Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

InfosecTrain

Education

Episodes

Showing 201-300 of 1534
«« ← Prev Page 3 of 16 Next → »»

CRISC Domain 2 Explained: Master IT Risk Assessment & Mitigation

18 Jul 2025

Contributed by Lukas

In today’s digital-first world, understanding IT risk is essential for building secure and compliant organizations. This episode dives deep into Dom...

RSA Archer Demo & Career Guide: Master GRC Tools for the Future

17 Jul 2025

Contributed by Lukas

Get hands-on with RSA Archer, one of the most powerful platforms in Governance, Risk, and Compliance (GRC). In this session, we walk you through a pra...

CIPM in Action: How to Build & Manage a Strong Privacy Program

16 Jul 2025

Contributed by Lukas

In today’s privacy-first world, organizations must build structured and scalable privacy programs to stay compliant and earn trust. This session div...

Logical Access Control Audits: Step-by-Step for Security & Compliance

15 Jul 2025

Contributed by Lukas

Controlling who can access what — and when — is at the core of enterprise cybersecurity. In this session, we guide you through a step-by-step audi...

AI Governance Explained: Balancing Innovation with Compliance

14 Jul 2025

Contributed by Lukas

As Artificial Intelligence reshapes industries, organizations face a growing need to balance innovation with regulatory compliance. In this session, w...

Web Security Essentials: Stop SQL Injections & Modern Web Attacks

13 Jul 2025

Contributed by Lukas

In today’s digital world, securing your websites and web applications is more critical than ever. In this session, we break down the foundations of ...

ISO 42001 Lead Auditor: AI Governance, Risk & Compliance Essentials

12 Jul 2025

Contributed by Lukas

As artificial intelligence becomes more integrated into business operations, AI governance and risk management are no longer optional—they’re esse...

SOC Masterclass: Tools, Roles & Real-Time Threat Response Strategies

11 Jul 2025

Contributed by Lukas

In this expert-led session, we take you inside the world of the Security Operations Center (SOC) — the command center of modern cybersecurity. Learn...

CISSP Domain 6: Security Assessment & Testing Strategies Explained

10 Jul 2025

Contributed by Lukas

In this session, we explore Domain 6 of the CISSP certification — Security Assessment & Testing — one of the most critical areas for identifyi...

CompTIA Security+ Guide: Skills, Exam Tips & Cybersecurity Career Paths

09 Jul 2025

Contributed by Lukas

In this session, we walk you through the essentials of the CompTIA Security+ certification, a globally recognized entry point into the cybersecurity f...

CGRC Domain 2: Mastering System Scope, Boundaries & Risk Assessment

08 Jul 2025

Contributed by Lukas

In this session, we take a focused dive into Domain 2 of the CGRC (Certified in Governance, Risk, and Compliance) certification, centered on system sc...

AI in Cybersecurity: Next-Gen Tools for Smarter, Faster Threat Defense

07 Jul 2025

Contributed by Lukas

In this session, we explore how Artificial Intelligence is revolutionizing cybersecurity, making digital defenses more intelligent, automated, and pro...

Proactive Threat Hunting: Techniques to Detect & Stop Attacks Early

06 Jul 2025

Contributed by Lukas

In this session, we break down the core principles of proactive threat hunting — a critical skill for identifying and stopping cyber threats before ...

CISA Domain 2 Explained: IT Governance & Management Deep Dive

05 Jul 2025

Contributed by Lukas

In this session, we take a deep dive into Domain 2 of the CISA certification — focusing on IT governance and management. You’ll learn how to align...

IAPP AIGP Certification: Essentials for AI Governance & Career Growth

04 Jul 2025

Contributed by Lukas

In this session, we explore the IAPP AI Governance Professional (AIGP) certification and its growing relevance in today’s AI-driven world. As artifi...

How to Become a DPO in 2025: Skills, Certs & Career Path

03 Jul 2025

Contributed by Lukas

In this session, we walk you through the complete roadmap to becoming a Data Protection Officer (DPO) in 2025. As data privacy grows in complexity and...

RSA Archer Blueprint: Step-by-Step Guide to GRC Mastery

02 Jul 2025

Contributed by Lukas

In this masterclass, we deliver a complete, step-by-step walkthrough of RSA Archer, the leading Governance, Risk, and Compliance (GRC) platform. From ...

