InfosecTrain
Episodes
Top Business Analyst Interview Questions To Ace That Job Interview
17 May 2023
Contributed by Lukas
Business analyst jobs are among the most lucrative job profiles and offer high remuneration. A business analyst must employ various technical skills ...
Common Cyber Attacks and Ways to Prevent Them
16 May 2023
Contributed by Lukas
As we rely more on the internet, online attacks become more common. Attackers and other malicious hackers use many ways to cause trouble, steal data, ...
Active Attack vs. Passive Attack
12 May 2023
Contributed by Lukas
Active attacks and passive attacks are two different types of attacks that relate to computer security, network security, information security, and mo...
Introduction to Data Privacy | Regulations around Data Privacy | DPO activities
11 May 2023
Contributed by Lukas
Infosec Train - a leading IT Security training organization, based in India along with its presence across the globe, recently announced a Free Data P...
AWS Certified Security Specialty Exam Prep Masterclass | InfosecTrain
11 May 2023
Contributed by Lukas
In this AWS Certified Security Specialty Exam Prep Masterclass, we'll cover everything you need to know to prepare for the AWS Certified Security ...
Top Tools and Software for Ethical Hacking
10 May 2023
Contributed by Lukas
As technology advances, the type of cybersecurity threats evolves as well. Security measures alone will not be enough in the face of these emerging th...
Top Security Analyst Certifications
09 May 2023
Contributed by Lukas
With the increasing use of technology and digital platforms, organizations are becoming more vulnerable to security breaches and cyber-attacks. A sing...
Introduction To Azure Security | Network Security on Azure | InfosecTrain
09 May 2023
Contributed by Lukas
In this Podcast, InfosecTrain will be hosting a “Cloud Computing Expert Masterclass” with certified experts, in order to help you unlock the myste...
Introduction to Governance, Privacy, Identity and Compliance Capabilities
09 May 2023
Contributed by Lukas
In this Video, InfosecTrain will be hosting a “Cloud Computing Expert Masterclass” with certified experts, in order to help you unlock the mystery...
Bug Bounty Vs. Vulnerability Disclosure Programs
09 May 2023
Contributed by Lukas
Security breaches and ethical hacking are getting attention these days, and hackers are constantly hunting for new security flaws to attack. Many orga...
Core Azure Solution and Management Tools | Azure Monitoring Service | Azure Serverless Technology
05 May 2023
Contributed by Lukas
In this Video, InfosecTrain will be hosting a “Cloud Computing Expert Masterclass” with certified experts, in order to help you unlock the mystery...
Uncover the Secrets of the CISSP and ISSAP Exams - Strategy Tips from InfosecTrain
05 May 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Preparation Strategy for CISSP - ISSAP” with certified expert ‘Prashant’. Thank you for watching th...
Azure Cloud Fundamentals | What is Azure? | Key Azure Services
05 May 2023
Contributed by Lukas
In this Video, InfosecTrain will be hosting a “Cloud Computing Expert Masterclass” with certified experts, in order to help you unlock the mystery...
Top Ethical Hacking Tools Trending In 2023
05 May 2023
Contributed by Lukas
When it comes to preventing fraudulent cybercrimes, data breaches, and identity theft due to the increasing Internet security concerns, enterprises’...
OT/ICS Security Interview Questions
04 May 2023
Contributed by Lukas
If you are looking for a career in OT/ICS security, you might be wondering what kind of questions you will face in an interview. OT/ICS security is a ...
How to Make a Career Transition to OT Security
04 May 2023
Contributed by Lukas
The growing reliance on Operational Technology (OT) and Industrial Control Systems (ICS) in various industries has led to an increased demand for pro...
What's New in ISO 27001:2022 | ISO 27001 History | ISO 27001:2013 Minor Updates
02 May 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “What’s new in ISO 27001: 2022” with certified expert ‘Rajesh’. Thank you for watching this video...
Introduction to Operational Technology
02 May 2023
Contributed by Lukas
What is Operational Technology – An Overview The term “operational technology” (OT) refers to a grouping of hardware and software systems that...
Database Services in AWS | Explore databases in AWS | Networking in AWS
01 May 2023
Contributed by Lukas
In this Video, InfosecTrain will be hosting a “Cloud Computing Expert Masterclass” with certified experts, in order to help you unlock the mystery...
AWS Compute Services | What is serverless? | Introduction to AWS Lambda
01 May 2023
Contributed by Lukas
In this Video, InfosecTrain will be hosting a “Cloud Computing Expert Masterclass” with certified experts, in order to help you unlock the mystery...
