Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

InfosecTrain

Education

Episodes

Showing 1001-1100 of 1534
«« ← Prev Page 11 of 16 Next → »»

Top Business Analyst Interview Questions To Ace That Job Interview

17 May 2023

Contributed by Lukas

Business analyst jobs are among the most lucrative job profiles and offer high remuneration. A business analyst must employ various technical skills ...

Common Cyber Attacks and Ways to Prevent Them

16 May 2023

Contributed by Lukas

As we rely more on the internet, online attacks become more common. Attackers and other malicious hackers use many ways to cause trouble, steal data, ...

Active Attack vs. Passive Attack

12 May 2023

Contributed by Lukas

Active attacks and passive attacks are two different types of attacks that relate to computer security, network security, information security, and mo...

Introduction to Data Privacy | Regulations around Data Privacy | DPO activities

11 May 2023

Contributed by Lukas

Infosec Train - a leading IT Security training organization, based in India along with its presence across the globe, recently announced a Free Data P...

AWS Certified Security Specialty Exam Prep Masterclass | InfosecTrain

11 May 2023

Contributed by Lukas

In this AWS Certified Security Specialty Exam Prep Masterclass, we'll cover everything you need to know to prepare for the AWS Certified Security ...

Top Tools and Software for Ethical Hacking

10 May 2023

Contributed by Lukas

As technology advances, the type of cybersecurity threats evolves as well. Security measures alone will not be enough in the face of these emerging th...

Top Security Analyst Certifications

09 May 2023

Contributed by Lukas

With the increasing use of technology and digital platforms, organizations are becoming more vulnerable to security breaches and cyber-attacks. A sing...

Introduction To Azure Security | Network Security on Azure | InfosecTrain

09 May 2023

Contributed by Lukas

In this Podcast, InfosecTrain will be hosting a “Cloud Computing Expert Masterclass” with certified experts, in order to help you unlock the myste...

Introduction to Governance, Privacy, Identity and Compliance Capabilities

09 May 2023

Contributed by Lukas

In this Video, InfosecTrain will be hosting a “Cloud Computing Expert Masterclass” with certified experts, in order to help you unlock the mystery...

Bug Bounty Vs. Vulnerability Disclosure Programs

09 May 2023

Contributed by Lukas

Security breaches and ethical hacking are getting attention these days, and hackers are constantly hunting for new security flaws to attack. Many orga...

Core Azure Solution and Management Tools | Azure Monitoring Service | Azure Serverless Technology

05 May 2023

Contributed by Lukas

In this Video, InfosecTrain will be hosting a “Cloud Computing Expert Masterclass” with certified experts, in order to help you unlock the mystery...

Uncover the Secrets of the CISSP and ISSAP Exams - Strategy Tips from InfosecTrain

05 May 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Preparation Strategy for CISSP - ISSAP” with certified expert ‘Prashant’. Thank you for watching th...

Azure Cloud Fundamentals | What is Azure? | Key Azure Services

05 May 2023

Contributed by Lukas

In this Video, InfosecTrain will be hosting a “Cloud Computing Expert Masterclass” with certified experts, in order to help you unlock the mystery...

Top Ethical Hacking Tools Trending In 2023

05 May 2023

Contributed by Lukas

When it comes to preventing fraudulent cybercrimes, data breaches, and identity theft due to the increasing Internet security concerns, enterprises’...

OT/ICS Security Interview Questions

04 May 2023

Contributed by Lukas

If you are looking for a career in OT/ICS security, you might be wondering what kind of questions you will face in an interview. OT/ICS security is a ...

How to Make a Career Transition to OT Security

04 May 2023

Contributed by Lukas

The growing reliance on Operational Technology (OT) and Industrial Control Systems (ICS) in various industries has led to an increased demand for pro...

What's New in ISO 27001:2022 | ISO 27001 History | ISO 27001:2013 Minor Updates

02 May 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “What’s new in ISO 27001: 2022” with certified expert ‘Rajesh’. Thank you for watching this video...

Introduction to Operational Technology

02 May 2023

Contributed by Lukas

What is Operational Technology – An Overview The term “operational technology” (OT) refers to a grouping of hardware and software systems that...

Database Services in AWS | Explore databases in AWS | Networking in AWS

01 May 2023

Contributed by Lukas

In this Video, InfosecTrain will be hosting a “Cloud Computing Expert Masterclass” with certified experts, in order to help you unlock the mystery...

AWS Compute Services | What is serverless? | Introduction to AWS Lambda

01 May 2023

Contributed by Lukas

In this Video, InfosecTrain will be hosting a “Cloud Computing Expert Masterclass” with certified experts, in order to help you unlock the mystery...

