Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

InfosecTrain

Education

Episodes

Showing 1201-1300 of 1534
«« ← Prev Page 13 of 16 Next → »»

How to Build a Successful Career in Network Security in 2023?

27 Dec 2022

Contributed by Lukas

Network Security is an ever-growing profession that plays an essential role in analyzing the security vulnerabilities and risks in the organization’...

What is Enterprise Security Architecture? | How Dose cybersecurity Architecture work in Enterprises

26 Dec 2022

Contributed by Lukas

If you're interested in learning more about cybersecurity architecture then this video is for you. Ms. Natalia sharing her experience  about how ...

What is OT Security? | Why OT security is important? | What are OT Cyber Security Challenges

26 Dec 2022

Contributed by Lukas

OT security is commonly used to protect Industrial Systems and networks from attacks. Operational technology security is used to protect and control c...

Building Privacy Management System in Organization | What is Privacy Management?

26 Dec 2022

Contributed by Lukas

Privacy management tools help organizations conduct privacy impact assessments, check processing activities against requirements from privacy regulati...

The Digital Personal Data Protection Bill, 2022: Analysis

26 Dec 2022

Contributed by Lukas

The Ministry of Electronics and Information Technology (MeitY) issued the Digital Personal Data Protection Bill, 2022, on Friday, 18 November. It is a...

What Is GDPR? | Introduction to US Privacy Laws | InfosecTrain

23 Dec 2022

Contributed by Lukas

A regulation in EU law on data protection and privacy in the European Union (EU) and the European Economic Area (EEA) is known as the General Data Pro...

Introduction and Benefits of Cloud Services | What is IT Cloud Services? | InfosecTrain

23 Dec 2022

Contributed by Lukas

When people talk about "cloud services," they mean a wide range of services that companies and customers can get on demand over the internet. These se...

What’s New in ISO 27001?

23 Dec 2022

Contributed by Lukas

Organizations collect, store, and use a lot of data nowadays for various operations. Data about the workplace, inventory, clients, trade secrets, and ...

What is Risk Management? | Risk Management Process | InfosecTrain

22 Dec 2022

Contributed by Lukas

The process of discovering, evaluating, and controlling risks to an organization's resources and profits is known as risk management. These dangers ca...

What Is IT Governance Framework? | Basics of Corporate Governance | InfosecTrain

22 Dec 2022

Contributed by Lukas

The implementation, management, and monitoring of IT governance inside an organization are defined by an IT governance framework, a particular sort of...

What is eDiscovery? | Introduction to E-Discovery | InfosecTrain

22 Dec 2022

Contributed by Lukas

Electronic discovery, commonly referred to as e-discovery, or eDiscovery, is the process by which parties to a legal proceeding preserve, gather, exam...

How to Build a Successful Career in Cloud Auditing in 2023?

22 Dec 2022

Contributed by Lukas

Auditing is the process of going through an organization’s records and documents in a systematic way to make sure they are correct, reliable, legal,...

Basics Of Network Security | Network Security Model | InfosecTrain

21 Dec 2022

Contributed by Lukas

The security service over the network has been created to prevent the opponent from endangering the confidentiality or authenticity of the information...

NIST Cloud Computing Reference Architecture | Cloud Computing Architecture | InfosecTrain

21 Dec 2022

Contributed by Lukas

Instead of emphasizing on "how to" design solution and execution, the NIST (National Institute of Standards and Technology) cloud computing reference ...

What is IaaS, PaaS & SaaS in Cloud Computing | Cloud Computing Services Models

21 Dec 2022

Contributed by Lukas

The three service models in cloud are SaaS (Software as a Service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service). Each cloud mo...

Types of Firewalls in Network Security

21 Dec 2022

Contributed by Lukas

Nowadays, protecting our sensitive data from unauthorized and unwanted sources has become a significant challenge. There are numerous tools available ...

What is Cloud Governance and (ERM) Enterprise Risk Management?

