Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

InfosecTrain

Education

Episodes

Showing 1-100 of 1533
Page 1 of 16 Next → »»

AI Auditing vs. Traditional Auditing: Mastering the ISO/IEC 42001 Shift

01 May 2026

Contributed by Lukas

Auditing is evolving - are you ready to audit intelligent systems? As AI transforms global business operations, the methodologies used to ensure compl...

The 2026 AI Career Blueprint: Upskilling for the Future of Work

29 Apr 2026

Contributed by Lukas

The question isn’t if AI will change your job, but when. In this comprehensive masterclass, InfosecTrain breaks down why AI upskilling is no longer ...

AI: The New Frontier of Offensive Security and Cyber Defense

28 Apr 2026

Contributed by Lukas

AI is helping you write emails, but attackers are using it to craft more effective phishing campaigns. In this episode of InfosecTrain Tech Talks: Rea...

The Modern CISO: Navigating the 2026 Leadership Roadmap

27 Apr 2026

Contributed by Lukas

Stepping into a CISO role today demands far more than technical expertise; it requires business acumen, strategic thinking, and the ability to influen...

AI in the SOC: Separating 2026 Reality from Marketing Hype

24 Apr 2026

Contributed by Lukas

AI is transforming Security Operations Centers (SOCs) - but is it really the "silver bullet" vendors claim? In this episode of InfosecTrain Tech Talks...

AI Media Mastery Creating the Future with Sora & Nano Banana

22 Apr 2026

Contributed by Lukas

What separates the top 1% of AI professionals from everyone else? It isn't just coding; it’s the ability to leverage the cutting-edge tools that...

Autonomous DevSecOps: Mastering AI-Driven Security Pipelines

21 Apr 2026

Contributed by Lukas

In the future, code won’t just be written; it will be secured by AI from day one. DevSecOps is undergoing a radical evolution in 2026, moving from m...

Decoding AI Governance Failures: Moving from Policy to Practice

20 Apr 2026

Contributed by Lukas

AI Governance sounds perfect on paper but why does it so often fail in the real world? In this episode of InfosecTrain Tech Talks, host Anas Hamid sit...

Mastering US Privacy | Your CIPPUS First-Attempt Success Strategy

10 Apr 2026

Contributed by Lukas

Privacy isn’t optional anymore and neither is getting CIPP/US certified. As the gold standard in U.S. private-sector privacy, this credential is the...

AI Auditing Masterclass: Mastering ISO/IEC 42001 for GRC Leaders

09 Apr 2026

Contributed by Lukas

The future of auditing isn’t just IT; it’s AI. As artificial intelligence integrates into every layer of the enterprise, the role of the auditor m...

AI Media Mastery: Creating the Future with Sora & Nano Banana

08 Apr 2026

Contributed by Lukas

What separates the top 1% of AI professionals from everyone else? It isn't just coding it’s the ability to leverage the cutting-edge tools that ...

Pass CISM Exam 2026 | Roadmap Transitioning from Security Tech to Strategy

07 Apr 2026

Contributed by Lukas

CISM isn’t just a certification it’s a leadership upgrade. While many certifications focus on the "how" of security, the Certified Infor...

CCSP 2026 Masterclass: Navigating the New Cloud Security Frontier

06 Apr 2026

Contributed by Lukas

The CCSP (Certified Cloud Security Professional) certification is undergoing its most significant evolution yet. With a new exam outline effective Aug...

Building Your AI Second Brain: Mastering NotebookLM & Oboe

03 Apr 2026

Contributed by Lukas

How do you transform a mountain of scattered data into an organized "Second Brain"? In this masterclass from InfosecTrain, we dive into the ...

The Future of Privacy Leadership: ISO 27701:2026 Explained

02 Apr 2026

Contributed by Lukas

As data privacy becomes a global priority, ISO 27701:2026 is redefining how organizations manage and protect personally identifiable information (PII)...

AI Risk Management for Leaders | Governance, Trust & Accountability in 2026

01 Apr 2026

Contributed by Lukas

AI doesn’t fail silently when it fails; it impacts trust, compliance, and your entire business reputation. As AI adoption reaches a fever pitch in 2...

