Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

InfosecTrain

Education

Episodes

Showing 801-900 of 1534
«« ← Prev Page 9 of 16 Next → »»

Mastering Offensive Security Day 3 Web Application Security

20 Oct 2023

Contributed by Lukas

Welcome to Day 3 of the "Mastering Offensive Security" series by InfosecTrain! In this exciting installment, we delve into the critical doma...

Advantages and Disadvantages of Firewalls

19 Oct 2023

Contributed by Lukas

These days, most of our work and daily tasks, from schooling to shopping, are conducted online. The internet has made it possible to accomplish tasks ...

Mastering Offensive Security Day 1 : Introduction to Offensive Security

19 Oct 2023

Contributed by Lukas

Welcome to Day 1 of the "Mastering Offensive Security" series by InfosecTrain! In this comprehensive course, we embark on a journey into the...

Top AWS Interview Questions and Answers | AWS Cloud Interview Questions [Part 2]

19 Oct 2023

Contributed by Lukas

Are you preparing for an AWS (Amazon Web Services) job interview and looking to ace it? Look no further! In this informative Podcast, Amit Panday, an ...

How Nmap Works?

18 Oct 2023

Contributed by Lukas

What is Nmap? Nmap (Network Mapper) is a powerful and widely used open-source network scanning tool used for network exploration, security auditing, a...

Top AWS Interview Questions and Answers | AWS Cloud Interview Questions [Part 1]

17 Oct 2023

Contributed by Lukas

Are you preparing for an AWS (Amazon Web Services) job interview and looking to ace it? Look no further! In this informative Podcast, Amit Panday, an ...

Cyber Warfare in the Crossfire Growing Threats Amid Israel-Gaza Conflict

17 Oct 2023

Contributed by Lukas

The Israeli-Hamas war has once again highlighted the significance of cybersecurity in a world where conflicts extend into the digital realm. Israel, w...

How the Israel-Hamas War Impacts the Cybersecurity Industry?

17 Oct 2023

Contributed by Lukas

The recent conflict between Israel and Hamas has provoked significant geopolitical turmoil and left its mark on the cybersecurity landscape. Amidst th...

Top Vulnerability Analysis Tools

13 Oct 2023

Contributed by Lukas

A successful cybersecurity approach is essential in an era where companies are moving their most critical services into the cyber world. Because there...

What is Cross-Site Scripting (XSS)? | How does Cross-Site Scripting Work?

13 Oct 2023

Contributed by Lukas

Cross-Site Scripting (XSS) is a common web application vulnerability that allows attackers to inject malicious scripts into web pages viewed by unsusp...

Top Ethical Hacking Interview Questions and Answers | Ethical Hacker Interview (Part 2)

13 Oct 2023

Contributed by Lukas

We present a comprehensive guide on the top ethical hacking interview questions and answers. Whether you are a cybersecurity professional or aspiring ...

Understanding External Entities in XML | Protecting Against XML External Entity Injection

13 Oct 2023

Contributed by Lukas

In this informative Podcast, we delve into the concept of external entities in XML and discuss the potential vulnerabilities associated with XML Exter...

What is Server Side Request Forgery (SSRF) with Real-world Examples?

13 Oct 2023

Contributed by Lukas

In this informative video, we will delve into the concept of Server-Side Request Forgery (SSRF) and illustrate it with real-world examples. SSRF is a ...

What is GRC (Governance, Risk, and Compliance)?

13 Oct 2023

Contributed by Lukas

In today’s complex business environment, it is essential for organizations to establish robust processes to manage their Governance, Risk, and Compl...

What is Container Security in the Cloud?

11 Oct 2023

Contributed by Lukas

In the ever-evolving landscape of cloud-native computing, where applications are developed and deployed at lightning speed, it is critical to ensure t...

What is SQL Injection? | SQL Injection Mitigation & Prevention

11 Oct 2023

Contributed by Lukas

Learn about SQL Injection, a dangerous vulnerability that hackers exploit to gain unauthorized access to databases. This comprehensive tutorial covers...

Attributes to Look for in a GRC Platform

10 Oct 2023

Contributed by Lukas

In today’s fast-paced business landscape, many organizations rely on Governance, Risk, and Compliance (GRC) platforms to streamline their management...

