Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

InfosecTrain

Education

Episodes

Showing 1401-1500 of 1534
«« ← Prev Page 15 of 16 Next → »»

DAY 2 : Data Science For Cyber Security using Python

11 Jul 2022

Contributed by Lukas

Introduction to Cyber Security & Data Science What is Cyber Security & Data Science? Types of Cyber Security? What motivates Cyber Crimin...

DAY 1 : Data Science For Cyber Security using Python

08 Jul 2022

Contributed by Lukas

Introduction to Cyber Security & Data Science What is Cyber Security & Data Science? Types of Cyber Security? What motivates Cyber Crimin...

What is IoT? | How IoT Works? | InfosecTrain

08 Jul 2022

Contributed by Lukas

The concept of linking any device to the Internet and other connected devices is known as the Internet of Things. The Internet of Items (IoT) is a mas...

What is Multi-factor Authentication | InfosecTrain

07 Jul 2022

Contributed by Lukas

MFA (Multi-factor Authentication) is an authentication method that enables a user to give two or more verification factors in order to get access to a...

What is DNS Cache Poisoning and Firewall? | InfosecTrain

07 Jul 2022

Contributed by Lukas

DNS cache poisoning, also known as DNS spoofing, is a type of attack that diverts Internet traffic away from real servers and towards counterfeit ones...

What is Privilege Escalation? | InfosecTrain

06 Jul 2022

Contributed by Lukas

Privilege escalation is a hostile attempt to collect unauthorized access to sensitive information by taking over a user's account with the appropriate...

What is DoS & DDos Attack? | Categories of DOS and DDOS Attacks | InfosecTrain

06 Jul 2022

Contributed by Lukas

Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are perhaps the most dangerous of all the various types of cyberattacks. Here...

What is Scanning In Ethical Hacking? | How to use Scanning in Ethical Hacking? | InfosecTrain

05 Jul 2022

Contributed by Lukas

The practice of troubleshooting active devices on your system for vulnerabilities is known as network scanning. It uses one or more elements of the ne...

Nmap Step by Step tutorial | InfosecTrain

05 Jul 2022

Contributed by Lukas

Nmap stands for Network Mapper. It is a free and open-source Linux command-line utility for scanning IP addresses and ports in a network and detecting...

Nmap Options Explained | InfosecTrain

05 Jul 2022

Contributed by Lukas

Nmap is a network scanner that sends packets and analyzes the responses to find hosts and services on a computer network. Nmap has a number of feature...

How to Prepare for ISACA CDPSE | What is Privacy ? | CDPSE Exam Preparation

04 Jul 2022

Contributed by Lukas

Thank you for listening, For more details or free demo with out expert write into us at [email protected]   ✅Learn more about our Training...

TCP - Three-way handshake in detail | TCP 3-Way Handshake Process | InfosecTrain

04 Jul 2022

Contributed by Lukas

Three-Way HandShake is a technique used in a TCP/IP network to establish a connection between the server and client. Before the actual data transmissi...

What is Reconnaissance in ethical hacking? | InfosecTrain

04 Jul 2022

Contributed by Lukas

Ethical hacking begins with obtaining information and becoming acquainted with the target system. Reconnaissance is a collection of techniques and met...

What are the Types of Hacker in cyber security | InfosecTrain

04 Jul 2022

Contributed by Lukas

A hacker is someone who is fascinated by the hidden workings of any computer operating system. Hackers are classified into 10 types, which are as foll...

What are Security Threat Actors? | Types of Threat Actors | InfosecTrain

04 Jul 2022

Contributed by Lukas

External threats are virtually always malignant, with decent alternatives for data theft, damage, and service disruption. Internal threats might be le...

Security Controls in Cyber Security | Security Control Function | InfosecTrain

04 Jul 2022

Contributed by Lukas

Security controls are guidelines to secure various types of data and infrastructure critical to an enterprise. Security control is protection or count...

What is Classful IP Address? | InfosecTrain

04 Jul 2022

Contributed by Lukas

An IPv4 addressing architecture that separates addresses into five categories is known as classful addressing. Prior to classful addressing, the first...