Privacy Engineering in the AI Era A CIPT Perspective on Data Protection

31 Mar 2026

Contributed by Lukas

As AI transforms the digital landscape, the intersection of data privacy and machine learning has become a critical battleground for security professi...

The Future of GRC: Governance, Risk & Compliance in the Age of AI

30 Mar 2026

Contributed by Lukas

Governance, Risk & Compliance (GRC) is no longer just about meeting static requirements it’s about controlling intelligent, evolving systems. In...

ISO 42001 Explained: Defining Your Organization’s Role in the AI Ecosystem

27 Mar 2026

Contributed by Lukas

Identifying your role in the AI lifecycle is no longer just a technicality it’s a regulatory and ethical necessity. In this episode, we break down I...

CRISC Explained: Enterprise Risk Strategies for the Age of AI

26 Mar 2026

Contributed by Lukas

AI is no longer a futuristic concept it’s an active driver of enterprise change. However, with great innovation comes significant risk. In this epis...

AI Governance & Risk: The CRISC Perspective

25 Mar 2026

Contributed by Lukas

AI is no longer a futuristic concept it’s an active driver of enterprise change. However, with great innovation comes significant risk. In this epis...

Mastering the Red Team: Beyond Penetration Testing

24 Mar 2026

Contributed by Lukas

In this episode, we break down the sophisticated world of Red Teaming. Moving past simple vulnerability scans, we explore the mindset of a determined ...

Build Your Own AI Agent: From PDF To Email Draft

23 Mar 2026

Contributed by Lukas

Are you still spending 20 minutes reading a single regulatory document? In this episode, we show you how to leverage Gemini and Custom Agents to autom...

Cybersecurity: The New Front Line of National Security

21 Mar 2026

Contributed by Lukas

National security is no longer just about tanks and aircraft; it’s about power grids, financial ecosystems, and data privacy. In this episode, Colon...

LlamaCoder & Agentic AI: The End of Manual Browsing

20 Mar 2026

Contributed by Lukas

Are we moving past the era of simply "chatting" with AI? In this session, we look at the rise of Agentic AI tools that don't just draft ...

OBO + Consensus AI | Ending the Era of AI Hallucinations

19 Mar 2026

Contributed by Lukas

Are you tired of AI tools that "hallucinate" facts or pull information from unverified Reddit threads? In this episode, we explore the &quot...

DPDPA for DPOs | Navigating AI Risk and Accountability in 2026

18 Mar 2026

Contributed by Lukas

The role of a Data Protection Officer (DPO) is no longer strictly legal—it is an integrated function of Law, Tech, and Risk. As AI continues to rede...

SailPoint IdentityIQ 8.5 | Modernizing Identity Governance with AI and Teams

17 Mar 2026

Contributed by Lukas

The landscape of identity governance is shifting from manual workflows to intelligent, automated ecosystems. With the release of SailPoint IdentityIQ ...

Perplexity AI The End of Search Engines as We Know Them

16 Mar 2026

Contributed by Lukas

Google is a search engine. ChatGPT is a chatbot. But what is Perplexity? If you’ve ever felt like AI gives you outdated answers or "hallucinate...

How to Become a GRC Auditor: The Complete Roadmap 2026

13 Mar 2026

Contributed by Lukas

Is an IT Auditor just a "hacker with a clipboard"? Not even close. In a world where regulatory fines are skyrocketing and AI is rewriting th...

The CISOs Nightmare: Why 2026 is No Longer About the Hacker

11 Mar 2026

Contributed by Lukas

What keeps a CISO up at night? Hint: It’s probably not what you think. While the headlines scream about "genius hackers", the real battle ...

Mastering IAPP AIGP | Roadmap to AI Governance Excellence

09 Mar 2026

Contributed by Lukas

Is AI Governance the new "must-have" for cybersecurity professionals? As AI transitions from a luxury to a corporate mandate, the need for c...

Mastering Claude AI | The Thoughtful Assistant for Research & Writing

06 Mar 2026

Contributed by Lukas

Can an AI actually help you think more clearly, not just write faster? In this episode, we dive deep into Claude AI, the powerhouse model from Anthrop...

