InfosecTrain
Episodes
DAY 2 : Data Science For Cyber Security using Python
11 Jul 2022
Contributed by Lukas
Introduction to Cyber Security & Data Science What is Cyber Security & Data Science? Types of Cyber Security? What motivates Cyber Crimin...
DAY 1 : Data Science For Cyber Security using Python
08 Jul 2022
Contributed by Lukas
Introduction to Cyber Security & Data Science What is Cyber Security & Data Science? Types of Cyber Security? What motivates Cyber Crimin...
What is IoT? | How IoT Works? | InfosecTrain
08 Jul 2022
Contributed by Lukas
The concept of linking any device to the Internet and other connected devices is known as the Internet of Things. The Internet of Items (IoT) is a mas...
What is Multi-factor Authentication | InfosecTrain
07 Jul 2022
Contributed by Lukas
MFA (Multi-factor Authentication) is an authentication method that enables a user to give two or more verification factors in order to get access to a...
What is DNS Cache Poisoning and Firewall? | InfosecTrain
07 Jul 2022
Contributed by Lukas
DNS cache poisoning, also known as DNS spoofing, is a type of attack that diverts Internet traffic away from real servers and towards counterfeit ones...
What is Privilege Escalation? | InfosecTrain
06 Jul 2022
Contributed by Lukas
Privilege escalation is a hostile attempt to collect unauthorized access to sensitive information by taking over a user's account with the appropriate...
What is DoS & DDos Attack? | Categories of DOS and DDOS Attacks | InfosecTrain
06 Jul 2022
Contributed by Lukas
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are perhaps the most dangerous of all the various types of cyberattacks. Here...
What is Scanning In Ethical Hacking? | How to use Scanning in Ethical Hacking? | InfosecTrain
05 Jul 2022
Contributed by Lukas
The practice of troubleshooting active devices on your system for vulnerabilities is known as network scanning. It uses one or more elements of the ne...
Nmap Step by Step tutorial | InfosecTrain
05 Jul 2022
Contributed by Lukas
Nmap stands for Network Mapper. It is a free and open-source Linux command-line utility for scanning IP addresses and ports in a network and detecting...
Nmap Options Explained | InfosecTrain
05 Jul 2022
Contributed by Lukas
Nmap is a network scanner that sends packets and analyzes the responses to find hosts and services on a computer network. Nmap has a number of feature...
How to Prepare for ISACA CDPSE | What is Privacy ? | CDPSE Exam Preparation
04 Jul 2022
Contributed by Lukas
Thank you for listening, For more details or free demo with out expert write into us at [email protected] ✅Learn more about our Training...
TCP - Three-way handshake in detail | TCP 3-Way Handshake Process | InfosecTrain
04 Jul 2022
Contributed by Lukas
Three-Way HandShake is a technique used in a TCP/IP network to establish a connection between the server and client. Before the actual data transmissi...
What is Reconnaissance in ethical hacking? | InfosecTrain
04 Jul 2022
Contributed by Lukas
Ethical hacking begins with obtaining information and becoming acquainted with the target system. Reconnaissance is a collection of techniques and met...
What are the Types of Hacker in cyber security | InfosecTrain
04 Jul 2022
Contributed by Lukas
A hacker is someone who is fascinated by the hidden workings of any computer operating system. Hackers are classified into 10 types, which are as foll...
What are Security Threat Actors? | Types of Threat Actors | InfosecTrain
04 Jul 2022
Contributed by Lukas
External threats are virtually always malignant, with decent alternatives for data theft, damage, and service disruption. Internal threats might be le...
Security Controls in Cyber Security | Security Control Function | InfosecTrain
04 Jul 2022
Contributed by Lukas
Security controls are guidelines to secure various types of data and infrastructure critical to an enterprise. Security control is protection or count...
What is Classful IP Address? | InfosecTrain
04 Jul 2022
Contributed by Lukas
An IPv4 addressing architecture that separates addresses into five categories is known as classful addressing. Prior to classful addressing, the first...
The Five Types of SOC Models | InfosecTrain
30 Jun 2022
Contributed by Lukas
A security operations center (SOC) is a centralized and unified cybersecurity incident prevention, detection, and response capability that helps firms...
