit Framework | Exploiting Vulnerabilities

    128
  13. What is ISO 27001 Lead Auditor? | Roles and Responsibilities of an ISO 27001 Lead Auditor (Day 2)

    What is ISO 27001 Lead Auditor? | Roles and Responsibilities of an ISO 27001 Lead Auditor (Day 2)

    51
  14. Defense with Kali Purple | Understanding Kali OS | Exploring Tools and Application

    Defense with Kali Purple | Understanding Kali OS | Exploring Tools and Application

    24
  15. Day - 4: Introduction to Web Applications | Basics of HTTP | Status codes and Headers of HTTP

    Day - 4: Introduction to Web Applications | Basics of HTTP | Status codes and Headers of HTTP

    2
    0
    16
  16. What is Malware? | Types of Malware | Malware Attack

    What is Malware? | Types of Malware | Malware Attack

    23
  17. Day - 6: What is Penetration Testing? | Ethical Hacking Vs. Malicious Activities

    Day - 6: What is Penetration Testing? | Ethical Hacking Vs. Malicious Activities

    65
  18. Day 2- GRC Archer Administrator Masterclass | How to Create an Application from Scratch?

    Day 2- GRC Archer Administrator Masterclass | How to Create an Application from Scratch?

    56
  19. Difference Between SSO and Federated Identity Management

    Difference Between SSO and Federated Identity Management

    22
  20. Top Penetration Testing Interview Questions 2023 | Penetration Testing Interview & Answers! Part 2

    Top Penetration Testing Interview Questions 2023 | Penetration Testing Interview & Answers! Part 2

    79
  21. IAPP CIPM Workshop: Your Roadmap to Privacy Leadership | What is Data Privacy [Part 1]

    IAPP CIPM Workshop: Your Roadmap to Privacy Leadership | What is Data Privacy [Part 1]

    19
  22. An Introduction to Cryptography | Encryption and its Types | What is Encoding?

    An Introduction to Cryptography | Encryption and its Types | What is Encoding?

    47
  23. What is GRC? | How can you start a career in IT Audit?

    What is GRC? | How can you start a career in IT Audit?

    20
  24. What is GRC (Governance, Risk, and Compliance)? | Bridging the GRC Gap | Implementing GRC Solutions

    What is GRC (Governance, Risk, and Compliance)? | Bridging the GRC Gap | Implementing GRC Solutions

    111
  25. What is Vishing Scams? | How to Protect Yourself from Vishing Scams? | How to Stay Safe?

    What is Vishing Scams? | How to Protect Yourself from Vishing Scams? | How to Stay Safe?

    15