Master the CompTIA Security+ in 2026

05 Mar 2026

Contributed by Lukas

Are you ready to earn one of the most respected certifications in cybersecurity? In this episode, we break down the fundamental concepts, practical de...

ANI, AGI, & ASI: Navigating the 3 Levels of AI Evolution

27 Feb 2026

Contributed by Lukas

Are we already living in the age of super-intelligence, or are we just scratching the surface? In this episode, we break down the three fundamental le...

The Soul of AI: Why the Model is the Real Operating System

25 Feb 2026

Contributed by Lukas

If you buy an HP laptop expecting to run Mac OS, you’ve missed the point. In this episode, we explore why the "Model" is the true soul of ...

SLM vs. LLM | Why the Future of AI is Small, Local, and Secure

23 Feb 2026

Contributed by Lukas

Is bigger always better? While Large Language Models (LLMs) like GPT-5 and Gemini 2.5 dominate the headlines, a silent revolution is happening on our ...

Wazuh for SOC Analysts | The Ultimate Open-Source SIM & XDR Strategy

20 Feb 2026

Contributed by Lukas

In a world of "Decision Paralysis," which SIM should you choose? In this episode, we dive deep into why Wazuh has become the go-to solution ...

How to Crack ISSAP: Security Audit Strategy & Exam Tips

18 Feb 2026

Contributed by Lukas

Transitioning from CISSP to the ISSAP concentration? The architecture of security isn't just about building walls; it’s about the visibility of ...

Canva AI Secrets: How to Use AI in Canva for 2026

16 Feb 2026

Contributed by Lukas

Are you still spending hours brainstorming design templates? In this session, we unlock the secrets of Canva AI and its powerful integration with Chat...

Gemini vs. Lovart Which AI Generates Better Images in 2026

11 Feb 2026

Contributed by Lukas

In the rapidly evolving world of AI, 2026 has brought us to a crossroads: Gemini vs. Lovart. But this session is about more than just which tool makes...

ISO/IEC 42001 AI Governance & Implementation Bootcamp

09 Feb 2026

Contributed by Lukas

In this bootcamp session, Prabh Nair breaks down ISO/IEC 42001 and the practical reality of AI governance inside organizations.If you are trying to im...

NotebookLM Explained: How AI Is Rewriting the Way We Learn in 2026

06 Feb 2026

Contributed by Lukas

Is the art of writing being replaced by the science of prompting? In this session, we explore how Google’s NotebookLM is revolutionizing the way we ...

ElevenLabs & The AI Voice Revolution From Text to Reality

04 Feb 2026

Contributed by Lukas

Is AI voice technology moving too fast? In this episode, we explore how ElevenLabs is redefining the boundaries of text-to-speech and dubbing. We go b...

ISACA’s AAISM: Securing the Intelligent Enterprise

02 Feb 2026

Contributed by Lukas

Traditional IT security is predictable, but AI is not. In an era where AI learns, evolves, and operates on data-centric logic, the standard playbooks ...

Agentic AI Explained: The Shift from Assist to Act in 2026

30 Jan 2026

Contributed by Lukas

Are we ready for AI that doesn’t just suggest, but actually executes? In this forward-looking session, we dive into the world of Agentic AI the brea...

The Azure Secure Admin Roadmap: AZ-104 + AZ-500 in 2026

27 Jan 2026

Contributed by Lukas

In the cloud era, the line between "System Admin" and "Security Engineer" has officially vanished. As organizations migrate identi...

How to Stay Safe Online | Cybersecurity Awareness for Everyone

23 Jan 2026

Contributed by Lukas

One careless click is all it takes—are you really safe online? In today's digital landscape, cyber threats are no longer limited to IT teams; th...

AWS Security Specialty (SCS-C03) Exam Guide: Mastery & Practice

21 Jan 2026

Contributed by Lukas

Is the AWS Security Specialty a beginner certification? How does the new SCS-C03 version differ from its predecessor? In this session, we break down t...

Gemini AI Masterclass: Transforming Google Workspace Productivity

19 Jan 2026

Contributed by Lukas

Is Gemini just another chatbot? Not quite. While tools like ChatGPT are great for general search, Gemini is designed to be the "default engine" for yo...

