Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

InfosecTrain

Education

Episodes

Showing 1301-1400 of 1534
«« ← Prev Page 14 of 16 Next → »»

AWS Interview Questions Part 8 | AWS Interview Questions And Answers | AWS Training | Infosectrain

10 Oct 2022

Contributed by Lukas

This rising popularity of AWS has created excellent opportunities for professionals willing to make a career in the AWS cloud space. However, to kick ...

Why is Learning AWS Important for Employees?

10 Oct 2022

Contributed by Lukas

Due to the pandemic, the cloud computing platform has seen a significant rise in demand and popularity as industries migrate to it rapidly. For enhanc...

AWS Interview Questions Part 6 | AWS Interview Questions And Answers | AWS Training | Infosectrain

07 Oct 2022

Contributed by Lukas

This rising popularity of AWS has created excellent opportunities for professionals willing to make a career in the AWS cloud space. However, to kick ...

Hands on Internal Audit Masterclass | What is Internal Audit? | Types of Internal Audits

07 Oct 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Hands on Internal Audit” with certified expert ‘Sachin’. The IT infrastructure and security posture...

AWS Interview Questions Part 7 | AWS Interview Questions And Answers | AWS Training | Infosectrain

07 Oct 2022

Contributed by Lukas

This rising popularity of AWS has created excellent opportunities for professionals willing to make a career in the AWS cloud space. However, to kick ...

What Is GRC? | Governance Risk Management Compliance | Why a GRC Framework?

07 Oct 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Governance, Risk & Compliance (GRC) Masterclass” with certified expert ‘Jeevan’. If you want to...

How to Configure Azure Front Door Service as an Application Gateway | InfosecTrain

07 Oct 2022

Contributed by Lukas

Microsoft's cutting-edge cloud Content Delivery Network (CDN), Azure Front Door, offers quick, dependable, and secure access between your users and th...

What's New in AWS Certified Solutions Architect Associate | SAA-C02 vs. SAA-C03 | AWS SAAC

04 Oct 2022

Contributed by Lukas

The AWS Certified Solutions Architect – Associate exam is updated as of August 30, 2022. The updates reflect increased enterprise demand for optimiz...

Day 2 - Prepare for Data Privacy | Introduction of IAPP CIPP/e and CIPM | European Privacy

04 Oct 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Prepare for Data Privacy Certifications -CIPP/e, CIPM” with certified expert ‘Jai’. Due to technica...

Day 1 - Prepare for Data Privacy | Introduction of IAPP CIPP/e and CIPM | European Privacy

04 Oct 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Prepare for Data Privacy Certifications -CIPP/e, CIPM” with certified expert ‘Jai’. Due to technica...

AWS Interview Questions Part 5 | AWS Interview Questions And Answers | AWS Training | Infosectrain

04 Oct 2022

Contributed by Lukas

This rising popularity of AWS has created excellent opportunities for professionals willing to make a career in the AWS cloud space. However, to kick ...

AWS Interview Questions Part 4 | AWS Interview Questions And Answers | AWS Training | Infosectrain

04 Oct 2022

Contributed by Lukas

This rising popularity of AWS has created excellent opportunities for professionals willing to make a career in the AWS cloud space. However, to kick ...

How to Control Network Access on Your Azure Subnet with Azure Firewall

03 Oct 2022

Contributed by Lukas

Firewall follows an order to process rules, so the chain must be short in order to free up CPU time.  With the help of the jump action, you can d...

AWS Interview Questions Part 3 | AWS Interview Questions And Answers | AWS Training | InfosecTrain

03 Oct 2022

Contributed by Lukas

This rising popularity of AWS has created excellent opportunities for professionals willing to make a career in the AWS cloud space. However, to kick ...

How To Manage Azure Active Directory Identities: A Step-by-Step Guide

03 Oct 2022

Contributed by Lukas

Azure Active Directory (Azure AD) is a service for managing identities and access in the cloud. This solution facilitates access to thousands of addit...