What is a Subnet Mask? | InfosecTrain
30 Jun 2022
Contributed by Lukas
An IP address comprises the network address and the host address. The IP address is divided into network and host addresses by a subnet mask. If more ...
What is Three way and four way handshake | Difference Between 3-way & 4-way Handshake
30 Jun 2022
Contributed by Lukas
TCP connection establishment takes three phases, while (TCP) graceful termination takes four, which is why the connection and graceful termination pro...
What is SYN Flood Attack? | How Can we prevent SYN Flood Attack? | InfosecTrain
30 Jun 2022
Contributed by Lukas
A SYN flood is a type of denial-of-service attack in which an attacker establishes a connection to a server quickly but does not complete it. The serv...
What is Reconnaissance in Cybersecurity? | Activity of Reconnaissance | InfosecTrain
30 Jun 2022
Contributed by Lukas
Ethical hacking begins with obtaining information and becoming acquainted with the target system. Reconnaissance is a collection of techniques and met...
What is Network Topology? | How Many Types of Network Topology? | InfosecTrain
30 Jun 2022
Contributed by Lukas
The network topology describes the physical and logical structure of a network. It shows the location and interconnection of network elements, such as...
What is Data Visualization? | Types of Data Visualization | InfosecTrain
30 Jun 2022
Contributed by Lukas
Data visualization is the process of converting information into a visual representation, such as a map or graph, in order to make data easier to comp...
What is Internet Assigned Number Authority? | InfosecTrain
30 Jun 2022
Contributed by Lukas
Internet Assigned Numbers Authority is responsible for assigning numbering systems and unique names that serve as the foundation of the global interne...
Prepare for CISSP Exam | CISSP Exam Domains | CISSP Question and Answer practice | InfosecTrain
30 Jun 2022
Contributed by Lukas
✅Agenda of the Session ✔️Introduction ✔️CISSP Exam Domains ✔️Exam Structure and Preparation Plan ✔️Questions and Answer Practice ✔...
IP Address Classes explained | InfosecTrain
30 Jun 2022
Contributed by Lukas
There are five classes of IPv4 IP addresses: A, B, C, D, and E. Each class has its own set of IP addresses. The overwhelming majority of devices...
Dynamic Host Configuration Protocol Explained | How DHCP works? | InfosecTrain
30 Jun 2022
Contributed by Lukas
DHCP (Dynamic Host Configuration Protocol) is a protocol that allows for the allocation of IP addresses in a network to be managed quickly, automatica...
What is Pyramid of Pain in details? | InfosecTrain
29 Jun 2022
Contributed by Lukas
Pyramid of pain, created by David J Bianco, is a visual representation of six different sorts of attack indicators, grouped in ascending order of thre...
What is Network Security? | Types of Network Security | InfosecTrain
29 Jun 2022
Contributed by Lukas
The word "network security" refers to a wide range of technology, devices, and processes. In its most basic form, it is a set of rules and configurati...
What is Cluster Analysis? | Cluster Analysis in Detail? | InfosecTrain
24 Jun 2022
Contributed by Lukas
Watch now: https://www.youtube.com/watch?v=TAnOlBQLTqc Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infosec_Train Li...
What is CIA Triad? | Confidentiality, Integrity and Availability | InfosecTrain
24 Jun 2022
Contributed by Lukas
Watch now: https://www.youtube.com/watch?v=h5uhF4ZSS_w Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infosec_Train Li...
What is a DHCP Starvation Attack? | InfosecTrain
24 Jun 2022
Contributed by Lukas
Watch now: https://www.youtube.com/watch?v=ZHHkFNZRPHw Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infosec_Train Li...
Incident Response in Detail? | How many stages in Incident Response? | InfosecTrain
24 Jun 2022
Contributed by Lukas
Watch now: https://www.youtube.com/watch?v=NyrvaLBYjDA Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infosec_Train Li...
An Introduction to Bug Bounty | What is Bug Bounty | How can I become a Bug Bounty Expert?
24 Jun 2022
Contributed by Lukas
Watch now: https://www.youtube.com/watch?v=KxnCE_ewKE4 ✅Agenda of the Session ✔️What is Bug Bounty ✔️Basic Knowledge needed to start in Bug...