Introduction to OT Security

01 May 2023

Contributed by Lukas

Operational Technology (OT) security is the practice of protecting industrial control systems (ICS) from cyber threats that could compromise their ava...

Public Cloud Platforms | Top Public Cloud Providers | AWS Vs. Azure Comparison

28 Apr 2023

Contributed by Lukas

In this Video, InfosecTrain will be hosting a “Cloud Computing Expert Masterclass” with certified experts, in order to help you unlock the mystery...

Unlock the Mystery of Cloud Computing: Discover Its Incredible Benefits!

28 Apr 2023

Contributed by Lukas

Unlock the Mystery of Cloud Computing: Discover Its Incredible Benefits! In this Video, InfosecTrain will be hosting a “Cloud Computing Expert Mast...

Transitioning to OT Security: Key Concepts and Career Opportunities | InfosecTrain

28 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Transitioning to OT Security: Key Concepts and Career Opportunities” with certified expert ‘Manjunath ...

How to Secure the Hybrid Cloud?

28 Apr 2023

Contributed by Lukas

Instead of using only one cloud provider, many organizations are adopting a “hybrid” cloud approach, which involves using multiple computing envi...

What is a Load Balancer in Cloud Computing?

26 Apr 2023

Contributed by Lukas

Cloud computing delivers IT services in which resources, such as storage, processing, and applications, are made available across a network, often the...

5 Important Facts About Data Privacy You Must Know

26 Apr 2023

Contributed by Lukas

Every professional or individual is taking steps to level up their privacy posture, but not everyone knows its underlying issues, concerns and repercu...

Real-World Applications of Cloud Computing

25 Apr 2023

Contributed by Lukas

Cloud computing has revolutionized how firms and organizations operate in the digital age. It provides a flexible, scalable, and cost-effective approa...

Cybersecurity Foundation Course Interview Questions & Answers | Cybersecurity Interview Preparation

24 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Abhishek Sharma. Thank you for watching thi...

Future of Cybersecurity in 2023 | Cybersecurity Trends for 2023 | Cybersecurity Scope in 2023

24 Apr 2023

Contributed by Lukas

Welcome to this video on the Future of Cybersecurity in 2023... In recent years, we have seen an increase in cyberattacks and data breaches, which ha...

GPT-4 AI Powered Microsoft Security Copilot- Future of Comprehensive Security

21 Apr 2023

Contributed by Lukas

Microsoft has launched a Security Copilot – a brand new GPT-4 powered chatbot for cybersecurity that aims to facilitate quicker decision-making dur...

How to Defend Against Network Security Threats?

19 Apr 2023

Contributed by Lukas

Every day, the usage and availability of the internet is growing, and with that, the security dangers that affect our systems and networks grow as wel...

Information Security Management | What is Access Control | What is Security Policy?

18 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Sanyam. Thank you for watching this video, ...

Roles and Responsibilities of Incident Handler

18 Apr 2023

Contributed by Lukas

Incident response and incident handling teams play a crucial role in every organization for identifying, analyzing, responding to, and reducing securi...

ISO Certification process | ISO Certification bodies | ISO Fundamental concepts and principles

18 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Abhishek Sharma. Thank you for watching th...

What is ISO? | Advantages of ISO/IEC 27001 | The ISO/IEC 27000 Family of Standards

18 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Abhishek Sharma. Thank you for watching thi...

Cloud storage security | Cloud Networking Security | Introduction to AWS infrastructure

18 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Amit. Thank you for watching this video, Fo...

Introduction to Power BI | Connecting to Data Sources in Power BI | Basic Calculations in Power BI

17 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymo...

Case Studies of Data Science | Data Science Project Preparation and Project Presentation

17 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymo...

How to Start a Career in Cyber Security? | Start a Cybersecurity Career in 2023

17 Apr 2023

Contributed by Lukas

In this video on "How to start a career in cyber security with no experience?", we will cover a cyber security roadmap for beginners. We sta...

Roles and Responsibilities of a CISO

17 Apr 2023

Contributed by Lukas

CISO is a high-level role in securing the data and information of the organization. The role has been created and initiated due to the evolving threa...

Introduction to My SQL | SQL Syntax and Queries | Connecting to My SQL

14 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anym...

What is Tableau introduction? | Creating Visualizations in Tableau | Basic Calculations in Tableau

14 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymor...

Virtualization in cloud | Docker vs Container | Types of Hypervisors

14 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Amit. Thank you for watching this video, Fo...

Top Network Security Interview Questions That You Should Know

14 Apr 2023

Contributed by Lukas

As the world becomes more reliant on the internet and the World Wide Web, network security is becoming an increasingly important concern for organizat...

What is Threat Modeling?