What is Insecure Deserialization? | Mitigation for Insecure Deserialization

09 Oct 2023

Contributed by Lukas

In this informative Podcast, we dive into the concept of insecure deserialization, shedding light on its meaning, risks, and effective mitigation stra...

What is CSRF? | What is Cross Site Request Forgery with Example?

09 Oct 2023

Contributed by Lukas

Cross Site Request Forgery (CSRF) is a web vulnerability that poses a serious threat to user data and application integrity. In this video, we delve i...

Top GRC Tools for Your Organization

09 Oct 2023

Contributed by Lukas

In this dynamic changing world of modern business, organizations face many challenges, such as complying with regulations, managing risks, and maintai...

GRC Interview Questions

06 Oct 2023

Contributed by Lukas

Organizations today understand the crucial need for Governance, Risk, and Compliance (GRC) functions to guarantee operational effectiveness, regulator...

What is Authentication? | Broken Authentication & Mitigation Explained

06 Oct 2023

Contributed by Lukas

In this comprehensive Session, we delve into the concept of authentication in cyber systems. Discover its significance, the risks of broken authentica...

What Is LLMNR Poisoning? | How does LLMNR poisoning work?

04 Oct 2023

Contributed by Lukas

Welcome to our informative Podcast where we explain the concept of LLMNR poisoning and how it works. LLMNR (Link-Local Multicast Name Resolution) is a...

What is Evil-Winrm | Evil-winrm Tool For Penetration Testing

03 Oct 2023

Contributed by Lukas

Evil-Winrm is a versatile and powerful penetration testing tool that aids in assessing network security. This YouTube video provides an in-depth expl...

What is Mimikatz? | Blue Screen of Death using Mimikatz

03 Oct 2023

Contributed by Lukas

Find out what Mimikatz is and how it can cause the Blue Screen of Death on your system. Mimikatz is a powerful post-exploitation tool that specifical...

What is a Pass-the-Hash Attack (PtH)? | Pass the hash (PtH) attacks: How they work

03 Oct 2023

Contributed by Lukas

Welcome to @InfosecTrain ! In this educational podcast, we provide a comprehensive explanation of the Pass-the-Hash Attack (PtH) technique, commonly o...

What is PsExec? | How to Use PsExec? Step-by-Step Guide

03 Oct 2023

Contributed by Lukas

In this informative Podcast, we will explain what PsExec is and provide a step-by-step guide on how to use PsExec effectively. PsExec is a powerful co...

What is CrackMapExec? | How to install CrackMapExec on Kali Linux

03 Oct 2023

Contributed by Lukas

CrackMapExec is a potent and versatile penetration testing tool that enables security professionals to assess network vulnerabilities effectively. In ...

CIPP vs. CIPT

03 Oct 2023

Contributed by Lukas

Most companies and organizations operate in a data-driven environment and save their data on digital platforms. As more organizations embrace digital ...

Roles and Responsibilities of OT Security Professionals

29 Sep 2023

Contributed by Lukas

In today’s digital era, where technology permeates every aspect of our lives, protecting critical infrastructure and Industrial Control Systems (ICS...

OT vs. IT: The Key Differences

29 Sep 2023

Contributed by Lukas

In today’s digitized world, technology plays a pivotal role in almost every aspect of our lives, both personally and professionally. Two crucial dom...

What is BloodHound? | How to Install and Setup BloodHound

29 Sep 2023

Contributed by Lukas

Welcome to our Channel where we explain what is BloodHound, how to install it, and guide you through the setup process. Bloodhound is a powerful and w...

What are the DevSecOps Practices for Security? | Embracing DevSecOps: Achieving Security Excellence

28 Sep 2023

Contributed by Lukas

Welcome to "Embracing DevSecOps: Achieving Security Excellence" - your go-to resource for integrating security into your DevOps practices! I...

Top Ethical Hacking Interview Questions and Answers | Ethical Hacker Interview (Part 1)

28 Sep 2023

Contributed by Lukas

We present a comprehensive guide on the top ethical hacking interview questions and answers. Whether you are a cybersecurity professional or aspiring ...