AWS Interview Questions And Answers | AWS Interview Questions Part 2 | AWS Training | Infosectrain

03 Oct 2022

Contributed by Lukas

This rising popularity of AWS has created excellent opportunities for professionals willing to make a career in the AWS cloud space. However, to kick ...

What is Penetration Testing?

29 Sep 2022

Contributed by Lukas

Given the rising frequency and severity of cyberattacks, Penetration Testing has become a crucial component of a comprehensive security program. Howev...

Red Team Vs. Blue Team

29 Sep 2022

Contributed by Lukas

With the emerging number of data breaches in the organization, security testing is one of the best approaches to detect vulnerabilities and identify t...

Difference between IP Address and MAC Address

29 Sep 2022

Contributed by Lukas

All network devices in a computer network can connect and communicate with the help of IP addresses and MAC addresses. However, the question of how on...

Azure Cloud Connectivity: How to Connect using VPN and Express Route

29 Sep 2022

Contributed by Lukas

Learn to add private network connectivity from your corporate network to cloud using VPN and Azure ExpressRoute Thank you for watching this video, Fo...

AWS Interview Questions Part 1 | AWS Interview Questions And Answers | AWS Training | Infosectrain

29 Sep 2022

Contributed by Lukas

This rising popularity of AWS has created excellent opportunities for professionals willing to make a career in the AWS cloud space. However, to kick ...

What is HSM (Hardware Security Module)? | Overview of HSM | Cloud Hardware Security Module

28 Sep 2022

Contributed by Lukas

HSM stands for Hardware Security Module, and is a very secure dedicated hardware for securely storing cryptographic keys. It can encrypt, decrypt, cre...

Data Science Interview Questions | Data Science Interviews | Data Science Tutorial | InfosecTrain

28 Sep 2022

Contributed by Lukas

This Data Science Interview Questions and Answers video will help you to prepare yourself for Data Science interviews. This video is ideal for both be...

Cloud Security Best Practices

23 Sep 2022

Contributed by Lukas

Many companies are adopting cloud computing technology, and cloud-based services have been predominantly enriching in recent years. Small and medium-s...

What is Trusted Execution Environment (TEE) | TEE (Trusted Execution Environment)

21 Sep 2022

Contributed by Lukas

Trusty is a secure Operating System (OS) that provides a Trusted Execution Environment (TEE) for Android. The Trusty OS runs on the same processor as ...

What is TPM? | TPM 2.0 using Windows 11 | TPM -Trusted Platform Module

21 Sep 2022

Contributed by Lukas

TPM (Trusted Platform Module) is a computer chip (microcontroller) that can securely store artifacts used to authenticate the platform (your PC or lap...

What is HSM (Hardware Security Module)?

21 Sep 2022

Contributed by Lukas

HSM stands for Hardware Security Module, and is a very secure dedicated hardware for securely storing cryptographic keys. It can encrypt, decrypt, cre...

Becoming a Cybersecurity Professional without a Tech Degree

21 Sep 2022

Contributed by Lukas

Given the rate at which the modern world is progressing and becoming increasingly reliant on portable computing and the Internet for most procedures, ...

What’s new in CompTIA A+?

19 Sep 2022

Contributed by Lukas

The term CompTIA stands for Computing Technology Industry Association. It is a world-renowned technology association that offers globally prominent Co...

Cloud Security Interview Questions and Answers | Cloud Computing Interview | InfosecTrain

19 Sep 2022

Contributed by Lukas

Cracking an interview has never been so easy, so it needs a great preparation. If you are preparing for a cloud security interview, check out these to...

Masterclass on Advanced Penetration Testing | Ethical Hacking Lifecycle | InfosecTrain

16 Sep 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled "Advanced Penetration Testing" with certified expert 'Ashish'. Speaker ASHISH CEHv11 | CompTIA A+ | CompTIA N...

Security Operations Center SOC Interview Preparation | SOC Interview Preparation

16 Sep 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Security Operations Center (SOC) Interview Interview Preparation” with certified expert ‘Bharat’. S...