Introduction to OT Security
01 May 2023
Contributed by Lukas
Operational Technology (OT) security is the practice of protecting industrial control systems (ICS) from cyber threats that could compromise their ava...
Public Cloud Platforms | Top Public Cloud Providers | AWS Vs. Azure Comparison
28 Apr 2023
Contributed by Lukas
In this Video, InfosecTrain will be hosting a “Cloud Computing Expert Masterclass” with certified experts, in order to help you unlock the mystery...
Unlock the Mystery of Cloud Computing: Discover Its Incredible Benefits!
28 Apr 2023
Contributed by Lukas
Unlock the Mystery of Cloud Computing: Discover Its Incredible Benefits! In this Video, InfosecTrain will be hosting a “Cloud Computing Expert Mast...
Transitioning to OT Security: Key Concepts and Career Opportunities | InfosecTrain
28 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Transitioning to OT Security: Key Concepts and Career Opportunities” with certified expert ‘Manjunath ...
How to Secure the Hybrid Cloud?
28 Apr 2023
Contributed by Lukas
Instead of using only one cloud provider, many organizations are adopting a “hybrid” cloud approach, which involves using multiple computing envi...
What is a Load Balancer in Cloud Computing?
26 Apr 2023
Contributed by Lukas
Cloud computing delivers IT services in which resources, such as storage, processing, and applications, are made available across a network, often the...
5 Important Facts About Data Privacy You Must Know
26 Apr 2023
Contributed by Lukas
Every professional or individual is taking steps to level up their privacy posture, but not everyone knows its underlying issues, concerns and repercu...
Real-World Applications of Cloud Computing
25 Apr 2023
Contributed by Lukas
Cloud computing has revolutionized how firms and organizations operate in the digital age. It provides a flexible, scalable, and cost-effective approa...
Cybersecurity Foundation Course Interview Questions & Answers | Cybersecurity Interview Preparation
24 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Abhishek Sharma. Thank you for watching thi...
Future of Cybersecurity in 2023 | Cybersecurity Trends for 2023 | Cybersecurity Scope in 2023
24 Apr 2023
Contributed by Lukas
Welcome to this video on the Future of Cybersecurity in 2023... In recent years, we have seen an increase in cyberattacks and data breaches, which ha...
GPT-4 AI Powered Microsoft Security Copilot- Future of Comprehensive Security
21 Apr 2023
Contributed by Lukas
Microsoft has launched a Security Copilot – a brand new GPT-4 powered chatbot for cybersecurity that aims to facilitate quicker decision-making dur...
How to Defend Against Network Security Threats?
19 Apr 2023
Contributed by Lukas
Every day, the usage and availability of the internet is growing, and with that, the security dangers that affect our systems and networks grow as wel...
Information Security Management | What is Access Control | What is Security Policy?
18 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Sanyam. Thank you for watching this video, ...
Roles and Responsibilities of Incident Handler
18 Apr 2023
Contributed by Lukas
Incident response and incident handling teams play a crucial role in every organization for identifying, analyzing, responding to, and reducing securi...
ISO Certification process | ISO Certification bodies | ISO Fundamental concepts and principles
18 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Abhishek Sharma. Thank you for watching th...
What is ISO? | Advantages of ISO/IEC 27001 | The ISO/IEC 27000 Family of Standards
18 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Abhishek Sharma. Thank you for watching thi...
Cloud storage security | Cloud Networking Security | Introduction to AWS infrastructure
18 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Amit. Thank you for watching this video, Fo...
Introduction to Power BI | Connecting to Data Sources in Power BI | Basic Calculations in Power BI
17 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymo...
Case Studies of Data Science | Data Science Project Preparation and Project Presentation
17 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymo...
How to Start a Career in Cyber Security? | Start a Cybersecurity Career in 2023
17 Apr 2023
Contributed by Lukas
In this video on "How to start a career in cyber security with no experience?", we will cover a cyber security roadmap for beginners. We sta...
Roles and Responsibilities of a CISO
17 Apr 2023
Contributed by Lukas
CISO is a high-level role in securing the data and information of the organization. The role has been created and initiated due to the evolving threa...
Introduction to My SQL | SQL Syntax and Queries | Connecting to My SQL
14 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anym...
What is Tableau introduction? | Creating Visualizations in Tableau | Basic Calculations in Tableau
14 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymor...
Virtualization in cloud | Docker vs Container | Types of Hypervisors
14 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Amit. Thank you for watching this video, Fo...
Top Network Security Interview Questions That You Should Know
14 Apr 2023
Contributed by Lukas
As the world becomes more reliant on the internet and the World Wide Web, network security is becoming an increasingly important concern for organizat...
What is Threat Modeling?