13 Apr 2023

Contributed by Lukas

With the enhancement of technology, cyber attackers use the latest tricks and techniques to access unauthorized data and perform malicious activities...

Defensive Cybersecurity Approach for Organizations

12 Apr 2023

Contributed by Lukas

Cybersecurity has become more critical than ever in recent years due to the increasing sophistication and frequency of cyber-attacks. Since the widesp...

What is Regression Analysis with Example? | Model Evaluation & Selection | Regularization Techniques

12 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymo...

What is Classification Algorithms? | Decision Tree and Random Forests | Model Evaluation Metrics

12 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymo...

Decision Tree Visualization | Practical in Jupiter | Introduction to R Programming

12 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymor...

Data Cleaning & Pre-processing in R | Data Visualization with ggplot2 | Statistical Concepts in R

12 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymor...

Introduction To Cloud Computing | Limitation of Cloud | Service & Development Models

11 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Amit. Thank you for watching this video, Fo...

Web Application Basics | OWASP Introduction | Exploiting Vulnerabilities of Web Application

11 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching thi...

Introduction to Wireless Networks | Types of Wireless Encryption | Wireless Hacking Tools

11 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching this...

CCSP Last Minute Prep Q&A Session | CCSP Exam Preparation | CCSP Exam Questions

11 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘CCSP Last Minute Prep Q&A Session’ with Cloud Security Expert KK Singh. I'd be happy to help yo...

Interview Questions for Cybersecurity Analyst in 2023

10 Apr 2023

Contributed by Lukas

Our world is flooded with devices that can connect to the internet, and we can easily access many different services with just a simple click. Busines...

How to Become a Cybersecurity Incident Responder?

05 Apr 2023

Contributed by Lukas

Today the technology sector has become one of the most powerful and prominent for small to large businesses. Maintaining the security of any business’...

Denial of Service Attacks | Categories of Dos and DDos | DDos and Botnet | Dos Tools

05 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching thi...

Data Frames in Pandas | Data Visualization | Basic Statistical Concepts

05 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymo...

Introduction to Data Science | Introduction to Python | Introduction to Jupyter Notebook

05 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘Data Science Fast Track Course’ with certified expert ‘NAWAJ’. Data Science is not the future anymor...

What's Privilege Escalation? | Methods to Escalate Privileges | Covering the Tracks by Clearing Logs

04 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching thi...

What is Malware and It's Types | Creating a Malware | Intro to Malware Analysis

04 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching thi...

What is Sniffing? | Types of Sniffing | Sniffing Techniques

04 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching thi...

What is AWS RDS?

04 Apr 2023

Contributed by Lukas

Due to the growth of digital data and the necessity for reliable and efficient methods to store, manage, and analyze it, database services have grown ...

What is Enumeration? | Introduction to Metasploit Framework | Exploiting Vulnerabilities

03 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching thi...

How to Prepare for CIPP/E Exam? | Benefits of European Privacy Exam | InfosecTrain

03 Apr 2023

Contributed by Lukas

In this video I am going to talk about a very popular topic "How to Prepare for CIPP/E Exam?" and "Benefits of European Privacy Exam&qu...

What is Nmap and How will it Work? | Banner Grabbing | Scan Beyond IDS and Firewall

03 Apr 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching thi...

How Vulnerable is GCP’s Multicloud Workload Solution?

03 Apr 2023

Contributed by Lukas

When integrating with other workloads, sending confidential information, such as passwords or access tokens, over a network or hard-coding them in th...

Top interview questions for Data Privacy Engineer

31 Mar 2023

Contributed by Lukas

Cybersecurity and Information security are the only fields that have not faced recession. On the contrary, there is a tremendous rise in career oppor...

How to Protect User Data?

30 Mar 2023

Contributed by Lukas

Data is the most prized possession anybody has in this digital era, where practically every aspect of our lives can be digitized, tracked, and logged...

US Based Privacy Regulations

30 Mar 2023

Contributed by Lukas

Privacy has always been a concern for individuals, businesses, and governments. As a result of the expeditious advancement of technology, the collect...

What is SOP and CORS? | Cyber Security | Ethical Hacking InfosecTrain

29 Mar 2023

Contributed by Lukas

SOP stands for Standard Operating Procedure. It is a set of documented instructions that outlines the steps required to complete a specific task or pr...

How To Improve Your Organization’s Security Posture?

29 Mar 2023

Contributed by Lukas

Hackers are significantly targeting the organizations that are least secure and protected, thus leading to a rise in cyber attacks in today’s onlin...