All About SQL (Structured Query Language) Masterclass Day 3 | InfosecTrain

16 Sep 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘All About SQL’ with certified expert ‘NAWAJ’. SQL is used to search through a database store, which ...

Top AWS Architect Interview Questions In 2022

16 Sep 2022

Contributed by Lukas

Amazon Web Services (AWS) is a well-known and revolutionized cloud platform providing the leading cloud services for multiple enterprises. Many organi...

All About SQL (Structured Query Language) Masterclass Day 2 | InfosecTrain

15 Sep 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘All About SQL’ with certified expert ‘NAWAJ’. SQL is used to search through a database store, which...

All About SQL (Structured Query Language) Masterclass Day 1 | InfosecTrain

15 Sep 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘All About SQL’ with certified expert ‘NAWAJ’. SQL is used to search through a database store, which...

What’s New in Certified Ethical Hacker CEH v12 | CEH New Version

15 Sep 2022

Contributed by Lukas

InfosecTrain offers CEH v12 Certification Training  . To know more about this course and other training we conduct, please visit https://www.info...

All About IAPPs CIPP/E, CIPM, and CIPT Training Course from InfosecTrain

15 Sep 2022

Contributed by Lukas

Due to the increasing number of data breaches, data security and privacy protection are critical to organizations, and information security is concern...

How to become a Chief Privacy Officer?

15 Sep 2022

Contributed by Lukas

In this fast-pacing digital technology, organizations find enormous value in collecting, processing, and generating data from various sources. Data pr...

Types of IT Security Audit

13 Sep 2022

Contributed by Lukas

The International Organization for Standardization developed ISO 27001 as a standard. It is the foundation for an organization’s Information Securit...

Top 10 Data Science Applications and Use Cases | Data Science Skills

12 Sep 2022

Contributed by Lukas

The role of Data Science Applications has emerged globally due to their faster computing and cheaper storage to process. A Data Scientist is supposed ...

How to Prepare for CSSLP Exam | CSSLP Exam Tips | Tips to Pass the CSSLP Exam

12 Sep 2022

Contributed by Lukas

CCSLP- Certified Secure Software Lifecycle Professional is one of the most popular application-security-related certifications available. It shows org...

Top interview questions for AWS Solutions Architect

12 Sep 2022

Contributed by Lukas

Despite significant competition in the cloud computing sector, AWS is the market’s largest cloud service provider. It has now become the driving fac...

What is Ransomware Attack Anatomy? | Types, Protection and Removal

09 Sep 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘Ransomware Attacks Anatomy’ with certified expert ‘Sanyam’. Agenda for the Webinar 👉 What is Rans...

What's New in CCSP 2022 Domain 4 Cloud Application Security | Tips for CCSP Domain 4

09 Sep 2022

Contributed by Lukas

In this constantly evolving and extremely competing world of cloud, one faces unique security challenges almost every day with regards to unaccustomed...

What's New in CCSP Domain 3 Cloud Platform Infrastructure Security | Tips for CCSP Domain 3

09 Sep 2022

Contributed by Lukas

In this constantly evolving and extremely competing world of cloud, one faces unique security challenges almost every day with regards to unaccustomed...

Why choose SailPoint over some other Tool?

09 Sep 2022

Contributed by Lukas

Protecting your organization’s data and solutions is crucial in today’s world. Your organization will be seriously impacted if unauthorized indivi...

How to Prepare for CISSP Domain 5 | Identity and Access Management | InfosecTrain

07 Sep 2022

Contributed by Lukas

Thank you for watching this video, For more details or free demo with out expert write into us at [email protected] ✅Agenda of the Session ✔️...

How to prepare for CISA Exam | Introduction to CISA | CISA Faqs

07 Sep 2022

Contributed by Lukas

CISA is a globally recognized certification meticulously designed for the professionals responsible for monitoring, managing, and protecting an organi...