The Five Types of SOC Models | InfosecTrain

30 Jun 2022

Contributed by Lukas

A security operations center (SOC) is a centralized and unified cybersecurity incident prevention, detection, and response capability that helps firms...

What is a Subnet Mask? | InfosecTrain

30 Jun 2022

Contributed by Lukas

An IP address comprises the network address and the host address. The IP address is divided into network and host addresses by a subnet mask. If more ...

What is Three way and four way handshake | Difference Between 3-way & 4-way Handshake

30 Jun 2022

Contributed by Lukas

TCP connection establishment takes three phases, while (TCP) graceful termination takes four, which is why the connection and graceful termination pro...

What is SYN Flood Attack? | How Can we prevent SYN Flood Attack? | InfosecTrain

30 Jun 2022

Contributed by Lukas

A SYN flood is a type of denial-of-service attack in which an attacker establishes a connection to a server quickly but does not complete it. The serv...

What is Reconnaissance in Cybersecurity? | Activity of Reconnaissance | InfosecTrain

30 Jun 2022

Contributed by Lukas

Ethical hacking begins with obtaining information and becoming acquainted with the target system. Reconnaissance is a collection of techniques and met...

What is Network Topology? | How Many Types of Network Topology? | InfosecTrain

30 Jun 2022

Contributed by Lukas

The network topology describes the physical and logical structure of a network. It shows the location and interconnection of network elements, such as...

What is Data Visualization? | Types of Data Visualization | InfosecTrain

30 Jun 2022

Contributed by Lukas

Data visualization is the process of converting information into a visual representation, such as a map or graph, in order to make data easier to comp...

What is Internet Assigned Number Authority? | InfosecTrain

30 Jun 2022

Contributed by Lukas

Internet Assigned Numbers Authority is responsible for assigning numbering systems and unique names that serve as the foundation of the global interne...

Prepare for CISSP Exam | CISSP Exam Domains | CISSP Question and Answer practice | InfosecTrain

30 Jun 2022

Contributed by Lukas

✅Agenda of the Session ✔️Introduction ✔️CISSP Exam Domains ✔️Exam Structure and Preparation Plan ✔️Questions and Answer Practice ✔...

IP Address Classes explained | InfosecTrain

30 Jun 2022

Contributed by Lukas

There are five classes of IPv4 IP addresses: A, B, C, D, and E. Each class has its own set of IP addresses.  The overwhelming majority of devices...

Dynamic Host Configuration Protocol Explained | How DHCP works? | InfosecTrain

30 Jun 2022

Contributed by Lukas

DHCP (Dynamic Host Configuration Protocol) is a protocol that allows for the allocation of IP addresses in a network to be managed quickly, automatica...

What is Pyramid of Pain in details? | InfosecTrain

29 Jun 2022

Contributed by Lukas

Pyramid of pain, created by David J Bianco, is a visual representation of six different sorts of attack indicators, grouped in ascending order of thre...

What is Network Security? | Types of Network Security | InfosecTrain

29 Jun 2022

Contributed by Lukas

The word "network security" refers to a wide range of technology, devices, and processes. In its most basic form, it is a set of rules and configurati...

What is Cluster Analysis? | Cluster Analysis in Detail? | InfosecTrain

24 Jun 2022

Contributed by Lukas

Watch now: https://www.youtube.com/watch?v=TAnOlBQLTqc Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infosec_Train Li...

What is CIA Triad? | Confidentiality, Integrity and Availability | InfosecTrain

24 Jun 2022

Contributed by Lukas

Watch now: https://www.youtube.com/watch?v=h5uhF4ZSS_w Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infosec_Train Li...

What is a DHCP Starvation Attack? | InfosecTrain

24 Jun 2022

Contributed by Lukas

Watch now: https://www.youtube.com/watch?v=ZHHkFNZRPHw Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infosec_Train Li...

Incident Response in Detail? | How many stages in Incident Response? | InfosecTrain

24 Jun 2022

Contributed by Lukas

Watch now: https://www.youtube.com/watch?v=NyrvaLBYjDA Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infosec_Train Li...

An Introduction to Bug Bounty | What is Bug Bounty | How can I become a Bug Bounty Expert?

