i

infosectrain01

64 Followers
    IAM and its importance in the cloud | What is Cloud? | Different Vendors of Cloud
    1:00:21
    What is Vishing Scams? | How to Protect Yourself from Vishing Scams? | How to Stay Safe?
    6:05
    Overview of the CISM Exam Format & Structure | Tips for Creating CISM Study Plan
    23:47
    What is AVRecon Malware? | Tips to Protect Yourself from AVRecon Malware
    4:24
    Day - 2: CISO AWARENESS PROGRAM The SOC Blueprint | Increasing Attack Surface | Threat Landscape
    1:07:11
    Day 3- GRC Archer Administrator Masterclass | Reporting and Data Import
    1:33:39
    Day - 1 CISO AWARENESS PROGRAM The SOC Blueprint | What is Soc? | Traditional SOC Vs Mordern SOC
    1:24:28
    Types of people during online meeting
    0:20
    Microsoft Azure Interview Questions | Part 3-Microsoft Azure Interviews with Expert Questions
    7:52
    Types of sitting position in office
    0:42
    Microsoft Azure Interview Questions | Part 2-Microsoft Azure Interviews with Expert Questions
    11:39
    Day 2- GRC Archer Administrator Masterclass | How to Create an Application from Scratch?
    1:28:56
    What is AWS S3 Object Lock? | How to use Amazon S3 Object Lock?
    2:56
    Day 1- GRC Archer Administrator Masterclass | Basic Terminology in Archer
    1:30:11
    What are 5 Key Services in AWS? | AWS Cloud Services
    2:18
    A Tribute To Kevin Mitnick Most Wanted Hacker & Cybersecurity Professional
    4:40
    Incident Response in the Cloud (AWS) | Phases of Incident Response | AWS Native tools used for IR
    1:41:07
    What is the Key Difference between AWS Guardduty and Detective?
    2:15