Top Cybersecurity Interview Questions

07 Sep 2022

Contributed by Lukas

Cybersecurity is the only area of IT that has not experienced a recession yet. Demand brings competition. It is essential for handling data breaches, ...

What is Docker and its benefits?

06 Sep 2022

Contributed by Lukas

Docker is the open-source containerization platform developers use to bundle applications into containers. Containers are standardized executable comp...

What is Amazon GuardDuty?

06 Sep 2022

Contributed by Lukas

Monitoring the infrastructure and identifying the threats is essential and challenging in the cloud. But to detect the threats and protect the infrast...

Top Methodologies to Improve Penetration Testing

06 Sep 2022

Contributed by Lukas

With the rapid progress of technology, your risk is overshadowed by a competitor that offers considerably more features and best-in-class security in ...

All You Need to Know About Web Hunting | Threat Hunting | InfosecTrain

02 Sep 2022

Contributed by Lukas

Web Hunting is an integral part of threat hunting wherein practice of hunting is done via remote controlled firearms. In this video, you will learn- 👉...

Overview of MITRE ATT&CK Navigator | Security Testing | InfosecTrain

02 Sep 2022

Contributed by Lukas

MITRE ATT&CK is a part of the security testing process where a methodology is used to defend against various types of cybersecurity threats. In th...

AWS Certifications: What You Need to Know | Career Benefits of AWS Certifications

02 Sep 2022

Contributed by Lukas

I am Vipul Aggarwal working as a Business Head with Infosec Train. I will be talking about four levels of AWS certificates and profiles related to the...

What is Cloud Migration? Strategy, Process, and Tools

31 Aug 2022

Contributed by Lukas

Cloud migration is the process of moving your infrastructure to the Cloud. It is like people relocating, but instead of goods, it entails moving data,...

How does Microsoft Sentinel work?

30 Aug 2022

Contributed by Lukas

In Microsoft’s public cloud platform, Microsoft Sentinel is a Security Information and Event Management (SIEM) and Security Orchestration and Automa...

What is Network Traffic Hunting? l How does it Work? l Threat Hunting

30 Aug 2022

Contributed by Lukas

Network Traffic Hunting is a part of the threat hunting course wherein a threat is identified using advanced techniques to avoid any damage or loss to...

SOC Analyst Interview Questions & Answers | Part 1 | Questions for SOC Analyst Interview

29 Aug 2022

Contributed by Lukas

In this session of #SOC Analyst Interview Questions, @INFOSEC TRAIN  has covered interview questions that are mostly asked by the interviewer dur...

What is Extended Enterprise Risk? | Types of Enterprise Risk

29 Aug 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Expert Masterclass : Extended Enterprise Risk” with certified expert ‘Tulika Ghosh’. Agenda for the...

Identity: Rise of New Security Pillar | Cloud-Based Identity Solution

29 Aug 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Identity: Rise of New Security Pillar” with certified expert ‘Rishabh Kotiyal’. Agenda for the Bootc...

Concept of Cyber Kill Chain & Threat Hunting | Cyber Kill Chain | Threat Hunting

29 Aug 2022

Contributed by Lukas

The concept of Cyber Kill Chain was developed by Lockheed Martin in the year 2022. This framework defines the attacker's move through networks to iden...

Why choose “Data Science with Cybersecurity” with InfosecTrain?

26 Aug 2022

Contributed by Lukas

The Data Science with Cybersecurity training course at InfosecTrain is specifically designed for professionals who want to build their careers in cybe...

Phases of Ethical Hacking

25 Aug 2022

Contributed by Lukas

Ethical hackers are highly needed today by businesses and government entities to tackle the growing threat to IT security. Many government organizatio...

Top Vulnerability Analyst Interview Questions

25 Aug 2022

Contributed by Lukas

A Vulnerability Analyst finds vulnerabilities in networks and software and then takes steps to rectify and increase system security. To protect agains...