What is Data Privacy? | Why data privacy is important? | InfosecTrain
16 Jun 2022
Contributed by Lukas
Watch now: https://www.youtube.com/watch?v=inhabwU203Y ✅Agenda of the Session ✔️What is Hype about Data Privacy? ✔️What is Data Privacy? ✔...
What is AWS IAM | AWS Identity and Access Management | InfosecTrain
16 Jun 2022
Contributed by Lukas
Watch now: https://www.youtube.com/watch?v=7OW6rTsiL9Q&t=38s ✅Agenda of the Session ✔️What's AWS IAM(Identity and Access Management) ✔️...
Infosectrain Review - ISO : 27001 Lead Auditor | Success Stories | Mohammad Haziq ISO Gladiator
16 Jun 2022
Contributed by Lukas
Watch now: https://www.youtube.com/watch?v=JkyV-Mo4syI&t=9s Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infosec...
CISA Practice Questions | CISA Exam Preparation | CISA Q&A Part 3 | InfosecTrain
16 Jun 2022
Contributed by Lukas
Watch now: https://www.youtube.com/watch?v=F0tR33IJGKg&t=14s Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infose...
CISA Practice Questions | CISA Exam Preparation | CISA Q&A Part 2 | InfosecTrain
16 Jun 2022
Contributed by Lukas
Watch now: https://www.youtube.com/watch?v=KKV1Sbo4Q7Y&t=10s Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infose...
Introduction to CISA Exam | How to Attempt CISA Exam | CISA Practice Q&A | CISA Q&A Part 1
16 Jun 2022
Contributed by Lukas
Watch now: https://www.youtube.com/watch?v=IuZ5HyV69MQ&t=17s Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infose...
CCSP Domain 6: Legal, Risk and Compliance | InfosecTrain
16 Jun 2022
Contributed by Lukas
Watch now: https://www.youtube.com/watch?v=LZaAVYnI_7w&t=14s Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infose...
CCSP Domain 5: Cloud Security Operations | InfosecTrain
16 Jun 2022
Contributed by Lukas
Watch now: https://www.youtube.com/watch?v=sG39e7abD9Y&t=15s Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infose...
CCSP Domain 4 : Cloud Application Security | Identity and Access Management | InfosecTrain
10 Jun 2022
Contributed by Lukas
In this constantly evolving and extremely competing world of cloud, one faces unique security challenges almost every day with regards to unaccustomed...
CCSP Domain 3: Cloud Platform & Infrastructure Security | InfosecTrain
10 Jun 2022
Contributed by Lukas
In this constantly evolving and extremely competing world of cloud, one faces unique security challenges almost every day with regards to unaccustomed...
CCSP Domain 2 : Cloud Data Security | Data Security Life Cycle | InfosecTrain
10 Jun 2022
Contributed by Lukas
In this constantly evolving and extremely competing world of cloud, one faces unique security challenges almost every day with regards to unaccustomed...
CCSP Domain 1 : Cloud Concepts, Architecture, and Design | InfosecTrain
10 Jun 2022
Contributed by Lukas
In this constantly evolving and extremely competing world of cloud, one faces unique security challenges almost every day with regards to unaccustomed...
Introduction to CCSP | About CCSP Training | What is CCSP certification? | InfosecTrain
10 Jun 2022
Contributed by Lukas
In this constantly evolving and extremely competing world of cloud, one faces unique security challenges almost every day with regards to unaccustomed...
CRISC Practice Q&A | CRISC Exam Interview Question Preparation | InfosecTrain
10 Jun 2022
Contributed by Lukas
✅Agenda of the Session ✔️CRISC Exam Practice Q&A Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infosec_Trai...
Infosectrain Review - CISSP | Success Stories | Siddesh CISSP Gladiator
10 Jun 2022
Contributed by Lukas
InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Siddesh) has to say...
Day 2 : Become Expert in Cloud Security Practitioner | What is Security as a Service | InfosecTrain
09 Jun 2022
Contributed by Lukas
✅Agenda of the Session ✔️Security Operation Cloud ✔️What is Security as a Service ✔️How Logging Works in Cloud ✔️Incident Response ✔...