Cracking the Security Operations Center (SOC) Interview | Expert Tips by Bharat

28 Sep 2023

Contributed by Lukas

Welcome to our exclusive Session on how to ace your Security Operations Center (SOC) interview! In this comprehensive interview preparation guide, Bha...

How to Secure an OT Network?

27 Sep 2023

Contributed by Lukas

In our increasingly interconnected world, the convergence of Operational Technology (OT) and Information Technology (IT) has brought significant advan...

Key Components of OT: Empowering Industrial Control & Monitoring

26 Sep 2023

Contributed by Lukas

Operational Technology (OT) drives the efficiency and reliability of industrial processes, encompassing a range of components that work harmoniously t...

Difference Between SSO and Federated Identity Management

25 Sep 2023

Contributed by Lukas

Welcome to @InfosecTrain ! In this insightful , we delve into the fundamental differences between Single Sign-On (SSO) and Federated Identity Manageme...

Understanding IBM QRadar | Key Components of IBM QRadar

25 Sep 2023

Contributed by Lukas

In this Session, we will provide a comprehensive overview of the key components of IBM QRadar. Whether you are an IT professional, cybersecurity enthu...

What is Operational Technology (OT)?

21 Sep 2023

Contributed by Lukas

It is crucial in today’s fast-paced technological landscape to have a firm grasp on the different facets of technology that power our everyday lives...

PCI DSS Compliance Roadmap | Understanding PCI DSS | PCI-DSS Q&A Session

21 Sep 2023

Contributed by Lukas

#ComplianceRoadmap #pcidss #DataSecurity Welcome to our deep dive into the PCI DSS Compliance Roadmap! Navigating the complexities of the Payment Car...

What are the Different Types of Exploits?

20 Sep 2023

Contributed by Lukas

Introduction to Exploit An exploit is a piece of code, software, or method used by attackers to take advantage of vulnerabilities or weaknesses in app...

Azure Interview Questions and Answers in 2023 | Azure Interview Tips | AZ Interview Secrets [Part 5]

20 Sep 2023

Contributed by Lukas

Are you preparing for an Azure job interview in 2023? Look no further! This Podcast provides you with the top Azure interview questions and answers th...

MGM Cyberattack Fallout: How Hackers Used Social Engineering to Infiltrate

20 Sep 2023

Contributed by Lukas

Despite pulling in millions daily, even major organizations can fall victim to cyberattacks. It's a stark reminder of the human factor in cybersec...

Introduction to CISM | Scope of CISM | CISM Exam Syllabus

19 Sep 2023

Contributed by Lukas

Welcome to our comprehensive Session on the Introduction to CISM (Certified Information Security Management). In this Session, we will provide an in-d...

What is Network Penetration Testing?

18 Sep 2023

Contributed by Lukas

Overview of Network Penetration Testing Network Penetration Testing is a systematic and authorized attempt to assess the security of IT network infras...

Why choose the DevSecOps Engineer course from InfosecTrain?

15 Sep 2023

Contributed by Lukas

What is DevSecOps? DevSecOps, short for Development, Security, and Operations, is an approach to software development that integrates security practic...

CCSP Exam Preparation | CCSP Exam Tips & Tricks [Part 2]

14 Sep 2023

Contributed by Lukas

Welcome to InfoecTrain's comprehensive CCSP exam preparation Masterclass Session! In this Session, we will provide you with the best tips and stra...

CCSP Exam Preparation | CCSP Exam Tips & Tricks [Part 1]

14 Sep 2023

Contributed by Lukas

Welcome to InfoecTrain's comprehensive CCSP exam preparation Masterclass Session! In this Session, we will provide you with the best tips and stra...

Bengaluru IT Professional Falls Victim to a Sophisticated Scam, Loses Rs 97,000

14 Sep 2023

Contributed by Lukas

🚨 SCAM ALERT 🚨 | Bengaluru IT Professional's Cautionary Tale 🖥️💰 In today's Podcast, we unravel the harrowing experience of an ...

How to Become a Cyber Security Expert?

14 Sep 2023

Contributed by Lukas

💻🔒 Becoming a Cyber Security Expert: Your Ultimate Guide! 🔒💻 Ever wondered what it takes to dive deep into the world of cyber security? I...