AWS Penetration Testing Tools

23 Aug 2022

Contributed by Lukas

Since AWS is a leading cloud service provider, a large number of individuals all over the world rely on AWS for a variety of personal and professional...

Curse of Free Downloads | Ways to Prevent Computer Security Threats

22 Aug 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘Curse of Free Downloads’ with certified expert ‘Sanyam’. Agenda for the Webinar 👉 Mistakes People...

How to Protect Organizations from Cyberattacks?

22 Aug 2022

Contributed by Lukas

Information Technology (IT) has transformed the way businesses operate nowadays, especially with evolving technologies like cloud computing, artificia...

Top Trending Cloud Certification In 2022

19 Aug 2022

Contributed by Lukas

Cloud computing is a type of world wide web technology that allows consumers to access a variety of services. Cloud computing will enable you to store...

Interview Questions for Microsoft Sentinel

18 Aug 2022

Contributed by Lukas

Microsoft Azure is the market’s second most dominant cloud service provider. Several Fortune 500 and other top-tier firms take advantage of Azure’...

TCP Vs. UDP

18 Aug 2022

Contributed by Lukas

The TCP and UDP are the communication protocol, which is a set of rules that enables entities to transmit data through any variation of a physical ent...

Docker Image vs. Container: What You Need to Understand!

18 Aug 2022

Contributed by Lukas

Nowadays, developing applications is complicated and involves far more than just writing code. Docker is an open-source software platform that makes i...

Azure Storage Account Security | Authentication Method in Storage Account

16 Aug 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled ‘Azure Storage Account Security’ with certified expert ‘Rishabh’. Agenda for the webinar  What is ...

Day 2 : PIMS Implementation | Secure Development Policy | ISO 27701 Privacy

16 Aug 2022

Contributed by Lukas

Day 2 : PIMS Implementation | Secure Development Policy | ISO 27701 Privacy ✅Agenda of the Session ✔️Leveraging ISO 27001:2013 ✔️ Context of...

DAY 1 : PIMS Implementation | Introduction of Privacy Information Management System

16 Aug 2022

Contributed by Lukas

DAY 1 : PIMS Implementation | Introduction of Privacy Information Management System ✅Agenda of the Session ✔️PIMS Introduction ✔️Privacy Inf...

Best Practices to Secure SaaS Applications

16 Aug 2022

Contributed by Lukas

Cloud computing is undoubtedly prevalent today, but there is no doubt that over time, cybercriminals also have become more vicious. Today, more and mo...

EC-Council CCISO Domain 1: Governance, Risk, and Compliance

11 Aug 2022

Contributed by Lukas

The Chief Information Security Officer, commonly known as CISO, is the top-level executive in charge of an organization’s data and cybersecurity nee...

DevOps Vs. SysOps

10 Aug 2022

Contributed by Lukas

DevOps and SysOps are the buzzwords of cloud computing which is a combination of two words Development Operations (DevOps) and System Operations (SysO...

ISACA CDPSE Domain 3: Data Lifecycle

09 Aug 2022

Contributed by Lukas

ISACA’s CDPSE validates a Data Analyst and Data Scientist’s ability to manage the data lifecycle and guide the organization’s experts on enforci...

Introduction to AWS Architect Certifications | AWS Learning Paths

08 Aug 2022

Contributed by Lukas

InfosecTrain hosts a  event entitled “Prepare for AWS Architect Certifications” with certified expert ‘Krish’. ✅Our Official Website - ...

ISACA CDPSE Domain 2 : Privacy Architecture

08 Aug 2022

Contributed by Lukas

This comprehensive blog is to explore and provide an overview of the contents and concepts covered in ISACA CDPSE Domain 2. Every organization require...

ISACA CDPSE Domain 1: Privacy Governance

08 Aug 2022

Contributed by Lukas

This comprehensive blog is to explore and provide an overview of contents and concepts covered in ISACA CDPSE domain 1. Certified Data Privacy Solutio...