Day 1 : Become Expert in Cloud Security Practitioner | Introduction to Cloud | InfosecTrain
09 Jun 2022
Contributed by Lukas
✅Agenda of the Session ✔️Introduction to Cloud ✔️What is Cloud? ✔️Types of Cloud? ✔️Types of Service? ✔️Demo of Cloud Resources ...
What are Threat Intelligence & Threat Hunting? | InfosecTrain
07 Jun 2022
Contributed by Lukas
✅Agenda of the Session ✔️Threat Intelligence ✔️Types of Threat Intelligence ✔️Threat Hunting
Kusto Query Language (KQL) | Scalar Operation and Function | Day 2- KQL
06 Jun 2022
Contributed by Lukas
✅Agenda of the Session ✔️Analyzing Query Result using KQL ✔️Summarize data use function dcount, arg-max, makeset and more. ✔️Render visu...
Kusto Query Language (KQL) | What is KQL? | Use of KQL? | Day 1- KQL
06 Jun 2022
Contributed by Lukas
✅Agenda of the Session ✔️What is KQL? ✔️Use of KQL? ✔️Most Used Operator of the KQL? ✔️Learn Operator Like Where Search, Extend,Proj...
RedTeam : Attacks in Active Directory | Day 4: RedTeam | InfosecTrain
31 May 2022
Contributed by Lukas
✅Agenda of the Session ✔️Understanding The tools Used in exploiting AD ✔️Discussing the working of Attacks in Active Directory ✔️Attacki...
RedTeam : What is Active Directory | Terminologies in Active Directory | Day 3: RedTeam
31 May 2022
Contributed by Lukas
✅Agenda of the Session ✔️Understanding Active Directory ✔️Useful Terminologies in Active Directory ✔️Understanding of Components of Acti...
RedTeam : What is Metasploit Framework | Day 2: RedTeam | InfosecTrain
31 May 2022
Contributed by Lukas
✅Agenda of the Session ✔️Looking Into Metasploit Framework ✔️Challenge solving ✔️Using Metasploit Framework For exploiting
RedTeam : What is Red Team Kill Chain | Day 1: RedTeam | InfosecTrain
31 May 2022
Contributed by Lukas
✅Agenda of the Session ✔️Red Team Kill Chain - Initial Access & Delivery - Weaponization - Command & Control - C...
Day 2: Data Science Project using Python | Machine Learning | InfosecTrain
29 May 2022
Contributed by Lukas
✅Agenda of the Session ✅Data Science Project ✔️Data Collection ✔️Data Cleaning ✔️Data Visualization ✔️Data Transformation ✔️Tr...
Day 1: Data Science Project using Python | What is Data Science? | InfosecTrain
29 May 2022
Contributed by Lukas
✅Agenda of the Session ✅What You’ll Learn ✔️Data Science ✔️Machine Learning ✔️Machine Learning Models ✔️Python ✔️Pandas ✔️...
What is Cloud Security Practitioner? | Cloud Security Practitioner | InfosecTrain
29 May 2022
Contributed by Lukas
Course Content Module1: Cloud Basics and Models Module2: Deploy and Understand Compute and Configuration Module3: Deploy and Monitor Network Resources...
CyberArk Basic to Advanced | What is CyberArk? | InfosecTrain
25 May 2022
Contributed by Lukas
✅Agenda of the Session ✔️Introduction of CyberArk ✔️What is PAM? ✔️CyberArk Basics ✔️Introduction to Infosectrain CyberArk cou...
Day 2: Purview of Cyber Security | Evolution Of Attacks | InfosecTrain
24 May 2022
Contributed by Lukas
✅Agenda of the Session ✔️Red Team & Pen Testing ✔️Evolution Of Attacks ✔️Types of Threat Actors ✔️Denial of Service Attacks ✔️...
Day 1: Purview of Cyber Security | What is information security | InfosecTrain
24 May 2022
Contributed by Lukas
✅Agenda of the Session ✔️Introduction to Information Security ✔️Understanding of CIA Triad
CCSP Exam Preparation | CCSP Questions Practice | InfosecTrain
23 May 2022
Contributed by Lukas
✅Agenda of the Session ✔️CCSP Introduction ✔️CCSP Exam Informtion & Changes ✔️CCSP Exam Preparation Plan ✔️CCSP Questions Practi...