How to Identify Vulnerable Third-Party Software?

13 Sep 2023

Contributed by Lukas

In our modern digital landscape, we find ourselves immersed in a constantly expanding network of software, applications, and services that streamline ...

Azure Interview Questions and Answers in 2023 | Azure Interview Tips | AZ Interview Secrets [Pare 4]

13 Sep 2023

Contributed by Lukas

Are you preparing for an Azure job interview in 2023? Look no further! This comprehensive Podcast provides you with the top Azure interview questions ...

Why Choose DevSecOps Practical Course with InfosecTrain?

12 Sep 2023

Contributed by Lukas

What is DevSecOps? A technique to software development known as DevSecOps, or Development, Security, and Operations, incorporates security practices a...

What is Domain 7 of CISSP? | Exam Prepare for the CISSP Domain 7 : Security Operations

11 Sep 2023

Contributed by Lukas

Domain 7 of CISSP - Security Operations is a crucial topic that professionals must master to succeed in the CISSP exam. In this comprehensive Session,...

Difference Between Penetration Testing and Vulnerability Assessment

08 Sep 2023

Contributed by Lukas

Penetration Testing and Vulnerability Assessment are two distinct but related methods used to evaluate the security of IT systems, networks, and appli...

Introduction to Threat Intelligence | Decoding Cyber Threats | Lifecycle of Threat Intelligence

08 Sep 2023

Contributed by Lukas

Welcome to our insightful Podcast on the foundations of Threat Intelligence and the crucial role it plays in decoding cyber threats. In this comprehe...

What is IAM? | What is PAM? | What is IGA? | IAM Domains & Upskilling

07 Sep 2023

Contributed by Lukas

Welcome to our @InfosecTrain channel where we dive deep into the captivating world of IAM (Identity and Access Management) domains and upskilling. In ...

What is Advanced Vulnerability Assessment | How to Stay Ahead of the Attackers

07 Sep 2023

Contributed by Lukas

🔍 The digital realm is constantly evolving, and so are the threats lurking in its shadows. In this exclusive Podcast, dive deep into the latest tec...

Top Interview Questions for Threat Hunters | Threat Hunting Interview Questions

07 Sep 2023

Contributed by Lukas

Welcome to InfosecTrain's channel! In this Podcast, we will explore the top interview questions for aspiring threat hunters. Whether you are a beg...

Roadmap to Digital Personal Data Protection Bill : DPDP Implementation

07 Sep 2023

Contributed by Lukas

🔑 Unlock the Future of Data Privacy: Join Our Free Webinar on Roadmap to DPDP Implementation 🌐 Are you navigating the complex landscape of data...

How Automation Impacts Network Management? | Navigating Networks: A CCNA Journey [Part 2]

06 Sep 2023

Contributed by Lukas

Welcome to "Navigating Networks: A CCNA Journey"! 🌐 Dive deep into the world of network engineering with us as we embark on a comprehens...

What is Session Management?

05 Sep 2023

Contributed by Lukas

Session management is a critical security aspect for web applications that aims to establish a strong and cryptographically secure link between authen...

What is Wiretapping in Cybersecurity?

04 Sep 2023

Contributed by Lukas

Wiretapping in cybersecurity refers to the unauthorized interception or monitoring of electronic communications, typically over wired or wireless netw...

Top AWS Interview Questions and Answers to Ace in 2023

04 Sep 2023

Contributed by Lukas

This Podcast includes a chosen collection of the top AWS interview questions and answers for the year 2023. These questions have been carefully collec...

Latest Cybersecurity News

04 Sep 2023

Contributed by Lukas

Latest Cybersecurity News

What is CCNA? | What is VLAN and Why it is Used? [Part 1]

04 Sep 2023

Contributed by Lukas

Welcome to "Navigating Networks: A CCNA Journey"! 🌐 This informative video on CCNA and VLAN! In this tutorial, we will provide a compreh...

CIPM Exam Road Map | CIPM Exam Resources | CIPM Exam Strategy [Part 3]

01 Sep 2023

Contributed by Lukas

📌 Welcome to the IAPP CIPM Workshop: Your Roadmap to Privacy Leadership! ➡️ DAY 3: Agenda for the Webinar: 👉CIPM Exam Road Map 👉CIPM Ex...