20 Dec 2022

Contributed by Lukas

Using cloud solutions can make an organization more prone to risks and vulnerabilities. So, to safeguard information, businesses need to adopt privacy...

Cloud Service and Deployment Models | Cloud Computing Deployment Models | InfosecTrain

20 Dec 2022

Contributed by Lukas

Cloud provides its offerings in three service models and four deployment models. The three service models are SaaS (Software as a Service), PaaS (Plat...

Top 10 Cloud Service and Advantages | Advantages of Cloud Computing | Infosectrain

20 Dec 2022

Contributed by Lukas

Since cloud computing offers several advantages over on premise, it is widely used by businesses. In a research by the International Data Group, 69% o...

How to Build a Successful Career in Security Testing in 2023?

20 Dec 2022

Contributed by Lukas

As the world becomes more digital, cyberattacks are constantly increasing. Digital transformation has become part of our life, and with it, security c...

Benefits of Cloud Security | Security Services and Security Goals | InfosecTrain

19 Dec 2022

Contributed by Lukas

A group of security techniques known as "cloud security" are used to safeguard data, apps, and infrastructure that are hosted in the cloud. It is used...

Cloud Deployment Models : Public Cloud vs Private Cloud vs Hybrid Cloud

19 Dec 2022

Contributed by Lukas

A cloud deployment model is established based on who controls the infrastructure needed for the deployment and where it is located. Each cloud deploym...

Day 1:Machine Learning for Cybersecurity | Introduction to Python | InfosecTrain

19 Dec 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘Machine Learning for Cybersecurity’ with certified expert ‘NAWAJ’. Machine Learning can assist busin...

What is a Network Security Administrator?

19 Dec 2022

Contributed by Lukas

Every organization relies on networks to propel its business in today’s world. Unfortunately, these networks are highly vulnerable to data loss, the...

Day 2: Machine Learning for Cybersecurity | Introduction to Machine Learning | InfosecTrain

16 Dec 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘Machine Learning for Cybersecurity’ with certified expert ‘NAWAJ’. Machine Learning can assist busin...

Day - 3 Machine Learning for Cybersecurity Bootcamp by Nawaj | InfosecTrain

16 Dec 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘Machine Learning for Cybersecurity’ with certified expert ‘NAWAJ’. Machine Learning can assist busin...

What is Threat Hunting? | Useful Threat Hunting Tools | InfosecTrain

16 Dec 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Threat Hunting- Concept and Opportunities” with certified expert ‘Abdul Mateen’. Threat hunting tech...

What is CRISC? | Who Needs CRISC ? & it's Benefits | InfosecTrain

16 Dec 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “CRISC Exam Prep” with certified expert ‘Mukesh Kumar’. CRISC is one of the most well-known certifica...

(ISC)² ® CSSLP Domain 8: Secure Software Supply Chain (11%)

16 Dec 2022

Contributed by Lukas

Today every part of our digital world is affected by data breaches, hacks, and other security incidents. It is critical to incorporate security into e...

Cloud Auditing Masterclass and CCAK Certification Prep | CCAK QA Session | InfosecTrain

15 Dec 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cloud Auditing - Masterclass and CCAK Certification Prep” with certified expert ‘Krish’. Cloud Audit...

CSSLP Domain 7: Secure Software Deployment, Operations, Maintenance

15 Dec 2022

Contributed by Lukas

(ISC)² ® CSSLP  Domain 7: Secure Software Deployment, Operations, Maintenance (12%) CSSLP’s seventh domain accounts for 12% of the exam weigh...

CSSLP Domain 6 Secure Software Lifecycle Management

13 Dec 2022

Contributed by Lukas

Domain 6: Secure Software Lifecycle Management (11%) The sixth domain of CSSLP is secure software lifecycle management which comprises 11% of exam wei...