Reconnaissance Through Search Engines | Website Reconnaissance | Introduction To Scanning

29 Mar 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching thi...

Introduction to Attack | Introduction to Penetration Testing | Penetration Testing Methodology

29 Mar 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for Listening t...

Physical Security in an Enterprise | Physical Security Controls | Air Gaps

29 Mar 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. Thank you for Listening this Audio, ...

How Redundancy can Increase availability? | Fault Tolerance Vs Redundancy | Backups and its Types

29 Mar 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. Thank you for Listening this Audio, ...

What is Digital Forensics? | Chain of Custody | Tools Used in Digital Forensics

29 Mar 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. Thank you for Listening this Audio, ...

What is Endpoint Encryption and how it works? | Remote File Encryption | InfosecTrain

28 Mar 2023

Contributed by Lukas

Remote file encryption refers to the process of encrypting files stored on a remote server or cloud storage service. Encryption is the process of conv...

What is Networking and IP Address? | How Does It Work? | InfosecTrain

28 Mar 2023

Contributed by Lukas

Networking refers to the practice of connecting devices, such as computers, printers, and servers, to a common network infrastructure in order to faci...

How Black Swans Are Changing the Cybersecurity Landscape | InfosecTrain

28 Mar 2023

Contributed by Lukas

Listen this Audio by our esteemed CEO Deepti S. Kalra for her interesting take on black swans from a cybersecurity lens! Recently, we have seen back-...

What is GDPR and its 7 Principles?

28 Mar 2023

Contributed by Lukas

In today’s digital age, data has become one of the most invaluable assets for individuals and businesses across the world. With the advent of techn...

How to comply with GDPR?

24 Mar 2023

Contributed by Lukas

In 2018, the European Union’s General Data Protection Regulation (GDPR) came into effect, introducing a set of rules that companies must follow when...

What is CCSP Certification? | Career in Cloud Computing | InfosecTrain

21 Mar 2023

Contributed by Lukas

In this video I am going to talk about a very popular topic "How to Start a Career in Cloud Computing?" and "What is CCSP Certification...

What is Data Privacy? | Types of Data | Data Privacy Controls | Data Privacy Laws

21 Mar 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. What are the Basics of Networking? |...

Introduction to Packet Analysis | Mobile Device Security | Device Security

21 Mar 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. What are the Basics of Networking? |...

Data Protection vs. Data Security

21 Mar 2023

Contributed by Lukas

Data is an organization's most important asset and must be secured accordingly. Because there are so many possible methods for an organization&#39...

Cyber Security Vs. Information Security | What is Hacking? | Types of Hackers | InfosecTrain

20 Mar 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. What are the Basics of Networking? |...

An Introduction to Cryptography | Encryption and its Types | What is Encoding?

20 Mar 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. What are the Basics of Networking? ...

Top Cloud Computing Interview Questions

20 Mar 2023

Contributed by Lukas

Nowadays, cloud computing has become more popular as most businesses across different sectors, including education, retail, banking, and many others, ...

Network Security Appliances | What is a Firewall & It's Types? | What is Endpoint Security?

20 Mar 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. What are the Basics of Networking? |...

CISSP InfosecTrain Review | CISSP Success Stories | Sunitha CISSP Gladiator

20 Mar 2023

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator Sunitha has to say ...

What is Social Engineering | Types of Social Engineering Basics | InfosecTrain

20 Mar 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Nawaj. What are the Basics of Networking? |...

Risk Analysis, Evaluation, and Assessment

16 Mar 2023

Contributed by Lukas

Many enterprises are highlighting IT risk management as a critical component of their overall risk and compliance operations, with good reason. Recent...

Advanced Interview Questions for Threat Hunting

14 Mar 2023

Contributed by Lukas

Threat Hunting is a process of digging deep into the networks, servers, and systems to find out malicious activities. If the threat hunting process is...

CompTIA PenTest+ Domain 5: Tools and Code Analysis

13 Mar 2023

Contributed by Lukas

"Tools and Code Analysis" is one of the essential domains of the penetration testing process. This CompTIA PenTest+ certification exam domain covers a...

Basics of WAN | WAN Transmission Technology | Network Troubleshooting Tools | InfosecTrain

13 Mar 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Bharat.   What are the Basics of Networ...

What are the Routing and Switching? | Dynamic and Static Routing | Types of Switching | InfosecTrain

13 Mar 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts ‘Bharat What are the Basics of Networking? | C...

Introduction of Networking Media | Bounded Network Media | Cybersecurity Foundation

13 Mar 2023

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Bharat.   Thank you for watching this video...

CompTIA PenTest+ Domain 4: Reporting and Communication

10 Mar 2023

Contributed by Lukas

CompTIA PenTest+ Domain 4: Reporting and Communication “Reporting and Communication” is one of the most important parts of the penetration testing...

«« ← Prev Page 11 of 16 Next → »»