AI & Governance: Why Responsible Oversight Matters for the Future

01 Jul 2025

Contributed by Lukas

In this free masterclass, we explore the future of artificial intelligence and why governance is essential to ensure its ethical, transparent, and sus...

CISM Exam Prep: Proven Strategies & Practice Question Walkthroughs

30 Jun 2025

Contributed by Lukas

In this focused session, we share actionable strategies to help you ace the CISM exam — from structuring your study plan to mastering complex, scena...

CISA Exam Strategy: Study Plan, Domains & Practice Question Tips

29 Jun 2025

Contributed by Lukas

In this expert-led session, you'll get a complete roadmap to mastering the CISA exam with confidence. A seasoned CISA professional walks you throu...

ISO 27001 LA vs LI: Roles, Skills & Career Path Comparison

28 Jun 2025

Contributed by Lukas

In this session, we explore the key differences between two critical ISO 27001 roles: the Lead Auditor (LA) and the Lead Implementer (LI). If you're u...

Network Scanning & NMAP: Master the Fundamentals of Reconnaissance

27 Jun 2025

Contributed by Lukas

In this session, we break down essential concepts in offensive security that every ethical hacker must know. You’ll learn how TCP communication flag...

Red Teaming Explained: Benefits, Roles & Attack Lifecycle

26 Jun 2025

Contributed by Lukas

Red teaming is a proactive cybersecurity strategy that simulates real-world attacks to evaluate how well an organization can detect, respond to, and r...

Offensive Security Explained: Ethical Hacking, Pen Testing & Hacker Roles

25 Jun 2025

Contributed by Lukas

Offensive security takes a proactive stance in cybersecurity—identifying and exploiting vulnerabilities before real attackers do. In this session, w...

CIPT Certification Explained: Privacy in Tech for IT Professionals

24 Jun 2025

Contributed by Lukas

The Certified Information Privacy Technologist (CIPT) certification is a globally respected credential for IT professionals, engineers, and security p...

DevSecOps in 2025: Top Trends & Predictions You Need to Know

23 Jun 2025

Contributed by Lukas

DevSecOps is transforming how organizations build, secure, and deploy software. In this session, we explore the emerging trends and forward-looking pr...

India’s Draft DPDPA Rules Explained: Key Impacts & Expert Insights

22 Jun 2025

Contributed by Lukas

India’s Digital Personal Data Protection Act (DPDPA) is poised to reshape how organizations handle personal data. In this open mic session, privacy ...

Cryptography for Beginners: How Secure Is Your Data?

21 Jun 2025

Contributed by Lukas

Cryptography is the foundation of secure communication in the digital era. In this beginner-friendly session, we break down the core concepts of crypt...

Azure AZ-104 & AZ-500: Your Dual-Certification Roadmap to Success

20 Jun 2025

Contributed by Lukas

Becoming proficient in Microsoft Azure is a game-changer for IT professionals looking to advance in cloud computing. This session is your complete gui...

Your Path to CISM Certification | Proven Strategies for Success

19 Jun 2025

Contributed by Lukas

Ready to advance your career in information security management? In this episode of the InfosecTrain podcast, we guide you through the complete path t...

Gen Z & Digital Wellness | Are We Raising a Secure Generation?

11 Jun 2025

Contributed by Lukas

Gen Z was born into tech—but are they truly prepared to protect themselves in the digital world? Let’s find out.Gen Z is the first truly digital-n...

Introducing the World’s First AI Assurance Certifications by ISACA!

22 May 2025

Contributed by Lukas

𝐀 𝐍𝐞𝐰 𝐄𝐫𝐚 𝐢𝐧 𝐀𝐈 𝐀𝐬𝐬𝐮𝐫𝐚𝐧𝐜𝐞 𝐁𝐞𝐠𝐢𝐧𝐬!🔥We’re proud to introduce the worl...

Military to Cybersecurity What I Wish I Knew

21 May 2025

Contributed by Lukas

🎧 In this Cybertalk Podcast episode, we dive deep into the journey of transitioning from a military career to cybersecurity — and what we wish we...

