1. Roadmap to Digital Personal Data Protection Bill : DPDP Implementation

    Roadmap to Digital Personal Data Protection Bill : DPDP Implementation

    16
  2. Teachers' Day Tribute: Our Trainers' Best Moments

    Teachers' Day Tribute: Our Trainers' Best Moments

    14
  3. What is Android Architecture? | Multi Tiered Architecture | Android Layeres Architecture

    What is Android Architecture? | Multi Tiered Architecture | Android Layeres Architecture

    16
  4. What is the Key Difference between AWS Guardduty and Detective?

    What is the Key Difference between AWS Guardduty and Detective?

    9
  5. What are 5 Key Services in AWS? | AWS Cloud Services

    What are 5 Key Services in AWS? | AWS Cloud Services

    21
  6. What is AVRecon Malware? | Tips to Protect Yourself from AVRecon Malware

    What is AVRecon Malware? | Tips to Protect Yourself from AVRecon Malware

    15
  7. What is Vishing Scams? | How to Protect Yourself from Vishing Scams? | How to Stay Safe?

    What is Vishing Scams? | How to Protect Yourself from Vishing Scams? | How to Stay Safe?

    14
  8. What is AWS S3 Object Lock? | How to use Amazon S3 Object Lock?

    What is AWS S3 Object Lock? | How to use Amazon S3 Object Lock?

    6
  9. 🚨 Cyber News: MGM Attack Deep Dive, Manchester PD Hack, China ICS for Warfare, Iran Targets Defense

    🚨 Cyber News: MGM Attack Deep Dive, Manchester PD Hack, China ICS for Warfare, Iran Targets Defense

    56
  10. Day - 2 Introduction to Kali Linux | Basic Linux Commands | File Management Commands

    Day - 2 Introduction to Kali Linux | Basic Linux Commands | File Management Commands

    9
  11. Day-12: What is security monitoring? | What are logs and how they are monitored?

    Day-12: What is security monitoring? | What are logs and how they are monitored?

    4
    0
    6
  12. Day - 10: What is SOC? | Roles and functions of SOC | Tools and Techniques used in SOC

    Day - 10: What is SOC? | Roles and functions of SOC | Tools and Techniques used in SOC

    57
  13. What is ISO 27001 Lead Implementer? | Roles & Responsibilities of an ISO 27001 LI [Day 1]

    What is ISO 27001 Lead Implementer? | Roles & Responsibilities of an ISO 27001 LI [Day 1]

    28
  14. Day - 1 What is Information Security? | Principles of Information Security

    Day - 1 What is Information Security? | Principles of Information Security

    8
  15. Cyber News: Gigabyte Motherboard Backdoor, Toyota Breach Again, Zyxel Active Exploit & More News

    Cyber News: Gigabyte Motherboard Backdoor, Toyota Breach Again, Zyxel Active Exploit & More News

    9
  16. Core Azure Solution and Management Tools | Azure Monitoring Service | Azure Serverless Technology

    Core Azure Solution and Management Tools | Azure Monitoring Service | Azure Serverless Technology

    12
  17. Cyber Security Vs. Information Security | What is Hacking? | Types of Hackers | InfosecTrain

    Cyber Security Vs. Information Security | What is Hacking? | Types of Hackers | InfosecTrain

    20
  18. Missouri Data Breach, CISA Warns of Microsoft Exploits, Google Fights Back, Russia & China

    Missouri Data Breach, CISA Warns of Microsoft Exploits, Google Fights Back, Russia & China

    101
  19. What is Domain 7 of CISSP? | Exam Prepare for the CISSP Domain 7 : Security Operations

    What is Domain 7 of CISSP? | Exam Prepare for the CISSP Domain 7 : Security Operations

    3
    0
    38
  20. CISSP Practice Exam Questions and Answers | CISSP Q&A Review Session

    CISSP Practice Exam Questions and Answers | CISSP Q&A Review Session

    9
  21. Patch Tuesday Recap, 6 Zerodays from Microsoft, China Targets Western Europe, NATO Attack Root cause

    Patch Tuesday Recap, 6 Zerodays from Microsoft, China Targets Western Europe, NATO Attack Root cause

    18
  22. North Korea Hackers Target Russia, CISA Unveils 3 Year Plan, $375M to State & Local Govt, CVSS 4.0

    North Korea Hackers Target Russia, CISA Unveils 3 Year Plan, $375M to State & Local Govt, CVSS 4.0

    13
  23. Database Services in AWS | Explore databases in AWS | Networking in AWS

    Database Services in AWS | Explore databases in AWS | Networking in AWS

    8
  24. 🚨 Cyber News: Military Free Gifts, Breach at American Airlines, Capital One & Patching News

    🚨 Cyber News: Military Free Gifts, Breach at American Airlines, Capital One & Patching News

    167