Firewall Evasion: 3 Sneaky Ways Hackers Bypass Defense

14 Jan 2026

Contributed by Lukas

Think your firewall is invincible? Think again. In the world of penetration testing and ethical hacking, knowing how to fly under the radar is just as...

The AI Blueprint: Designing a Practical Governance Framework

12 Jan 2026

Contributed by Lukas

AI is no longer a "future project"—it’s a present-day reality. But while AI can scale your innovation, it can also scale your risks (bia...

Beyond the Screen: The 5 Soft Skills Every Infosec Pro Needs

08 Jan 2026

Contributed by Lukas

Think a career in Cybersecurity is just about mastery over Linux and firewalls? Think again. While technical tools get you in the door, it’s your hu...

How to Build an Enterprise Security Program: Complete Step-by-Step Guide

07 Jan 2026

Contributed by Lukas

Security isn’t achieved by tools alone; it’s built through strong strategy, governance, and execution. In this episode, we break down how to desig...

The AI Auditor Your Career Roadmap to ISOIEC 42001

05 Jan 2026

Contributed by Lukas

AI is being deployed in every industry at breakneck speed—but who is checking if these systems are actually safe, ethical, and compliant? As we ente...

VoIP: How Your Voice Becomes Data (And How to Secure It)

03 Jan 2026

Contributed by Lukas

Traditional phone lines are disappearing. By 2025, the "Public Switched Telephone Network" (PSTN) is being phased out in favor of VoIP (Voic...

ISO/IEC 42001: The Global Blueprint for AI Governance

01 Jan 2026

Contributed by Lukas

AI has the power to scale innovation at breakneck speed—but without a steering wheel, it can scale risk just as fast. Enter ISO/IEC 42001:2023, the ...

Top 20 TCP/IP Protocols for 2026: The 600 Exabyte Surge

30 Dec 2025

Contributed by Lukas

With global traffic hitting 600 exabytes per month, AI and 5G are pushing networks to the limit—but the "rules of the road" remain the same. Every c...

WAF: The Layer 7 Shield Your Web Apps Need in 2026

28 Dec 2025

Contributed by Lukas

In the high-speed world of web traffic, traditional firewalls are often blind to the most dangerous threats. While a standard firewall guards the &quo...

GDPR Proof: The 7 Pillars of Data Accountability

27 Dec 2025

Contributed by Lukas

Under the GDPR, "doing the right thing" isn't enough—you have to prove it. This shift from passive compliance to active Accountability...

Cryptanalysis Exposed: How Hackers Crack the Uncrackable

26 Dec 2025

Contributed by Lukas

Encryption is often described as the "gold standard" of security, but what happens when the gold itself is targeted? Welcome to the world of...

DNS Floods vs. DDoS: Protecting the Internet's Address Book

25 Dec 2025

Contributed by Lukas

In the high-stakes game of cybersecurity, not all "avalanches" of traffic are created equal. While both DNS Flood Attacks and DDoS (Distribu...

AI Agents vs. Bots The Future of Autonomous DevSecOps

24 Dec 2025

Contributed by Lukas

The "scripted bot" era is over. As we head into 2026, the industry is moving toward Agentic AI autonomous systems that don't just alert ...

DevSecOps & Compliance 2026: Automating Your Security Guardrails

23 Dec 2025

Contributed by Lukas

In 2026, security is no longer a final checkpoint; it is the very foundation of the code you write. With global cybercrime costs crossing the $10.5 tr...

Amazon Kinesis: Mastering Real-Time Data & Video Streams

22 Dec 2025

Contributed by Lukas

In a world that never stops, "batch processing" is no longer enough. To stay competitive, organizations must react to data the millisecond i...

Amazon Athena Simplified: Secure SQL Analytics for Cloud Professionals

21 Dec 2025

Contributed by Lukas

In the era of massive data lakes, the ability to extract instant security insights without managing complex infrastructure is a strategic game-changer...

Security Architecture Explained: Zero Trust, AI, and Quantum

20 Dec 2025

Contributed by Lukas

With cybercrime costs projected to reach $10.5 trillion this year, legacy security perimeters are no longer enough to protect modern enterprises. This...