(ISC)² ® CSSLP Domain 5: Secure Software Testing (14%)

12 Dec 2022

Contributed by Lukas

Domain 5: Secure Software Testing (14%) During the software development process, vulnerabilities are discovered through software testing. This CSSLP d...

What is the Cyber Kill Chain Process?

08 Dec 2022

Contributed by Lukas

In the last few years, there has been an increase in Advanced Persistent Threat (APT) actors trained to perform MITRE intrusion campaigns aimed at ste...

(ISC)² ® CSSLP Domain 4: Secure Software Implementation

06 Dec 2022

Contributed by Lukas

Domain 4: Secure Software Implementation (14%) The fourth domain of the CSSLP certification exam is a secure software implementation, and the domain c...

(ISC)² ® CSSLP Domain 3: Secure Software Architecture and Design

05 Dec 2022

Contributed by Lukas

Domain 3: Secure Software Architecture and Design (14%) This domain contains 14% weightage of the CSSLP exam. This domain focuses on secure software a...

(ISC)² ® CSSLP Domain 2: Secure Software Requirements (14%)

05 Dec 2022

Contributed by Lukas

Domain 2: Secure Software Requirements (14%) Secure software requirements is the second domain of the CSSLP certification exam, which holds 14% exam w...

IAM & SailPoint Career Guide | IAM Role in Organization Information Security | InfosecTrain

02 Dec 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “IAM & SailPoint Career Guide” with certified expert ‘SHAIKH H’. SailPoint is a comprehensive gov...

ISC2’s CSSLP Domain 1: Secure Software Concepts (10%)

01 Dec 2022

Contributed by Lukas

Introduction to ISC2 CSSLP The ISC2 Certified Secure Software Lifecycle Professional (CSSLP) certification concentrates on web application security wi...

Day 3 Cloud Security Masterclass | Encryption and Key Management in Cloud | InfosecTrain

30 Nov 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cloud Security Masterclass” with certified expert ‘Ayush’. Cloud Security is one of the trending top...

Day 2 Cloud Security Masterclass | Threat Detection Tools in AWS | InfosecTrain

30 Nov 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cloud Security Masterclass” with certified expert ‘Ayush’. Cloud Security is one of the trending to...

Day 1 Cloud Security Masterclass | AWS Well-Architected Framework | InfosecTrain

30 Nov 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cloud Security Masterclass” with certified expert ‘Ayush’. Cloud Security is one of the trending top...

Top Tools Covered in CEH v12

30 Nov 2022

Contributed by Lukas

Ethical hacking is the process of finding weaknesses and security flaws in systems and programs by impersonating the reasons and activities of cybercr...

How Do I Get My First Job In SOC?

29 Nov 2022

Contributed by Lukas

A Security Operations Center, abbreviated as SOC, is an essential component of a data protection and security system that helps lower the level of ris...

Everything You Need To Know About SOC Expert Course

29 Nov 2022

Contributed by Lukas

What is a SOC Analyst? SOC Analysts are a group of cybersecurity experts who monitor and respond to real-time security problems 24 hours a day, seven ...

Day 2 All About AWS Security Speciality | Native Security Tools in AWS | InfosecTrain

25 Nov 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “AWS Security Speciality Masterclass” with certified expert ‘Ayush’. AWS is a leading Cloud platform ...

Day-1 All About AWS Security Speciality | Introduction to AWS cloud Security | InfosecTrain

25 Nov 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “AWS Security Speciality Masterclass” with certified expert ‘Ayush’. AWS is a leading Cloud platform ...

Top Trending Cybersecurity Jobs in 2023

25 Nov 2022

Contributed by Lukas

Cybersecurity is a buzzing topic these days; the rise of cyber-attacks is clearly evident and makes major organizations consider cybersecurity a high-...

Top Cybersecurity Courses to Choose in Your Country

24 Nov 2022

Contributed by Lukas

With technological advancements, the risk of cyber-attacks increases dramatically, as is the demand for cybersecurity professionals. As a result, cybe...

Why Choose CCAK from InfosecTrain?