How IAM Protects Your Digital Identity | The Future of Cybersecurity

07 May 2025

Contributed by Lukas

In an era where data breaches and identity theft are rising, Identity and Access Management (IAM) has become a cornerstone of modern cybersecurity. In...

How to Begin Your Penetration Testing Career | Skills, Certs & Advice

29 Apr 2025

Contributed by Lukas

Dreaming of becoming a penetration tester? Here’s how to turn that dream into a job!Want to become a Penetration Tester but not sure where to start?...

Governance, Risk, and Compliance (GRC) Interview Questions

24 Apr 2025

Contributed by Lukas

Organizations today understand the crucial need for Governance, Risk, and Compliance (GRC) functions to guarantee operational effectiveness, regulator...

Cybercrime Uncovered: The Dark Truth & How to Stay Safe | CyberTalks by InfosecTrain

22 Apr 2025

Contributed by Lukas

Join us for a riveting conversation between Major Sadhna Singh (Retd.)—NITI Aayog Consultant and former Indian Army Officer — and Anas Hamid, reco...

Data Privacy Officer Interview Questions & Concepts

17 Apr 2025

Contributed by Lukas

InfosecTrain's "Data Privacy Officer Interview Questions" provides a comprehensive overview of the data privacy landscape and the criti...

Understanding CGRC & RMF: A Must-Know for Cybersecurity Leaders

07 Apr 2025

Contributed by Lukas

In today’s rapidly evolving cybersecurity landscape, organizations need a robust Governance, Risk, and Compliance (GRC) framework to stay ahead of s...

Inside the SOC: Expert Insights from the Frontlines

07 Apr 2025

Contributed by Lukas

Get ready for an insightful SOC podcast where cybersecurity experts dive deep into the real-world challenges and operations of a Security Operations C...

Data Privacy & AI: DPDPA Insights with Sarika Malhotra

30 Mar 2025

Contributed by Lukas

In this episode of CyberTalks with InfosecTrain , host Anas is joined by Sarika Malhotra, a data privacy expert, to explore the intersection of Data P...

CyberTalks with InfosecTrain: Architecting Security through DevSecOps

29 Mar 2025

Contributed by Lukas

Here is cybersecurity luminary Vandana Verma at CyberTalks with InfosecTrain on the topic 𝐀𝐫𝐜𝐡𝐢𝐭𝐞𝐜𝐭𝐢𝐧𝐠 𝐒𝐞𝐜...

How to Become a Cloud Security Engineer: Step-by-Step Guide

29 Mar 2025

Contributed by Lukas

Cloud security is one of the fastest-growing fields in cybersecurity, and becoming a Cloud Security Engineer is a highly rewarding career path. In thi...

Advanced Cloud Governance: Strategies for a Secure Cloud Future

29 Mar 2025

Contributed by Lukas

Cloud governance is a critical component in securing cloud environments and ensuring compliance with industry regulations. As cloud adoption accelerat...

Mastering Cloud Security for Enterprises: A Pro Guide

28 Mar 2025

Contributed by Lukas

Cloud security is a critical priority for enterprises as businesses increasingly move to cloud environments. In this expert-led session, we cover key ...

CyberTalks with InfosecTrain :Insider Secrets to Become a CISO

27 Mar 2025

Contributed by Lukas

Do you dream of becoming a Chief Information Security Officer (CISO)? In this episode of CyberTalks with InfosecTrain, we reveal the insider secrets t...

CyberTalks Ep. 2 : Unlock Game-Changing Cybersecurity Career Insights!

27 Mar 2025

Contributed by Lukas

Welcome back to CyberTalks, where we bring you expert insights into the ever-evolving cybersecurity industry! In this episode, we dive deeper into car...

CyberTalks Ep. 1: Unlock Game-Changing Cybersecurity Career Insights!

26 Mar 2025

Contributed by Lukas

Welcome to the first episode of CyberTalks, your go-to podcast for expert insights into the dynamic world of cybersecurity! In this episode, we uncove...

Understanding India's Draft DPDPA Rules | Expert Insights

26 Mar 2025

Contributed by Lukas

India’s Digital Personal Data Protection Act (DPDPA) is set to reshape data privacy and compliance for businesses and individuals alike. In this epi...