24 Jun 2022

Contributed by Lukas

Watch now: https://www.youtube.com/watch?v=KxnCE_ewKE4 ✅Agenda of the Session ✔️What is Bug Bounty ✔️Basic Knowledge needed to start in Bug...

What is Data Privacy? | Why data privacy is important? | InfosecTrain

16 Jun 2022

Contributed by Lukas

Watch now: https://www.youtube.com/watch?v=inhabwU203Y ✅Agenda of the Session ✔️What is Hype about Data Privacy? ✔️What is Data Privacy? ✔...

What is AWS IAM | AWS Identity and Access Management | InfosecTrain

16 Jun 2022

Contributed by Lukas

Watch now: https://www.youtube.com/watch?v=7OW6rTsiL9Q&t=38s ✅Agenda of the Session ✔️What's AWS IAM(Identity and Access Management) ✔️...

Infosectrain Review - ISO : 27001 Lead Auditor | Success Stories | Mohammad Haziq ISO Gladiator

16 Jun 2022

Contributed by Lukas

Watch now: https://www.youtube.com/watch?v=JkyV-Mo4syI&t=9s Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infosec...

CISA Practice Questions | CISA Exam Preparation | CISA Q&A Part 3 | InfosecTrain

16 Jun 2022

Contributed by Lukas

Watch now: https://www.youtube.com/watch?v=F0tR33IJGKg&t=14s Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infose...

CISA Practice Questions | CISA Exam Preparation | CISA Q&A Part 2 | InfosecTrain

16 Jun 2022

Contributed by Lukas

Watch now: https://www.youtube.com/watch?v=KKV1Sbo4Q7Y&t=10s Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infose...

Introduction to CISA Exam | How to Attempt CISA Exam | CISA Practice Q&A | CISA Q&A Part 1

16 Jun 2022

Contributed by Lukas

Watch now: https://www.youtube.com/watch?v=IuZ5HyV69MQ&t=17s Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infose...

CCSP Domain 6: Legal, Risk and Compliance | InfosecTrain

16 Jun 2022

Contributed by Lukas

Watch now: https://www.youtube.com/watch?v=LZaAVYnI_7w&t=14s Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infose...

CCSP Domain 5: Cloud Security Operations | InfosecTrain

16 Jun 2022

Contributed by Lukas

Watch now: https://www.youtube.com/watch?v=sG39e7abD9Y&t=15s Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infose...

CCSP Domain 4 : Cloud Application Security | Identity and Access Management | InfosecTrain

10 Jun 2022

Contributed by Lukas

In this constantly evolving and extremely competing world of cloud, one faces unique security challenges almost every day with regards to unaccustomed...

CCSP Domain 3: Cloud Platform & Infrastructure Security | InfosecTrain

10 Jun 2022

Contributed by Lukas

In this constantly evolving and extremely competing world of cloud, one faces unique security challenges almost every day with regards to unaccustomed...

CCSP Domain 2 : Cloud Data Security | Data Security Life Cycle | InfosecTrain

10 Jun 2022

Contributed by Lukas

In this constantly evolving and extremely competing world of cloud, one faces unique security challenges almost every day with regards to unaccustomed...

CCSP Domain 1 : Cloud Concepts, Architecture, and Design | InfosecTrain

10 Jun 2022

Contributed by Lukas

In this constantly evolving and extremely competing world of cloud, one faces unique security challenges almost every day with regards to unaccustomed...

Introduction to CCSP | About CCSP Training | What is CCSP certification? | InfosecTrain

10 Jun 2022

Contributed by Lukas

In this constantly evolving and extremely competing world of cloud, one faces unique security challenges almost every day with regards to unaccustomed...

CRISC Practice Q&A | CRISC Exam Interview Question Preparation | InfosecTrain

10 Jun 2022

Contributed by Lukas

✅Agenda of the Session ✔️CRISC Exam Practice Q&A Facebook: https://www.facebook.com/Infosectrain/ Twitter: https://twitter.com/Infosec_Trai...