23 Nov 2022

Contributed by Lukas

What is CCAK? The Certificate of Cloud Auditing Knowledge (CCAK) is the first credential designed for IS/IT professionals to advance their knowledge o...

Domain 5 of AZ-204: Connect to and Consume Azure Services & Third-Party Services

22 Nov 2022

Contributed by Lukas

The AZ-204 exam is the best option for anyone looking to work as an Azure Cloud Developer. The AZ-204: Developing Solutions for Microsoft Azure certif...

Day 1 Cyber Security Fundamentals | Introduction to Cybersecurity | InfosecTrain

21 Nov 2022

Contributed by Lukas

InfosecTrain hosts a Free live event entitled “Cyber Security Fundamentals” with certified expert ‘Abhishek’. Thank you for watching this vide...

Why Learn Certified Ethical Hacker (CEH) With InfosecTrain?

21 Nov 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. In this Video we will discuss "Why Learn Certified Eth...

Day - 3 Cyber Security Fundamentals | What is Web Application and Their Attacks | InfosecTrain

21 Nov 2022

Contributed by Lukas

InfosecTrain hosts a Free live event entitled “Cyber Security Fundamentals” with certified expert ‘Abhishek’. Thank you for watching this vide...

Day 2 Cyber Security Fundamentals | Social Engineering Attacks and Malware | InfosecTrain

21 Nov 2022

Contributed by Lukas

InfosecTrain hosts a Free live event entitled “Cyber Security Fundamentals” with certified expert ‘Abhishek’. Thank you for watching this vide...

Domain 4 of AZ-204: Monitor, Troubleshoot and Optimize Azure Solutions

21 Nov 2022

Contributed by Lukas

As we know, all of our applications are now hosted in the cloud. To ensure that the application is functioning correctly, you need to provide a monito...

Why Choose CDPP with InfosecTrain?

17 Nov 2022

Contributed by Lukas

What is Data Privacy? Data privacy is a type of data security concerned with ensuring that data is only used by authorized individuals and for the int...

All About Data Privacy

16 Nov 2022

Contributed by Lukas

Data is the new gold and a resource worth billions of dollars in the twenty-first century. Data is valuable in the dark web marketplace and legitimate...

InfosecTrain Trainer Testimonial | Feedback from SAAZ RAI | InfosecTrain

16 Nov 2022

Contributed by Lukas

InfosecTrain prides itself with a pool of 100+ expert instructors, trainers and consultants. We value their contribution to our business vision and co...

CompTIA Security+ Interview Questions & Answers| Security+ Practice Questions (SY0-601)

16 Nov 2022

Contributed by Lukas

CompTIA Security+ SYO-601 is the latest version of the exam to validate the baseline technical skills required for cybersecurity professionals. The Se...

Bug Bounty Beginner's Guide 2022 | Bug Bounty Crowd Security Testing

16 Nov 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Bug Bounty- Crowd Security Testing Masterclass” with certified expert ‘Narayana’. Thank you for wat...

How to Become an IT Lead Auditor?

16 Nov 2022

Contributed by Lukas

IT audits are critical for analyzing the success of processes, products, and systems, whether existing or newly implemented, and are an essential aspe...

How To Prepare For CISSP Exam in 2023

15 Nov 2022

Contributed by Lukas

One of the most significant credentials for Information Security Professionals is the CISSP (Certified Information Systems Security Professional). It ...

How To Prevent Zero-Day Attacks?

10 Nov 2022

Contributed by Lukas

Cybercrimes or cyberattacks are increasing rapidly with continually expanding IT services. These days, one of the most common attacks that a company e...

Roles and Responsibilities of a Data Protection Officer

10 Nov 2022

Contributed by Lukas

A Data Protection Officer or DPO is responsible for planning, establishing, and enforcing data protection policies, as well as securing sensitive info...

