i

infosectrain01

65 Followers
    Day - 10: What is SOC? | Roles and functions of SOC | Tools and Techniques used in SOC
    1:28:15
    Certified Protection Professional (CPP) Exam Structure and CPP Preparation Plan
    22:10
    CISSP Question and Answer Practice | Prepare for CISSP Exam | CISSP Exam 2023 | InfosecTrain
    31:43
    Day - 7: Type of Mobile Platform | Rooting v/s Jailbreaking | Stock Android Vs. Custom Rom
    1:01:39
    Day -9: What is Cloud Service Models? | Cloud Deployment Models | Future of Cloud Computing
    1:40:36
    CCSP & CISSP InfosecTrain Review | Umesh Pandey Success Storie CCSP & CISSP
    8:47
    CISSP & CISM InfosecTrain Review | Ravi Teja Success Storie CISSP & CISM
    12:10
    Day -10: Cyber Security Orientation Q&A | Cyber Security Interview Questions And Answers
    24:27
    Day - 8: What is Cloud Computing? | What is cloud? | Cloud vs On-premises
    1:46:40
    Day - 9: What is chain of custody? | Order of Volatility | Miter Att&ck | Cryptography
    1:10:34
    Day - 8: What is Volatile and Non Volatile Data? | Network Forensic | WireShark
    1:26:25
    Day - 7: what is Digital Forensic? | Types of Cyber Crime | General Forensic Process
    1:27:54
    Day - 6: What is Penetration Testing? | Ethical Hacking Vs. Malicious Activities
    1:22:08
    CIPM InfosecTrain Review | CIPM Success Stories | Parag Kulkarni CIPM Gladiator
    13:20
    What's New in AZ-500? | Deep Dive into Key Topics | AZ-500 Q&A Session
    53:00
    Defense with Kali Purple | Understanding Kali OS | Exploring Tools and Application
    35:20
    Day - 6: What is Threat Intelligence? | Benefits & Stages of Cyber Threat Intelligence
    1:20:58
    Day - 5: What is Social Engineering and It's Techniques | Types of Social Engineering
    1:14:22
    Day - 5 : Introduction to Threat Intelligence | Types of Threat Intelligence | Cyber Kill Chain
    1:14:39
    Day - 4: Introduction to Web Applications | Basics of HTTP | Status codes and Headers of HTTP
    1:25:41
    Day - 3 What is Ethical Hacking Concepts? | Hacking Motives | Ethical Hacking Phases
    1:12:58
    Day - 2 Introduction to Kali Linux | Basic Linux Commands | File Management Commands
    1:14:02
    Day - 1 What is Information Security? | Principles of Information Security
    1:10:40
    Day 4 : What is Cyberbullying and Cyber Etiquettes? | What is morphing?
    1:40:24
    Day 3 : Protecting personal information | Password security and management
    1:22:00