Infosectrain Review - CISSP | Success Stories | Siddesh CISSP Gladiator

10 Jun 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Siddesh) has to say...

Day 2 : Become Expert in Cloud Security Practitioner | What is Security as a Service | InfosecTrain

09 Jun 2022

Contributed by Lukas

✅Agenda of the Session ✔️Security Operation Cloud ✔️What is Security as a Service ✔️How Logging Works in Cloud ✔️Incident Response ✔...

Day 1 : Become Expert in Cloud Security Practitioner | Introduction to Cloud | InfosecTrain

09 Jun 2022

Contributed by Lukas

✅Agenda of the Session ✔️Introduction to Cloud ✔️What is Cloud? ✔️Types of Cloud? ✔️Types of Service? ✔️Demo of Cloud Resources ...

What are Threat Intelligence & Threat Hunting? | InfosecTrain

07 Jun 2022

Contributed by Lukas

✅Agenda of the Session ✔️Threat Intelligence ✔️Types of Threat Intelligence  ✔️Threat Hunting

Kusto Query Language (KQL) | Scalar Operation and Function | Day 2- KQL

06 Jun 2022

Contributed by Lukas

✅Agenda of the Session ✔️Analyzing Query Result using KQL ✔️Summarize data use function dcount, arg-max, makeset and more. ✔️Render visu...

Kusto Query Language (KQL) | What is KQL? | Use of KQL? | Day 1- KQL

06 Jun 2022

Contributed by Lukas

✅Agenda of the Session ✔️What is KQL? ✔️Use of KQL? ✔️Most Used Operator of the KQL? ✔️Learn Operator Like Where Search, Extend,Proj...

RedTeam : Attacks in Active Directory | Day 4: RedTeam | InfosecTrain

31 May 2022

Contributed by Lukas

✅Agenda of the Session ✔️Understanding The tools Used in exploiting AD ✔️Discussing the working of Attacks in Active Directory ✔️Attacki...

RedTeam : What is Active Directory | Terminologies in Active Directory | Day 3: RedTeam

31 May 2022

Contributed by Lukas

✅Agenda of the Session ✔️Understanding Active Directory ✔️Useful Terminologies in Active Directory ✔️Understanding of Components of Acti...

RedTeam : What is Metasploit Framework | Day 2: RedTeam | InfosecTrain

31 May 2022

Contributed by Lukas

✅Agenda of the Session ✔️Looking Into Metasploit Framework ✔️Challenge solving ✔️Using Metasploit Framework For exploiting

RedTeam : What is Red Team Kill Chain | Day 1: RedTeam | InfosecTrain

31 May 2022

Contributed by Lukas

✅Agenda of the Session ✔️Red Team Kill Chain  - Initial Access & Delivery  - Weaponization  - Command & Control  - C...

Day 2: Data Science Project using Python | Machine Learning | InfosecTrain

29 May 2022

Contributed by Lukas

✅Agenda of the Session ✅Data Science Project ✔️Data Collection ✔️Data Cleaning ✔️Data Visualization ✔️Data Transformation ✔️Tr...

Day 1: Data Science Project using Python | What is Data Science? | InfosecTrain

29 May 2022

Contributed by Lukas

✅Agenda of the Session ✅What You’ll Learn ✔️Data Science ✔️Machine Learning ✔️Machine Learning Models ✔️Python ✔️Pandas ✔️...

What is Cloud Security Practitioner? | Cloud Security Practitioner | InfosecTrain

29 May 2022

Contributed by Lukas

Course Content Module1: Cloud Basics and Models Module2: Deploy and Understand Compute and Configuration Module3: Deploy and Monitor Network Resources...

CyberArk Basic to Advanced | What is CyberArk? | InfosecTrain

25 May 2022

Contributed by Lukas

✅Agenda of the Session ✔️Introduction of  CyberArk ✔️What is PAM? ✔️CyberArk Basics ✔️Introduction to Infosectrain CyberArk cou...

Day 2: Purview of Cyber Security | Evolution Of Attacks | InfosecTrain

24 May 2022

Contributed by Lukas

✅Agenda of the Session ✔️Red Team & Pen Testing ✔️Evolution Of Attacks ✔️Types of Threat Actors ✔️Denial of Service Attacks ✔️...