Keypoint of IAPP CIPP/E | Introduction of IAPP CIPP/e and CIPM | InfosecTrain

09 Nov 2022

Contributed by Lukas

Due to technical developments against security breaches, theft, and loss, privacy laws have become more crucial. The discipline of data privacy refers...

CISM Vs. CRISC

08 Nov 2022

Contributed by Lukas

Cybersecurity and Information security are the most demanding career options in today’s world. This comprehensive blog is curated to provide the key...

Phishing Scams Trending in 2022

08 Nov 2022

Contributed by Lukas

With the advancement of technology, cybercriminals are finding unique ways to attempt a successful phishing scam. The phishing scam is the most danger...

What's new in C|EH v12?

07 Nov 2022

Contributed by Lukas

New and cutting-edge technology now dominates the planet. Information security is one of the most important aspects of today's cutting-edge technology...

Types of Network Security Attacks

04 Nov 2022

Contributed by Lukas

Nowadays, every organization or business of all sizes relies on a computer network to store all their confidential and sensitive data online, accessib...

How to Pass the CISA Exam | CISA Q&A Session | InfosecTrain

03 Nov 2022

Contributed by Lukas

InfosecTrain hosts a Q&A Session entitled “CISA Q&A Session” with certified expert ‘Aswini Srinath’. ✅ Thank you for watching this v...

InfosecTrain Trainer Testimonial Feedback from Rajesh Sandheer InfosecTrain

03 Nov 2022

Contributed by Lukas

InfosecTrain prides itself with a pool of 100+ expert instructors, trainers and consultants. We value their contribution to our business vision and co...

CISSP InfosecTrain Review | CISSP Success Stories | Ravinder CISSP Gladiator

03 Nov 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Ravinder) has to sa...

Top Beginner Level Certifications in Information Security

03 Nov 2022

Contributed by Lukas

With the demand for qualified information security professionals soaring, certification is a logical way for you to verify your skills and knowledge a...

Top Security Testing Certifications that led in 2022

02 Nov 2022

Contributed by Lukas

In today’s application development era, security is essential. The business rationale is becoming increasingly complex. Web applications are getting...

Day 2 : CISSP Question Practice | CISSP Practice Tests | CISSP Exam practice questions

01 Nov 2022

Contributed by Lukas

✅ Thank you for watching this video,  For more details or free demo with out expert  write into us at [email protected]  ✅Age...

Day - 1 CISSP Question Practice | CISSP Practice Tests | CISSP Exam Questions

01 Nov 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “CISSP Question Practice” with certified expert ‘KK Singh’. For More details: https://bit.ly/InfosecT...

What is SOC Analyst Job description, Salary & skills Security Operations Center Analyst

01 Nov 2022

Contributed by Lukas

A SOC analyst is a centralized and the most significant unit of a company that is responsible for handling an organization's IT security operations. ...

What is Multi-Cloud Network Architecture?

01 Nov 2022

Contributed by Lukas

Multi-cloud network architecture is a cloud architecture in which businesses use a combination of services from different cloud providers. Organizatio...

why do you need cryptography? | What is Cryptography | Introduction to Cryptography

31 Oct 2022

Contributed by Lukas

Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. The...

What is File System in SOC? | InfosecTrain

31 Oct 2022

Contributed by Lukas

Thank you for watching this video, For more details or free demo with out expert write into us at [email protected] Subscribe to our channel to g...

What is System Base Forensics in SOC Team | InfosecTrain

31 Oct 2022

Contributed by Lukas

Thank you for watching this video, For more details or free demo with out expert write into us at [email protected] Subscribe to our channel to g...

How to become a Security System Engineer?

31 Oct 2022

Contributed by Lukas

Cyber Security Engineers are often referred to as Data Security engineers, IT Security engineers, or Web Security engineers. Furthermore, in smaller f...

CISSP or CISM: Which is right for you? | CISSP vs CISM | InfosecTrain

28 Oct 2022

Contributed by Lukas

CISM vs CISSP is one of the confusion that the aspirants try to deal with. The certification in a particular domain implies that you have the edge to ...