Discover the Hidden Value of CCAK Certification with Cloud Experts

25 Mar 2025

Contributed by Lukas

In the evolving world of cloud security, having the right knowledge and certification is essential. The CCAK (Certificate of Cloud Auditing Knowledge)...

CISO’s Role in Modern Cybersecurity: Protecting the Digital Frontier

25 Mar 2025

Contributed by Lukas

In today’s evolving threat landscape, the Chief Information Security Officer (CISO) plays a critical role in safeguarding an organization’s digita...

Cultivating a Culture of Cybersecurity: with InfosecTrain CEO Deepti Kalra

24 Mar 2025

Contributed by Lukas

Cybersecurity isn’t just about technology—it’s about people, processes, and culture. In this special episode of the InfosecTrain podcast, Deepti...

Understanding the Cloud Shared Responsibility Model with Krish & Prabh

24 Mar 2025

Contributed by Lukas

Cloud adoption is growing rapidly, but so are the cyber threats that come with it! In this insightful episode of the InfosecTrain podcast, Prabh &...

Common Threats in the Cloud: Expert Insights by Prabh & Krish

23 Mar 2025

Contributed by Lukas

Cloud adoption is growing rapidly, but so are the cyber threats that come with it! In this insightful episode of the InfosecTrain podcast, Prabh &...

What is Cloud Governance? Exclusive Talk with Prabh & Krish

23 Mar 2025

Contributed by Lukas

In this exclusive episode of the InfosecTrain podcast, Prabh & Krish dive deep into the critical role of Cloud Governance in modern IT environment...

CISSP 2024 Insights: Bridging the Gap Between 2021 and 2024

22 Mar 2025

Contributed by Lukas

The CISSP (Certified Information Systems Security Professional) certification continues to evolve with the ever-changing cybersecurity landscape. In t...

How to Get Started With AWS Cloud? | AWS Account Creation | What is Amazon EC2?

22 Mar 2025

Contributed by Lukas

Want to start your journey in AWS Cloud but not sure where to begin? In this episode of the InfosecTrain podcast, we provide a step-by-step guide to g...

An Overview of AWS Cloud Storage Services | Benefits of AWS Cloud Storage

21 Mar 2025

Contributed by Lukas

In this episode of the InfosecTrain podcast, we explore AWS Cloud Storage Services, their key features, and how businesses can leverage them for scala...

Why IAPP CIPP/E Training & Certification with Infosectrain?

21 Mar 2025

Contributed by Lukas

Are you looking to build a career in data privacy and protection? The IAPP CIPP/E (Certified Information Privacy Professional/Europe) certification is...

Future of Cybersecurity in 2025 | Cybersecurity Trends for 2025 | Cybersecurity Scope in 2025

20 Mar 2025

Contributed by Lukas

What does the future of cybersecurity look like in 2025? In this episode of the InfosecTrain podcast, our experts explore the latest cybersecurity tre...

How to Start a Career in Cyber Security? | Start a Cybersecurity Career in 2024

20 Mar 2025

Contributed by Lukas

Looking to kickstart your career in cybersecurity but not sure where to begin? In this episode of the InfosecTrain podcast, our experts walk you throu...

How to Make a Career in Red Team & Pentesting | Career in Cybersecurity : Red Teaming / Pentesting

19 Mar 2025

Contributed by Lukas

Are you passionate about ethical hacking and cybersecurity? Want to break into the exciting world of Red Teaming and Penetration Testing? In this epis...

What is Security Risk Assessment and How Does It Work? | Types of Risk Assessment

19 Mar 2025

Contributed by Lukas

In this episode of the InfosecTrain podcast, we break down Security Risk Assessment—a critical process for identifying, analyzing, and mitigating cy...

What is Enterprise Security Architecture? | How Dose cybersecurity Architecture work in Enterprises

18 Mar 2025

Contributed by Lukas

In this episode of the InfosecTrain podcast, we delve into the concept of Enterprise Security Architecture (ESA) and explore how cybersecurity archite...

What is OT Security? | Why OT security is important? | What are OT Cyber Security Challenges

13 Mar 2025

Contributed by Lukas

OT security is commonly used to protect Industrial Systems and networks from attacks. Operational technology security is used to protect and control c...