13 Apr 2023
Contributed by Lukas
With the enhancement of technology, cyber attackers use the latest tricks and techniques to access unauthorized data and perform malicious activities...
Defensive Cybersecurity Approach for Organizations
12 Apr 2023
Contributed by Lukas
Cybersecurity has become more critical than ever in recent years due to the increasing sophistication and frequency of cyber-attacks. Since the widesp...
What is Regression Analysis with Example? | Model Evaluation & Selection | Regularization Techniques
12 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymo...
What is Classification Algorithms? | Decision Tree and Random Forests | Model Evaluation Metrics
12 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymo...
Decision Tree Visualization | Practical in Jupiter | Introduction to R Programming
12 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymor...
Data Cleaning & Pre-processing in R | Data Visualization with ggplot2 | Statistical Concepts in R
12 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymor...
Introduction To Cloud Computing | Limitation of Cloud | Service & Development Models
11 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Amit. Thank you for watching this video, Fo...
Web Application Basics | OWASP Introduction | Exploiting Vulnerabilities of Web Application
11 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching thi...
Introduction to Wireless Networks | Types of Wireless Encryption | Wireless Hacking Tools
11 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching this...
CCSP Last Minute Prep Q&A Session | CCSP Exam Preparation | CCSP Exam Questions
11 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled ‘CCSP Last Minute Prep Q&A Session’ with Cloud Security Expert KK Singh. I'd be happy to help yo...
Interview Questions for Cybersecurity Analyst in 2023
10 Apr 2023
Contributed by Lukas
Our world is flooded with devices that can connect to the internet, and we can easily access many different services with just a simple click. Busines...
How to Become a Cybersecurity Incident Responder?
05 Apr 2023
Contributed by Lukas
Today the technology sector has become one of the most powerful and prominent for small to large businesses. Maintaining the security of any business’...
Denial of Service Attacks | Categories of Dos and DDos | DDos and Botnet | Dos Tools
05 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching thi...
Data Frames in Pandas | Data Visualization | Basic Statistical Concepts
05 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymo...
Introduction to Data Science | Introduction to Python | Introduction to Jupyter Notebook
05 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymor...
What's Privilege Escalation? | Methods to Escalate Privileges | Covering the Tracks by Clearing Logs
04 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching thi...
What is Malware and It's Types | Creating a Malware | Intro to Malware Analysis
04 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching thi...
What is Sniffing? | Types of Sniffing | Sniffing Techniques
04 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching thi...
What is AWS RDS?
04 Apr 2023
Contributed by Lukas
Due to the growth of digital data and the necessity for reliable and efficient methods to store, manage, and analyze it, database services have grown ...
What is Enumeration? | Introduction to Metasploit Framework | Exploiting Vulnerabilities
03 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching thi...
How to Prepare for CIPP/E Exam? | Benefits of European Privacy Exam | InfosecTrain
03 Apr 2023
Contributed by Lukas
In this video I am going to talk about a very popular topic "How to Prepare for CIPP/E Exam?" and "Benefits of European Privacy Exam&qu...
What is Nmap and How will it Work? | Banner Grabbing | Scan Beyond IDS and Firewall
03 Apr 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching thi...
How Vulnerable is GCP’s Multicloud Workload Solution?
03 Apr 2023
Contributed by Lukas
When integrating with other workloads, sending confidential information, such as passwords or access tokens, over a network or hard-coding them in th...
Top interview questions for Data Privacy Engineer
31 Mar 2023
Contributed by Lukas
Cybersecurity and Information security are the only fields that have not faced recession. On the contrary, there is a tremendous rise in career oppor...
How to Protect User Data?
30 Mar 2023
Contributed by Lukas
Data is the most prized possession anybody has in this digital era, where practically every aspect of our lives can be digitized, tracked, and logged...
US Based Privacy Regulations
30 Mar 2023
Contributed by Lukas
Privacy has always been a concern for individuals, businesses, and governments. As a result of the expeditious advancement of technology, the collect...
What is SOP and CORS? | Cyber Security | Ethical Hacking InfosecTrain
29 Mar 2023
Contributed by Lukas
SOP stands for Standard Operating Procedure. It is a set of documented instructions that outlines the steps required to complete a specific task or pr...
How To Improve Your Organization’s Security Posture?
29 Mar 2023
Contributed by Lukas
Hackers are significantly targeting the organizations that are least secure and protected, thus leading to a rise in cyber attacks in today’s onlin...