7 Security Architecture Mistakes to Avoid in 2026

19 Dec 2025

Contributed by Lukas

Even the most robust security frameworks can fail if they are designed in a business vacuum or become too complex for teams to manage effectively. Thi...

AWS RAM Explained: Mastering Secure Multi-Account Resource Sharing

17 Dec 2025

Contributed by Lukas

Managing complex multi-account environments often leads to resource duplication, high operational overhead, and ballooning cloud costs. In this episod...

AI Skills Shaping Cybersecurity Careers in 2026

17 Dec 2025

Contributed by Lukas

The cybersecurity landscape is shifting as AI evolves from a "nice-to-have" tool to the core engine of both cyber attacks and enterprise def...

CEH vs. OSCP: Choosing Your Ethical Hacking Career Path

16 Dec 2025

Contributed by Lukas

In the high-stakes world of cybersecurity, two certifications dominate the conversation: the CEH (Certified Ethical Hacker) and the OSCP (Offensive Se...

Key Vault vs. Managed Identity Azure Security Showdown

15 Dec 2025

Contributed by Lukas

In the high-stakes world of cloud security, developers and architects must master the tools that protect credentials and application identities. Azure...

Azure PIM Explained: Managing and Securing Privileged Access

13 Dec 2025

Contributed by Lukas

Privileged Identity Management (PIM) is one of the most critical security features within Azure Active Directory; designed to control, govern, and sec...

Azure Sentinel Explained: The Cloud-Native SIEM & SOAR Solution

12 Dec 2025

Contributed by Lukas

Azure Sentinel is transforming how modern organizations detect, investigate, and respond to cyber threats. In this episode, we break down what Azure S...

CCSP Exam Accelerator: Ace your Cloud Security exam on Your First Attempt

11 Dec 2025

Contributed by Lukas

Struggling with CCSP prep? Wondering which domain is the hardest? This masterclass is designed to help you ace the Certified Cloud Security Profession...

Cloud Security Governance Your Digital Fortress

11 Dec 2025

Contributed by Lukas

In an era of relentless data breaches and cyber threats, cloud security governance stands as the ultimate framework balancing accessibility with ironc...

Google vs Microsoft vs Zoho: 2026 Workspace Kings

10 Dec 2025

Contributed by Lukas

Picking the ultimate intelligent workspace defines team success in 2026's AI-driven world. This episode pits Google Workspace against Microsoft 36...

Mastering 2026 Cyber Law GDPR, HIPAA, and Global Compliance

09 Dec 2025

Contributed by Lukas

The digital battleground is shifting, and in 2026, Ignorance is not a defense. With the global cost of a data breach skyrocketing, understanding and a...

DevSecOps 2025: AI, Zero Trust, and Security Trends Explained

08 Dec 2025

Contributed by Lukas

Cybercrime is predicted to cost the global economy over $10.5 trillion annually by 2025, making a Secure-by-Design approach non-negotiable. DevSecOps ...

Amazon ECR Explained: Securing Your Container Supply Chain with AWS

07 Dec 2025

Contributed by Lukas

Containers are the foundation of modern application development, with over half of organizations expected to deploy containerized apps by 2025. This m...

The 2026 Digital Forensics Playbook AI, Cloud, and the Deepfake Defense

06 Dec 2025

Contributed by Lukas

The digital forensics field is at a crossroads in 2026, driven by an explosion of data in the cloud and the sophisticated challenge of synthetic media...

Top 10 Digital Forensic Tools Every Investigator Must Know

05 Dec 2025

Contributed by Lukas

Digital forensics has become a mission-critical skill as cybercrime surges worldwide. In this episode, we break down the top ten forensic tools used b...

2026 SailPoint IdentityIQ Exam Guide: Your Complete Prep Roadmap

04 Dec 2025

Contributed by Lukas

Preparing for the SailPoint IdentityIQ certification in 2026 requires clarity, strategy, and hands-on understanding of IIQ architecture, workflows, an...