Day 1: Purview of Cyber Security | What is information security | InfosecTrain

24 May 2022

Contributed by Lukas

✅Agenda of the Session ✔️Introduction to Information Security ✔️Understanding of CIA Triad

CCSP Exam Preparation | CCSP Questions Practice | InfosecTrain

23 May 2022

Contributed by Lukas

✅Agenda of the Session ✔️CCSP Introduction ✔️CCSP Exam Informtion & Changes ✔️CCSP Exam Preparation Plan ✔️CCSP Questions Practi...

Day 2: SOC -The Central Nervous System of Security | What is SIEM | InfosecTrain

20 May 2022

Contributed by Lukas

✅Agenda of the Session ✔️SIEM – Heart of SOC ✔️SIEM Architecture ✔️Tour of SIEM ✔️ELK Stack Primer ✔️ QRadar – Architecture ...

Day 1: SOC -The Central Nervous System of Security | What is SOC | InfosecTrain

20 May 2022

Contributed by Lukas

✅Agenda of the Session ✔️SOC – Security Operation Center ✔️Challenges of Traditional (or no) SOC ✔️SOC Models ✔️SOC Services ✔️...

Infosectrain Review - CISSP | Success Stories | Balakrishnan CISSP Gladiator

13 May 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Balakrishnan) has t...

Infosectrain Review - CISSP | Success Stories | Santosh Patnaik CISSP Gladiator

13 May 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Santosh Patnaik) ha...

Infosectrain Review - CISSP | Success Stories | Anil Gangwani CISSP Gladiator

13 May 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Anil Gangwani ) has...

Infosectrain Review - CISSP | Success Stories | Akhil Verma(Paytm Money) CISSP Gladiator

13 May 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Akhil Verma (Paytm ...

Infosectrain Review - CISM | Success Stories | Zeshan Ahmad CISM Gladiator

13 May 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Zeshan Ahmad ) has ...

Infosectrain Review - CISM | Success Stories | JAIKISHAN SAH CISM Gladiator

13 May 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (JAIKISHAN SAH ) has...

Infosectrain Review - CISM | Success Stories | Harshit Mathur CISM Gladiator

13 May 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Harshit Mathur ) ha...

Infosectrain Review - CEH | Success Stories | Pranay Paliwal CEH Gladiator

13 May 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Pranay Paliwal) has...

What is DoS & DDoS Attack? | Difference between DoS & DDoS | InfosecTrain

13 May 2022

Contributed by Lukas

A denial-of-service (DoS) attack overloads a server, rendering a website or resource unusable. DDoS attacks employ several computers or devices to ove...

What is Authentication and Authorization? | InfosecTrain

13 May 2022

Contributed by Lukas

Authentication and Authorization are two commonly used words in the field of information security. They may have a similar sound, but they are not the...

What is a Firewall? | Types of Firewall? | InfosecTrain

13 May 2022

Contributed by Lukas

A firewall is a hardware or software device that may be configured to block data from specified sites, applications, or ports while allowing important...

Infosectrain Review - CCSK | Success Stories | Sathyapriya G CCSK Gladiator

13 May 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Sathyapriya G) has ...

Infosectrain Review - CISM | Success Stories | Anand CISM Gladiator

06 May 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Anand) has to say a...

Infosectrain Review - CISSP | Success Stories | Cornelius Okudzeto CISSP Gladiator

06 May 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Cornelius Okudzeto)...

Infosectrain Review - CISSP | Success Stories | SAINATH CISSP Gladiator

06 May 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (SAINATH) has to say...

Infosectrain Review - CISSP | Success Stories | Shriya CISSP Gladiator

06 May 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Shriya) has to say ...

Infosectrain Review - CISSP | Success Stories | Vivek Dwivedi CISSP Gladiator

06 May 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Vivek Dwivedi) has ...

Infosectrain Review - ISO 27001 | Success Stories | Dheeraj Simha ISO Gladiator

06 May 2022

Contributed by Lukas

InfosecTrain is a globally recognized leading training provider for many certification courses. Take a look at what Our Gladiator (Dheera Simhaj) has ...