CIPPM Introduction And Coverage | Data Assessment | Transfer Impact Assessment [Part 2]

01 Sep 2023

Contributed by Lukas

📌 Welcome to the IAPP CIPM Workshop: Your Roadmap to Privacy Leadership! 🔍 In today's digital age, data privacy has never been more crucial...

IAPP CIPM Workshop: Your Roadmap to Privacy Leadership | What is Data Privacy [Part 1]

01 Sep 2023

Contributed by Lukas

📌 Welcome to the IAPP CIPM Workshop: Your Roadmap to Privacy Leadership! 🔍 In today's digital age, data privacy has never been more crucia...

Breaking Through the Cloud Security Skills Gap with EC-Council’s CCSE

31 Aug 2023

Contributed by Lukas

Today, the world is adopting the cloud for all their business operations and even personal purposes. With the technology’s dynamic nature, the caree...

Top Penetration Testing Interview Questions 2023 | Penetration Testing Interview & Answers! Part 2

30 Aug 2023

Contributed by Lukas

Welcome to @InfosecTrain channel where we provide top-notch knowledge and insights into all things related to penetration testing. In this Podcast, we...

Top Reasons to Explore a Career in Cybersecurity

29 Aug 2023

Contributed by Lukas

Cybercrime and risks are rising in tandem with the advanced digital age in our daily routines. In a modern environment, cybersecurity credentials are ...

Why are Ransomware Attacks Increasing?

25 Aug 2023

Contributed by Lukas

We tackle various malicious cyberattacks daily to secure ourselves and our digital surroundings in this era of technical advancement. The term “rans...

IAM and its importance in the cloud | What is Cloud? | Different Vendors of Cloud

25 Aug 2023

Contributed by Lukas

Welcome to @InfosecTrain In this Podcast, we dive deep into the world of cloud security and discuss the crucial topic of Identity and Access Managemen...

Overview of the CISM Exam Format & Structure | Tips for Creating CISM Study Plan

25 Aug 2023

Contributed by Lukas

Welcome to @InfosecTrain! In this Podcast, we provide a comprehensive overview of the Certified Information Security Manager (CISM) exam format and st...

What is Vishing Scams? | How to Protect Yourself from Vishing Scams? | How to Stay Safe?

25 Aug 2023

Contributed by Lukas

Welcome to @InfosecTrain! In this informative Podcast, we're diving deep into the world of vishing scams – what they are and, more importantly, ...

What is AVRecon Malware? | Tips to Protect Yourself from AVRecon Malware

25 Aug 2023

Contributed by Lukas

In this Podcast, we dive deep into the world of cybersecurity to uncover the Avrecon malware and the risks it poses to your digital life. Join us as w...

How to Protect Against Sniffing Attacks?

24 Aug 2023

Contributed by Lukas

Introduction to Sniffing Attacks Sniffing attacks, also known as network sniffing or packet sniffing attacks, are malicious activities where an attack...

Edge Computing vs. Cloud Computing

23 Aug 2023

Contributed by Lukas

Cloud computing is a platform that enables businesses to host their private data on worldwide servers, allowing them to save data in the cloud and acc...

Top Penetration Testing Interview Questions and Answers -Cybersecurity Careers

23 Aug 2023

Contributed by Lukas

Welcome to @InfosecTrain channel where we provide top-notch knowledge and insights into all things related to penetration testing. In this video, we p...

Day - 2: CISO AWARENESS PROGRAM The SOC Blueprint | Increasing Attack Surface | Threat Landscape

23 Aug 2023

Contributed by Lukas

🔒 Strengthening Cyber Resilience: Join Our CISO Awareness Program on Building The SOC Blueprint 🏁 In today's rapidly evolving threat lands...

Types of DDoS Attacks?

22 Aug 2023

Contributed by Lukas

DDoS attacks have become a recurring and significant problem for enterprises and organizations of all sizes. These attacks pose a constant and severe ...