Cloud Engineer vs. DevOps Engineer

03 Aug 2022

Contributed by Lukas

This evolving world of information technology, whether related to the cloud or the developer industry, is showing significant progress. This innovatio...

Cloud Storage Best Practices

02 Aug 2022

Contributed by Lukas

Cloud storage security has grown to evaluate and deploy as it becomes more popular among businesses. It is making a collection of best practices for p...

Emerging Cyber Threats in 2022

01 Aug 2022

Contributed by Lukas

Cybersecurity has long been a top priority, and it will continue to be so as our personal and professional lives become increasingly reliant on digita...

Benefits of EC-Council Certified Cloud Security Engineer (C|CSE)

29 Jul 2022

Contributed by Lukas

Cloud technology has been a driving reason for businesses to operate effortlessly in the modern digital era. It has completely transformed how busines...

Career Scope as a SOC Professional

28 Jul 2022

Contributed by Lukas

What is SOC? What are the skills required for SOC? What would be the career path for a SOC Analyst? What are the certifications available for SOC? If ...

How to prepare for C|PENT Exam?

27 Jul 2022

Contributed by Lukas

Due to the increase in cybercrimes in recent years, cybersecurity has become extremely important. Companies do extensive security testing to determine...

Infosectrain Review - CCSP | Success Stories | @Richa Agrawal CCSP Gladiator

27 Jul 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our CCSP Gladiator (Richa Agrawal)...

Infosectrain Review - CISSP | Success Stories | @Anwar Hussain CISSP Gladiator

27 Jul 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our CISSP Gladiator (@Anwar Hussai...

What is Threat Hunting 101 | Scope and Industry | Threat Hunting Tools

27 Jul 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “Threat Hunting 101” with certified expert ‘Abdul Mateen’. Agenda for the Bootcamp 👉 Definitions a...

What's New in CCSP 2022 Domain 2 Cloud Data Security | Tops tips for CCSP 2022

27 Jul 2022

Contributed by Lukas

In this constantly evolving and extremely competing world of cloud, one faces unique security challenges almost every day with regards to unaccustomed...

What's New in CCSP 2022 | CCSP Domain 1 Part 2 | Tops tips for CCSP 2022

27 Jul 2022

Contributed by Lukas

In this constantly evolving and extremely competing world of cloud, one faces unique security challenges almost every day with regards to unaccustomed...

What's New in CCSP 2022 | CCSP Domain 1 Part 1 | Tops tips for CCSP 2022

27 Jul 2022

Contributed by Lukas

In this constantly evolving and extremely competing world of cloud, one faces unique security challenges almost every day with regards to unaccustomed...

Everything You Need to Know For CompTIA CySA+ | InfosecTrain

18 Jul 2022

Contributed by Lukas

Cloud services are also often highly scalable, helping business owners to invest in only what they need – and increasing or decreasing these resourc...

Cloud Security Fundamentals | What is Cloud Security? | Secure Your Cloud By Rishabh

18 Jul 2022

Contributed by Lukas

Agenda for the Session 🧾⤵️     Protect the Platform   👉 Basics of platform protection    👉 Demo: Deploy man...

What is Reconnaissance? Where you can do Reconnaissance ? | Reconnaissance Tool | day 2 CEH

15 Jul 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “CEH Unleashed” with certified expert ‘Sanyam Negi’. Agenda for the Bootcamp 👉 What is Ethical Hac...

What is Ethical Hacking? Learn Ethical Hacking | Learn CEH Day 1 | InfosecTrain

14 Jul 2022

Contributed by Lukas

InfosecTrain hosts a live event entitled “CEH Unleashed” with certified expert ‘Sanyam Negi’. Agenda for the Bootcamp 👉 What is Ethical Hac...

What is Cryptography | Types of Cryptography | InfosecTrain

11 Jul 2022

Contributed by Lukas

Cryptography is the practice of encrypting all data and information for safe communication by converting plain text to cipher text. There are three ty...

«« ← Prev Page 14 of 16 Next → »»