Day 2: SOC -The Central Nervous System of Security | What is SIEM | InfosecTrain
20 May 2022
Contributed by Lukas
✅Agenda of the Session ✔️SIEM – Heart of SOC ✔️SIEM Architecture ✔️Tour of SIEM ✔️ELK Stack Primer ✔️ QRadar – Architecture ...
Day 1: SOC -The Central Nervous System of Security | What is SOC | InfosecTrain
20 May 2022
Contributed by Lukas
✅Agenda of the Session ✔️SOC – Security Operation Center ✔️Challenges of Traditional (or no) SOC ✔️SOC Models ✔️SOC Services ✔️...
Infosectrain Review - CISSP | Success Stories | Balakrishnan CISSP Gladiator
13 May 2022
Contributed by Lukas
InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Balakrishnan) has t...
Infosectrain Review - CISSP | Success Stories | Santosh Patnaik CISSP Gladiator
13 May 2022
Contributed by Lukas
InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Santosh Patnaik) ha...
Infosectrain Review - CISSP | Success Stories | Anil Gangwani CISSP Gladiator
13 May 2022
Contributed by Lukas
InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Anil Gangwani ) has...
Infosectrain Review - CISSP | Success Stories | Akhil Verma(Paytm Money) CISSP Gladiator
13 May 2022
Contributed by Lukas
InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Akhil Verma (Paytm ...
Infosectrain Review - CISM | Success Stories | Zeshan Ahmad CISM Gladiator
13 May 2022
Contributed by Lukas
InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Zeshan Ahmad ) has ...
Infosectrain Review - CISM | Success Stories | JAIKISHAN SAH CISM Gladiator
13 May 2022
Contributed by Lukas
InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (JAIKISHAN SAH ) has...
Infosectrain Review - CISM | Success Stories | Harshit Mathur CISM Gladiator
13 May 2022
Contributed by Lukas
InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Harshit Mathur ) ha...
Infosectrain Review - CEH | Success Stories | Pranay Paliwal CEH Gladiator
13 May 2022
Contributed by Lukas
InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Pranay Paliwal) has...
What is DoS & DDoS Attack? | Difference between DoS & DDoS | InfosecTrain
13 May 2022
Contributed by Lukas
A denial-of-service (DoS) attack overloads a server, rendering a website or resource unusable. DDoS attacks employ several computers or devices to ove...
What is Authentication and Authorization? | InfosecTrain
13 May 2022
Contributed by Lukas
Authentication and Authorization are two commonly used words in the field of information security. They may have a similar sound, but they are not the...
What is a Firewall? | Types of Firewall? | InfosecTrain
13 May 2022
Contributed by Lukas
A firewall is a hardware or software device that may be configured to block data from specified sites, applications, or ports while allowing important...
Infosectrain Review - CCSK | Success Stories | Sathyapriya G CCSK Gladiator
13 May 2022
Contributed by Lukas
InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Sathyapriya G) has ...
Infosectrain Review - CISM | Success Stories | Anand CISM Gladiator
06 May 2022
Contributed by Lukas
InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Anand) has to say a...
Infosectrain Review - CISSP | Success Stories | Cornelius Okudzeto CISSP Gladiator
06 May 2022
Contributed by Lukas
InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Cornelius Okudzeto)...
Infosectrain Review - CISSP | Success Stories | SAINATH CISSP Gladiator
06 May 2022
Contributed by Lukas
InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (SAINATH) has to say...
Infosectrain Review - CISSP | Success Stories | Shriya CISSP Gladiator
06 May 2022
Contributed by Lukas
InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Shriya) has to say ...
Infosectrain Review - CISSP | Success Stories | Vivek Dwivedi CISSP Gladiator
06 May 2022
Contributed by Lukas
InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Vivek Dwivedi) has ...
Infosectrain Review - ISO 27001 | Success Stories | Dheeraj Simha ISO Gladiator
06 May 2022
Contributed by Lukas
InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Dheera Simhaj) has ...