Day 3- GRC Archer Administrator Masterclass _ Reporting and Data Import

21 Aug 2023

Contributed by Lukas

Welcome to the ultimate GRC Archer Administrator Masterclass! 🎓 Are you ready to unlock the full potential of the GRC Archer platform? Whether you...

Day - 1 CISO AWARENESS PROGRAM The SOC Blueprint _ What is Soc_ _ Traditional SOC Vs Mordern SOC

21 Aug 2023

Contributed by Lukas

🔒 Strengthening Cyber Resilience: Join Our CISO Awareness Program on Building The SOC Blueprint 🏁 In today's rapidly evolving threat landsc...

Microsoft Azure Interview Questions | Part 3-Microsoft Azure Interviews with Expert Questions

21 Aug 2023

Contributed by Lukas

Are you ready to skyrocket your chances of acing that Microsoft Azure interview? Welcome to an insightful journey where we break down the most crucial...

Microsoft Azure Interview Questions | Part 2-Microsoft Azure Interviews with Expert Questions

21 Aug 2023

Contributed by Lukas

Are you ready to skyrocket your chances of acing that Microsoft Azure interview? Welcome to an insightful journey where we break down the most crucial...

GRC Archer Administrator Masterclass | How to Create an Application from Scratch?

18 Aug 2023

Contributed by Lukas

Welcome to the ultimate GRC Archer Administrator Masterclass! 🎓 Are you ready to unlock the full potential of the GRC Archer platform? Whether you...

What is AWS S3 Object Lock? | How to use Amazon S3 Object Lock?

18 Aug 2023

Contributed by Lukas

🔐 Discover AWS S3 Object Lock and Ensure Data Immutability 🛡️ In this deep dive into Amazon S3 Object Lock, we unravel the power of data immu...

CIPT vs. CIPM

17 Aug 2023

Contributed by Lukas

In the current digital era, an ample amount of data is being transferred rapidly. Our digital information is being collected and stored by IT products...

Day 1- GRC Archer Administrator Masterclass | Basic Terminology in Archer

17 Aug 2023

Contributed by Lukas

Welcome to the ultimate GRC Archer Administrator Masterclass! 🎓 Are you ready to unlock the full potential of the GRC Archer platform? Whether yo...

Top DevSecOps Interview Questions

17 Aug 2023

Contributed by Lukas

With the rapid advancement of technology, it has become paramount to integrate security throughout the software development lifecycle. DevSecOps, whi...

Fundamental Principles of Information Security

10 Aug 2023

Contributed by Lukas

Information security is crucial in today’s digital world to guard against threats like unauthorized access, misuse, or data loss. The fundamental pr...

Microsoft Azure Interview Questions | Microsoft Azure Interviews with Expert Questions

09 Aug 2023

Contributed by Lukas

Are you ready to skyrocket your chances of acing that Microsoft Azure interview? Welcome to an insightful journey where we break down the most crucial...

What is a Zero-Trust Cybersecurity Model?

09 Aug 2023

Contributed by Lukas

The growth of the modern workforce and the migration to remote work have resulted in a continuous rise in cybercrime, data breaches, data theft, and r...

Spear Phishing vs. Whaling

09 Aug 2023

Contributed by Lukas

Since COVID-19, cyberattacks have increased at a faster rate than before. Cybercriminals are using different types of cyberattack techniques to gain a...

Most Asked Interview Questions for Penetration Testing

07 Aug 2023

Contributed by Lukas

If you're gearing up for a penetration testing interview, understanding the most commonly asked questions is essential. In this Audio, we unveil t...

How do I keep EBS volumes safe? | 5 Ways to Protect EBS Volumes

07 Aug 2023

Contributed by Lukas

In this Audio, you will learn valuable tips on how to ensure the safety of your EBS volumes. Discover 5 effective ways to protect your EBS volumes and...

What is AWS CLI?

04 Aug 2023

Contributed by Lukas

What is AWS CLI? AWS CLI, or Amazon Web Services Command Line Interface, is a powerful and versatile tool that enables users to interact with various ...

Top Penetration Testing Trends to Follow

03 Aug 2023

Contributed by Lukas

Organizations are now becoming more vulnerable to cyber threats because digital information and technology are firmly embedded in daily operations. Th...

«« ← Prev Page 9 of 16 Next → »»