Day 2: Cyber Security Masterclass | Cyber Security Full Course | Cyber Security

28 Oct 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cyber Security by Abhishek” with certified expert ‘Abhishek’. Most of our data is kept on the cloud,...

Cloud Practitioner Interview Questions

28 Oct 2022

Contributed by Lukas

The Cloud Practitioner role is an excellent place to begin if you want to get into the realm of cloud computing. They are skilled technical specialist...

Benefits of Getting CCSP Certified

27 Oct 2022

Contributed by Lukas

Today, security is one of the primary concerns for businesses embracing cloud computing on a broader scale. Due to the rise in security risks, busines...

Day 3: Cyber Security Masterclass | Cyber Security Full Course | Cyber Security

27 Oct 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cyber Security by Abhishek” with certified expert ‘Abhishek’. Most of our data is kept on the cloud,...

Day 4 : Cyber Security Masterclass | Cyber Security Full Course | Cyber Security

27 Oct 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cyber Security by Abhishek” with certified expert ‘Abhishek’. Most of our data is kept on the cloud...

What is Real-Time Monitoring in SOC | Functions of SOC Team | InfosecTrain

27 Oct 2022

Contributed by Lukas

For more details or free demo with out expert write into us at [email protected] Subscribe to our channel to get video updates. Hit the subscribe...

Day 1: Cyber Security Masterclass | Cyber Security Full Course | Cyber Security

26 Oct 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Cyber Security by Abhishek” with certified expert ‘Abhishek’. Most of our data is kept on the cloud,...

Cybersecurity Trends in 2023

25 Oct 2022

Contributed by Lukas

Cybersecurity is a rapidly emerging field where cybercriminals and security experts compete to outsmart one another. Cybercriminals are getting smarte...

Uber Has Been Hacked | UBER HACKED by 18year old? | How a Teenager Hacked Uber | Uber hack

19 Oct 2022

Contributed by Lukas

In this video, we have covered a few details about the recent cyber attack on Uber that took place on 15th Sept 2022. Thank you for watching this vid...

Cyber Security Vs. Cloud Computing

19 Oct 2022

Contributed by Lukas

In today’s IT world, organizations use and produce enormous amounts of data for business operations. Cyber Security plays a key role in securing the...

Expert Masterclass Introducing CEH v12 | What is CEH? | Certified Ethical Hacker CEH v12

18 Oct 2022

Contributed by Lukas

The Certified Ethical Hacker (C|EH v12) program is one of the most respected certifications in the cybersecurity field. It has been the world’s numb...

What Makes our Clients Choose InfosecTrain? | Why Choose Course With InfosecTrain?

10 Oct 2022

Contributed by Lukas

Choosing from a plethora of options has always been difficult. What makes our clients choose InfosecTrain? Listen to our Sales Experts explain, how In...

How to Prepare for CISSP Domain 1 | Security & Risk Management | How to Pass CISSP Exam

10 Oct 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “How to Prepare for CISSP Domain 1 : Security & Risk Management” with certified expert ‘Manikandan’...

What is Threat Hunting and How Can You Do it Right?

10 Oct 2022

Contributed by Lukas

Threat hunting is the technique of searching proactively for undetected cyber threats in a network. Cyber threat hunting is the process of searching f...

AWS Interview Questions Part 10 | AWS Interview Questions And Answers | AWS Training | Infosectrain

10 Oct 2022

Contributed by Lukas

This rising popularity of AWS has created excellent opportunities for professionals willing to make a career in the AWS cloud space. However, to kick ...

AWS Interview Questions Part 9 | AWS Interview Questions And Answers | AWS Training | Infosectrain

10 Oct 2022

Contributed by Lukas

This rising popularity of AWS has created excellent opportunities for professionals willing to make a career in the AWS cloud space. However, to kick ...

«« ← Prev Page 13 of 16 Next → »»