Reconnaissance Through Search Engines | Website Reconnaissance | Introduction To Scanning
29 Mar 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching thi...
Introduction to Attack | Introduction to Penetration Testing | Penetration Testing Methodology
29 Mar 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for Listening t...
Physical Security in an Enterprise | Physical Security Controls | Air Gaps
29 Mar 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. Thank you for Listening this Audio, ...
How Redundancy can Increase availability? | Fault Tolerance Vs Redundancy | Backups and its Types
29 Mar 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. Thank you for Listening this Audio, ...
What is Digital Forensics? | Chain of Custody | Tools Used in Digital Forensics
29 Mar 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. Thank you for Listening this Audio, ...
What is Endpoint Encryption and how it works? | Remote File Encryption | InfosecTrain
28 Mar 2023
Contributed by Lukas
Remote file encryption refers to the process of encrypting files stored on a remote server or cloud storage service. Encryption is the process of conv...
What is Networking and IP Address? | How Does It Work? | InfosecTrain
28 Mar 2023
Contributed by Lukas
Networking refers to the practice of connecting devices, such as computers, printers, and servers, to a common network infrastructure in order to faci...
How Black Swans Are Changing the Cybersecurity Landscape | InfosecTrain
28 Mar 2023
Contributed by Lukas
Listen this Audio by our esteemed CEO Deepti S. Kalra for her interesting take on black swans from a cybersecurity lens! Recently, we have seen back-...
What is GDPR and its 7 Principles?
28 Mar 2023
Contributed by Lukas
In today’s digital age, data has become one of the most invaluable assets for individuals and businesses across the world. With the advent of techn...
How to comply with GDPR?
24 Mar 2023
Contributed by Lukas
In 2018, the European Union’s General Data Protection Regulation (GDPR) came into effect, introducing a set of rules that companies must follow when...
What is CCSP Certification? | Career in Cloud Computing | InfosecTrain
21 Mar 2023
Contributed by Lukas
In this video I am going to talk about a very popular topic "How to Start a Career in Cloud Computing?" and "What is CCSP Certification...
What is Data Privacy? | Types of Data | Data Privacy Controls | Data Privacy Laws
21 Mar 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. What are the Basics of Networking? |...
Introduction to Packet Analysis | Mobile Device Security | Device Security
21 Mar 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. What are the Basics of Networking? |...
Data Protection vs. Data Security
21 Mar 2023
Contributed by Lukas
Data is an organization's most important asset and must be secured accordingly. Because there are so many possible methods for an organization'...
Cyber Security Vs. Information Security | What is Hacking? | Types of Hackers | InfosecTrain
20 Mar 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. What are the Basics of Networking? |...
An Introduction to Cryptography | Encryption and its Types | What is Encoding?
20 Mar 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. What are the Basics of Networking? ...
Top Cloud Computing Interview Questions
20 Mar 2023
Contributed by Lukas
Nowadays, cloud computing has become more popular as most businesses across different sectors, including education, retail, banking, and many others, ...
Network Security Appliances | What is a Firewall & It's Types? | What is Endpoint Security?
20 Mar 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. What are the Basics of Networking? |...
CISSP InfosecTrain Review | CISSP Success Stories | Sunitha CISSP Gladiator
20 Mar 2023
Contributed by Lukas
InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator Sunitha has to say ...
What is Social Engineering | Types of Social Engineering Basics | InfosecTrain
20 Mar 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. What are the Basics of Networking? |...
Risk Analysis, Evaluation, and Assessment
16 Mar 2023
Contributed by Lukas
Many enterprises are highlighting IT risk management as a critical component of their overall risk and compliance operations, with good reason. Recent...
Advanced Interview Questions for Threat Hunting
14 Mar 2023
Contributed by Lukas
Threat Hunting is a process of digging deep into the networks, servers, and systems to find out malicious activities. If the threat hunting process is...
CompTIA PenTest+ Domain 5: Tools and Code Analysis
13 Mar 2023
Contributed by Lukas
"Tools and Code Analysis" is one of the essential domains of the penetration testing process. This CompTIA PenTest+ certification exam domain covers a...
Basics of WAN | WAN Transmission Technology | Network Troubleshooting Tools | InfosecTrain
13 Mar 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Bharat. What are the Basics of Networ...
What are the Routing and Switching? | Dynamic and Static Routing | Types of Switching | InfosecTrain
13 Mar 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts ‘Bharat What are the Basics of Networking? | C...
Introduction of Networking Media | Bounded Network Media | Cybersecurity Foundation
13 Mar 2023
Contributed by Lukas
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Bharat. Thank you for watching this video...
CompTIA PenTest+ Domain 4: Reporting and Communication
10 Mar 2023
Contributed by Lukas
CompTIA PenTest+ Domain 4: Reporting and Communication “Reporting and Communication” is one of the most important parts of the penetration testing...