Building Privacy Management System in Organization | What is Privacy Management?

12 Mar 2025

Contributed by Lukas

Privacy management tools help organizations conduct privacy impact assessments, check processing activities against requirements from privacy regulati...

Understanding Packets and Protocols | Wireshark Guide to Network Analysis

03 Jan 2025

Contributed by Lukas

In this Episode, we focus on understanding packets and protocols, key components of network communication, and their crucial role in network analysis ...

Introduction and Understanding of Wireshark | Comprehensive Wireshark Guide

03 Jan 2025

Contributed by Lukas

We introduce and explain Wireshark, one of the most powerful tools for network analysis and packet sniffing. Wireshark is widely used by network profe...

Effective CISM Exam Strategies for Success | Think Like a Manager

02 Jan 2025

Contributed by Lukas

In this Episode, we explore how adopting a managerial mindset can significantly enhance your CISM exam strategies. The CISM exam is not just a test of...

Types of Password Attacks Password

31 Dec 2024

Contributed by Lukas

Password cracking is the process of figuring out passwords from data passing through or stored on a computer. It can be done to help someone regain a ...

CEH Module 7: Malware Threats

30 Dec 2024

Contributed by Lukas

Module 7 of CEH: Malware Threats explains the basics of different types of harmful software (malware) and how they can negatively affect computers and...

Top Sample Questions for CISM Exam Preparation

29 Dec 2024

Contributed by Lukas

In this Episode, we present sample questions for the CISM Exam to help you prepare more effectively. Understanding and practicing with sample question...

Essential Guidelines for CISM Exam | Follow These Guidelines to Crack the CISM Exam

28 Dec 2024

Contributed by Lukas

In this Episode, we provide essential guidelines for the CISM Exam, ensuring that you are fully prepared to crack the CISM Exam Strategies. The Episod...

Top CISM Exam Preparation Tips | Crack the CISM Certification Expert Strategies

28 Dec 2024

Contributed by Lukas

We explore essential strategies and tips for CISM Exam Preparation, helping you crack the CISM Certification Exam with ease. InfosecTrain’s expert t...

Discover the Hidden Value of CCAK Certification with Cloud Experts

27 Dec 2024

Contributed by Lukas

This session will provide valuable insights into the Certificate of Cloud Auditing Knowledge (CCAK), a must-have for professionals looking to enhance ...

Crack the CISM Certification: Expert Insights

27 Dec 2024

Contributed by Lukas

In this Episode, we delve into proven techniques to help you prepare effectively and succeed in your CISM exam journey. Our expert trainers from Infos...

Why to Learn Splunk? | SOC Analyst Roles and Responsibilities

26 Dec 2024

Contributed by Lukas

Discover why learning Splunk is essential for every aspiring SOC Analyst! 🚀 Understand the critical roles and responsibilities of SOC Analysts and ...

CISO’s Role in Modern Cybersecurity: Protecting the Digital Frontier

26 Dec 2024

Contributed by Lukas

Cyber threats are growing more sophisticated every day, making the 𝐂𝐡𝐢𝐞𝐟 𝐈𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐒𝐞𝐜𝐮𝐫...

How does Splunk store all that data? | Splunk Hot and Cold Storage

26 Dec 2024

Contributed by Lukas

Learn about Splunk's hot and cold storage concepts, their roles in data retention, and how they impact performance. Whether you're a Splunk newbie or ...

CEH Module 6- System Hacking

24 Dec 2024

Contributed by Lukas

Ethical hacking is vital in the current state of cybersecurity. It acts as a shield, proactively identifying and mitigating vulnerabilities before mal...

Why Choose GCP Combo Training with InfosecTrain

23 Dec 2024

Contributed by Lukas

This GCP Combo Training equips individuals with the knowledge to design robust cloud architectures and implement cutting-edge security measures, makin...

Top 5 Highest Paying Cybersecurity Jobs 2025

23 Dec 2024

Contributed by Lukas

Discover the "MOST In-Demand Cybersecurity Jobs in 2025" and the skills you need to land them! Learn about the future of cybersecurity careers and how...

What Operations Carried out in Splunk?