CCSK Exam Prep | CCSK Certification path | InfosecTrain

06 May 2022

Contributed by Lukas

✅Agenda of the Session ✔️Brief On Certificate of Cloud Security Knowledge ✔️CCSK Domains ✔️Other Documents Required For Passing ✔️CC...

Threat Hunting & Threat Intelligence | InfosecTrain

06 May 2022

Contributed by Lukas

✅Agenda of the Session ✔️Adversaries: Pain For Enterprise ✔️Threat Hunting & Threat Intelligence ✔️Leveraging the Detection With Int...

OSINT for Infosec Professionals | What is OSINT? | InfosecTrain

06 May 2022

Contributed by Lukas

✅Agenda of the Session ✔️What is OSINT? ✔️Why OSINT for Security Professionals? ✔️How to Get Started? 

What's New in AWS Certified Solutions Architect -Associate (SAA-C03) | InfosecTrain

06 May 2022

Contributed by Lukas

✅Agenda of the Session ✔️AWS Certification ✔️Skills Facebook Twitter LinkedIn Instagram Telegram

MITRE For Red Teaming | What is Red Team? | MITRE Attacks Framework | InfosecTrain

15 Apr 2022

Contributed by Lukas

✅Agenda of the Session ✔️What is Red Team? ✔️Red Team kill Chain ✔️MITRE Attacks Framework ✔️Planing with MITRE Attacks ✔️Framew...

CISM Domain 1 – Information Security Governance | CISM Preperation | InfosecTrain

12 Apr 2022

Contributed by Lukas

✅Agenda of the Session ✔️Information Security ✔️Information Risk Management ✔️Information Security Program ✔️Information Security In...

Whats New in CISM 2022 | CISM 2022 New Syllabus | InfosecTrain

12 Apr 2022

Contributed by Lukas

✅Agenda of the Session ✔️Understanding CISM Structure ✔️Old Syllabus CISM Vs New Syllabus CISM ✔️CISM 2022 New Syllabus

Data Privacy Europe and GDPR Certification Prep | CIPP/E Introduction | InfosecTrain

10 Apr 2022

Contributed by Lukas

✅Agenda of the Session ✔️What is Data Privacy and its Need? ✔️Certification for data Privacy? ✔️CIPP/E Introduction Coverage ✔️How t...

Data Science Career Guide - Interview Preparation | Interview Questions | InfosecTrain

06 Apr 2022

Contributed by Lukas

✅Agenda of the Session ✔️ Data Science Resume Building ✔️ Data Science Portfolio Building ✔️ Data Science Questions ✔️ How to Prepar...

DAY 2: CEH v11 with Question Practice | CEH Practice questions | InfosecTrain

05 Apr 2022

Contributed by Lukas

✅Agenda of the Session ✔️ Top 5 domains one can enter after CEH ✔️ Your career after CEH ✔️ CEH Practice questions ✔️ CEH Doubt Sess...

DAY 1: CEH v11 with Question Practice | Introduction to CEH v11 | InfosecTrain

05 Apr 2022

Contributed by Lukas

✅Agenda of the Session ✔️Introduction to CEH ✔️CEH Exam details discussion ✔️Why demand of CEH is increasing? ✔️CEH Solving a challe...

GRC Bootcamp | Governance Risk Management Compliance | InfosecTrain

04 Apr 2022

Contributed by Lukas

✅Agenda of the Session ✔️What is GRC? ✔️Types of IT Controls ✔️Risk Assessment ✔️What is Information Security Risk? ✔️Moniter &a...

Prepare for CCSP certification Exam | What is CCSP? | CCSP Domains | InfosecTrain

04 Apr 2022

Contributed by Lukas

✅Agenda of the Session ✔️What is CCSP? ✔️CCSP Domains ✔️Domain -1 Architecture Concepts ✔️Domain -2 Cloud Data Security ✔️Domain...

Day 2 : Basics of Cloud Computing By Yash | Microservices | Azure Services | InfosecTrain

01 Apr 2022

Contributed by Lukas

✅Agenda of the Session ✔️Virtual Machines Vs Containers ✔️Docker ✔️Microservices ✔️Container Orchestration ✔️Kubernetes ✔️Az...

«« ← Prev Page 15 of 16 Next → »»