1. What is Social Engineering | Types of Social Engineering Basics | InfosecTrain

    What is Social Engineering | Types of Social Engineering Basics | InfosecTrain

    58
  2. An Introduction to Cryptography | Encryption and its Types | What is Encoding?

    An Introduction to Cryptography | Encryption and its Types | What is Encoding?

    42
  3. Cyber Security Vs. Information Security | What is Hacking? | Types of Hackers | InfosecTrain

    Cyber Security Vs. Information Security | What is Hacking? | Types of Hackers | InfosecTrain

    22
  4. Introduction to Packet Analysis | Mobile Device Security | Device Security

    Introduction to Packet Analysis | Mobile Device Security | Device Security

    20
  5. What is Data Privacy? | Types of Data | Data Privacy Controls | Data Privacy Laws

    What is Data Privacy? | Types of Data | Data Privacy Controls | Data Privacy Laws

    23
  6. What is Sniffing? | Types of Sniffing | Sniffing Techniques

    What is Sniffing? | Types of Sniffing | Sniffing Techniques

    173
  7. What's Privilege Escalation? | Methods to Escalate Privileges | Covering the Tracks by Clearing Logs

    What's Privilege Escalation? | Methods to Escalate Privileges | Covering the Tracks by Clearing Logs

    2
    0
    112
  8. Day - 4: Introduction to Web Applications | Basics of HTTP | Status codes and Headers of HTTP

    Day - 4: Introduction to Web Applications | Basics of HTTP | Status codes and Headers of HTTP

    2
    0
    15
  9. Day - 10: What is SOC? | Roles and functions of SOC | Tools and Techniques used in SOC

    Day - 10: What is SOC? | Roles and functions of SOC | Tools and Techniques used in SOC

    59
  10. What is Android Architecture? | Multi Tiered Architecture | Android Layeres Architecture

    What is Android Architecture? | Multi Tiered Architecture | Android Layeres Architecture

    17
  11. Why SOC (Security Operations Center) Training with Infosectrain?

    Why SOC (Security Operations Center) Training with Infosectrain?

    24
  12. Day - 1 CISO AWARENESS PROGRAM The SOC Blueprint | What is Soc? | Traditional SOC Vs Mordern SOC

    Day - 1 CISO AWARENESS PROGRAM The SOC Blueprint | What is Soc? | Traditional SOC Vs Mordern SOC

    40
    1
  13. Day 3- GRC Archer Administrator Masterclass | Reporting and Data Import

    Day 3- GRC Archer Administrator Masterclass | Reporting and Data Import

    57
  14. Day - 2: CISO AWARENESS PROGRAM The SOC Blueprint | Increasing Attack Surface | Threat Landscape

    Day - 2: CISO AWARENESS PROGRAM The SOC Blueprint | Increasing Attack Surface | Threat Landscape

    30
  15. Day 2- GRC Archer Administrator Masterclass | How to Create an Application from Scratch?

    Day 2- GRC Archer Administrator Masterclass | How to Create an Application from Scratch?

    52
  16. Day 1- GRC Archer Administrator Masterclass | Basic Terminology in Archer

    Day 1- GRC Archer Administrator Masterclass | Basic Terminology in Archer

    45
  17. What is subnetting in IPv4? | Configuring IPv4 Addresses and Static Routes

    What is subnetting in IPv4? | Configuring IPv4 Addresses and Static Routes

    18
  18. Difference between Wired and Wireless Network | What are the topologies of a LAN?

    Difference between Wired and Wireless Network | What are the topologies of a LAN?

    17
  19. Cloud storage security | Cloud Networking Security | Introduction to AWS infrastructure

    Cloud storage security | Cloud Networking Security | Introduction to AWS infrastructure

    374
  20. 🚨 Cyber News: Patch Tuesday Recap, WordPress Stripe Bug, AiTM Attack, VMware abused by China

    🚨 Cyber News: Patch Tuesday Recap, WordPress Stripe Bug, AiTM Attack, VMware abused by China

    18
  21. What is Enumeration? | Introduction to Metasploit Framework | Exploiting Vulnerabilities

    What is Enumeration? | Introduction to Metasploit Framework | Exploiting Vulnerabilities

    107
  22. What is Malware and It's Types | Creating a Malware | Intro to Malware Analysis

    What is Malware and It's Types | Creating a Malware | Intro to Malware Analysis

    198
  23. What is Malware? | Types of Malware | Malware Attack

    What is Malware? | Types of Malware | Malware Attack

    15
  24. Master Kali Linux(or Linux) in 60 Minutes

    Master Kali Linux(or Linux) in 60 Minutes

    22
  25. Cracking the Security Operations Center (SOC) Interview | Expert Tips by Bharat

    Cracking the Security Operations Center (SOC) Interview | Expert Tips by Bharat

    43