23 Dec 2024

Contributed by Lukas

Explore the key operations performed in Splunk, from data ingestion to advanced analytics and visualization. Learn how Splunk empowers organizations w...

Splunk EXPERT Reveals Proven Strategies | Why to Learn Splunk?

22 Dec 2024

Contributed by Lukas

Unlock the secrets to mastering Splunk with our expert guide! Discover why learning Splunk is essential for your career in cybersecurity and data anal...

How to Prepare for the CISSP Exam: Expert Tips & Practice Questions

21 Dec 2024

Contributed by Lukas

Are you curious about the 𝐂𝐈𝐒𝐒𝐏 𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧 and how it can elevate your 𝐜𝐚𝐫𝐞𝐞𝐫...

What Is Splunk? | Splunk Tutorial For Beginners | Splunk Careers

21 Dec 2024

Contributed by Lukas

Discover the power of Splunk, the ultimate platform for monitoring, searching, and analyzing machine-generated data. Learn what Splunk is, its key fea...

CISSP Exam Overview: Structure, Domains, and Key Tips

21 Dec 2024

Contributed by Lukas

Discover everything you need to know about the 𝐂𝐈𝐒𝐒𝐏 𝐄𝐱𝐚𝐦 𝐒𝐭𝐫𝐮𝐜𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐃𝐨𝐦𝐚...

Identity and Access Management (IAM) in Cloud Security

20 Dec 2024

Contributed by Lukas

As more businesses embrace cloud computing, concerns surrounding data security and unauthorized access have escalated. While cloud technology provides...

CISSP Certification Explained: Benefits & Career Boost

20 Dec 2024

Contributed by Lukas

Discover why the 𝐂𝐈𝐒𝐒𝐏 𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧 is the gold standard for cybersecurity professionals worldw...

Difference Between Azure Bastion and jumpbox?

19 Dec 2024

Contributed by Lukas

In this Episode, we break down the unique roles, features, and use cases of Azure Bastion and Jumpbox to help you understand which solution is best su...

How to Create an Azure Virtual Network?

19 Dec 2024

Contributed by Lukas

Unlock the secrets to mastering networking by learning how to create an Azure Virtual Network. In this Episode, we take you through a comprehensive, s...

Top Network Protocol Analyzer Tools

17 Dec 2024

Contributed by Lukas

In today’s fast-paced and interlinked landscape, networks serve as the backbone of our modern society, facilitating seamless communication, data sha...

Top Azure Security Expert Shares Best Practices for 2025

16 Dec 2024

Contributed by Lukas

Are you prepared to confront the cybersecurity trials that 2025 will undoubtedly bring? In this compelling Episode, an elite Azure security speciali...

Top Security Practices for VMs & Containers

16 Dec 2024

Contributed by Lukas

Discover best practices for securing your compute instances and containers. This Episode covers everything from using hardened VM images to ensuring y...

IAM Explained: Simplify User Access & Protect Your Data

14 Dec 2024

Contributed by Lukas

In this Episode we will explore the essentials of Identity and Access Management (IAM) and its role in securing your systems. Learn how to streamline ...

The Future of Cloud Security: Key Challenges to Watch in 2024

14 Dec 2024

Contributed by Lukas

We will explore the top security challenges in the cloud, including misconfigurations, inadequate change control, and the risks of insecure third-part...

Traditional Security v/s Cloud Security: What It Means for Our Future

13 Dec 2024

Contributed by Lukas

We will be exploring the key differences between Traditional Security and Cloud Security, highlighting the shift from on-premises infrastructure to cl...

PCI-DSS vs. GDPR

13 Dec 2024

Contributed by Lukas

PCI-DSS and GDPR address data security and privacy, although their respective scopes, objectives, and legal requirements are distinct. PCI-DSS is focu...

Future of DevSecOps: 10 Game-Changing Trends for 2025

13 Dec 2024

Contributed by Lukas

Are you ready to unlock the next big advancements in DevSecOps? In this Episode, we delve into the 10 key trends and predictions shaping the future of...

What is DevSecOps? Overview and Key Insights

12 Dec 2024

Contributed by Lukas

Discover "What is DevSecOps?" in this insightful episode that dives deep into the world of secure software development. Learn how integrating Developm...

«« ← Prev Page 3 of 16 Next → »»