CCSK Exam Prep | CCSK Certification path | InfosecTrain
06 May 2022
Contributed by Lukas
✅Agenda of the Session ✔️Brief On Certificate of Cloud Security Knowledge ✔️CCSK Domains ✔️Other Documents Required For Passing ✔️CC...
Threat Hunting & Threat Intelligence | InfosecTrain
06 May 2022
Contributed by Lukas
✅Agenda of the Session ✔️Adversaries: Pain For Enterprise ✔️Threat Hunting & Threat Intelligence ✔️Leveraging the Detection With Int...
OSINT for Infosec Professionals | What is OSINT? | InfosecTrain
06 May 2022
Contributed by Lukas
✅Agenda of the Session ✔️What is OSINT? ✔️Why OSINT for Security Professionals? ✔️How to Get Started?
What's New in AWS Certified Solutions Architect -Associate (SAA-C03) | InfosecTrain
06 May 2022
Contributed by Lukas
✅Agenda of the Session ✔️AWS Certification ✔️Skills Facebook Twitter LinkedIn Instagram Telegram
MITRE For Red Teaming | What is Red Team? | MITRE Attacks Framework | InfosecTrain
15 Apr 2022
Contributed by Lukas
✅Agenda of the Session ✔️What is Red Team? ✔️Red Team kill Chain ✔️MITRE Attacks Framework ✔️Planing with MITRE Attacks ✔️Framew...
CISM Domain 1 – Information Security Governance | CISM Preperation | InfosecTrain
12 Apr 2022
Contributed by Lukas
✅Agenda of the Session ✔️Information Security ✔️Information Risk Management ✔️Information Security Program ✔️Information Security In...
Whats New in CISM 2022 | CISM 2022 New Syllabus | InfosecTrain
12 Apr 2022
Contributed by Lukas
✅Agenda of the Session ✔️Understanding CISM Structure ✔️Old Syllabus CISM Vs New Syllabus CISM ✔️CISM 2022 New Syllabus
Data Privacy Europe and GDPR Certification Prep | CIPP/E Introduction | InfosecTrain
10 Apr 2022
Contributed by Lukas
✅Agenda of the Session ✔️What is Data Privacy and its Need? ✔️Certification for data Privacy? ✔️CIPP/E Introduction Coverage ✔️How t...
Data Science Career Guide - Interview Preparation | Interview Questions | InfosecTrain
06 Apr 2022
Contributed by Lukas
✅Agenda of the Session ✔️ Data Science Resume Building ✔️ Data Science Portfolio Building ✔️ Data Science Questions ✔️ How to Prepar...
DAY 2: CEH v11 with Question Practice | CEH Practice questions | InfosecTrain
05 Apr 2022
Contributed by Lukas
✅Agenda of the Session ✔️ Top 5 domains one can enter after CEH ✔️ Your career after CEH ✔️ CEH Practice questions ✔️ CEH Doubt Sess...
DAY 1: CEH v11 with Question Practice | Introduction to CEH v11 | InfosecTrain
05 Apr 2022
Contributed by Lukas
✅Agenda of the Session ✔️Introduction to CEH ✔️CEH Exam details discussion ✔️Why demand of CEH is increasing? ✔️CEH Solving a challe...
GRC Bootcamp | Governance Risk Management Compliance | InfosecTrain
04 Apr 2022
Contributed by Lukas
✅Agenda of the Session ✔️What is GRC? ✔️Types of IT Controls ✔️Risk Assessment ✔️What is Information Security Risk? ✔️Moniter &a...
Prepare for CCSP certification Exam | What is CCSP? | CCSP Domains | InfosecTrain
04 Apr 2022
Contributed by Lukas
✅Agenda of the Session ✔️What is CCSP? ✔️CCSP Domains ✔️Domain -1 Architecture Concepts ✔️Domain -2 Cloud Data Security ✔️Domain...
Day 2 : Basics of Cloud Computing By Yash | Microservices | Azure Services | InfosecTrain
01 Apr 2022
Contributed by Lukas
✅Agenda of the Session ✔️Virtual Machines Vs Containers ✔️Docker ✔️Microservices ✔️Container Orchestration ✔️Kubernetes ✔️Az...