Web Browser Forensics Uncovering Hidden Digital Evidence

03 Dec 2025

Contributed by Lukas

Every click, search, and download leaves a trace. Web browser forensics helps investigators uncover those hidden artifacts to reconstruct user activit...

AI in SOC: Transforming Cyber Defense with Smarter Threat Response

02 Dec 2025

Contributed by Lukas

AI is reshaping Security Operations Centers by boosting detection speed, cutting false positives, and empowering analysts with smarter automation. In ...

What Is SD WAN and How It Works Explained

01 Dec 2025

Contributed by Lukas

This episode breaks down SD WAN in a simple and practical way, showing how modern businesses use it to improve network performance, cut costs, and str...

What Is Endpoint Detection and Response EDR Explained

30 Nov 2025

Contributed by Lukas

This episode breaks down Endpoint Detection and Response EDR and why it has become a core element of modern cybersecurity. You’ll learn how EDR moni...

Complete AI Governance Training CAIGS Key Highlights and Differentiators

29 Nov 2025

Contributed by Lukas

This masterclass breaks down the Certified AI Governance Specialist (CAIGS) program and shows how organizations build ethical, secure, and compliant A...

Master BCMS Implementation with ISO 22301 The Ultimate Resilience Guide

28 Nov 2025

Contributed by Lukas

ISO 22301 gives organizations a structured way to stay resilient during disruptions. In this episode, you’ll learn how a Business Continuity Managem...

Crypto Shredding Explained The Modern Way to Destroy Data Securely

27 Nov 2025

Contributed by Lukas

Secure data disposal is no longer optional—it's a regulatory and security necessity. In this episode, we break down crypto shredding, a powerful...

Boost Productivity with AI in Spreadsheets A Complete Practical Guide

26 Nov 2025

Contributed by Lukas

AI is reshaping the way we work with Excel and Google Sheets. In this episode, we break down how AI-powered tools can automate tasks, suggest formulas...

Phishing-Resistant MFA The Future of Secure Authentication

25 Nov 2025

Contributed by Lukas

Phishing attacks are evolving fast—and traditional MFA isn’t enough anymore. In this episode, we break down what phishing-resistant MFA is, why it...

Automated Incident Response How Automation Transforms Modern Cyber Defense

24 Nov 2025

Contributed by Lukas

Automated incident response is reshaping how organizations detect, investigate, and contain cyber threats. This episode explores how automation accele...

Understanding Cryptanalysis: Techniques, Attack Types & Ethical Applications

23 Nov 2025

Contributed by Lukas

Cryptanalysis is at the core of modern cybersecurity—revealing how encrypted data can be deciphered, strengthened, or exploited. In this episode, we...

Top Network Sniffing Techniques Every Ethical Hacker Must Know

22 Nov 2025

Contributed by Lukas

Network sniffing is a crucial skill in cybersecurity, helping professionals analyze network traffic, uncover vulnerabilities, and identify malicious a...

Why Sovereign Cloud Matters: Data Control, Compliance & Security Explained

21 Nov 2025

Contributed by Lukas

As global data regulations tighten, organizations are turning toward Sovereign Cloud solutions to protect sensitive information, meet compliance requi...

Why Sovereign Cloud Matters: Data Control, Compliance & Security Explained

20 Nov 2025

Contributed by Lukas

As global data regulations tighten, organizations are turning toward Sovereign Cloud solutions to protect sensitive information, meet compliance requi...

Key Features of Amazon GuardDuty: Strengthening Cloud Threat Detection

19 Nov 2025

Contributed by Lukas

Amazon GuardDuty has become a critical line of defense for securing AWS environments. In this episode, we break down how GuardDuty uses machine learni...

DevSecOps vs Rugged DevOps: Building Secure & Resilient Software

17 Nov 2025

Contributed by Lukas

Security is no longer optional—it's built into every stage of modern software development. In this episode, we break down the real difference be...

HackerGPT Explained AI-Powered Cybersecurity for Ethical Hackers

17 Nov 2025

Contributed by Lukas

HackerGPT is reshaping the cybersecurity landscape with AI-driven speed, precision, and intelligence. In this episode, we break down how this advanced...

Page 1 of 16 Next → »»