InfosecTrain
Podcast image
What is Android Architecture? | Multi Tiered Architecture | Android Layers Architecture
7 mins; July 19, 2023
Cyber Attack vs. Data Breach
5 mins; July 18, 2023
CRISC Exam Approach and Preparation | What is CRISC? | CRISC Exam Approach
22 mins; July 18, 2023
Common Wireless and Mobile Device Attacks
5 mins; July 17, 2023
CISSP Practice Exam Questions and Answers | CISSP Q&A Review Session
35 mins; July 17, 2023
What's New in CYSA+ (CS0-003)? | Major Changes to the CompTIA CySA+
33 mins; July 17, 2023
What is Phishing Attack? | Email Phishing Attack | Social Media Phishing Attack
4 mins; July 17, 2023
CCAK, ISO 27001 LA & CEH InfosecTrain Review | Samipan Das success story CCAK, ISO 27001 LA & CEH
7 mins; July 17, 2023
CISA Infosectrain Review | CISA Success Story | Aakriti Garg CISA Gladiator
6 mins; July 17, 2023
Types Of Malware
4 mins; July 14, 2023
Why IAPP CIPP/E Certification Training with Infosectrain?
10 mins; July 14, 2023
What is Incident Handling in cyber security? | Introduction to Incident Response
38 mins; July 14, 2023
What is GRC? | How can you start a career in IT Audit?
35 mins; July 14, 2023
What is Azure Sentinel architecture and Data Collection? | Key Capabilities of Microsoft Sentinel
55 mins; July 14, 2023
Introduction to Cybersecurity Framework
5 mins; July 13, 2023
Certified Protection Professional (CPP) Exam Structure and CPP Preparation Plan
22 mins; July 13, 2023
CISSP Practice Tests | CISSP QA and Course Review | CISSP Practice Questions
49 mins; July 13, 2023
CISSP Question and Answer Practice _ Prepare for CISSP Exam _ CISSP Exam 2023 _ InfosecTrain
31 mins; July 13, 2023
Introduction to PCI DSS | Key Requirements of PCI DSS | PCI DSS Compliance
45 mins; July 12, 2023
CCSP & CISSP InfosecTrain Review | Umesh Pandey Success Storie CCSP & CISSP
8 mins; July 12, 2023
CISSP & CISM InfosecTrain Review | Ravi Teja Success Storie CISSP & CISM
12 mins; July 12, 2023
CompTIA PenTest+ vs. EC Council’s CEH
5 mins; July 12, 2023
Day-12: What is security monitoring? | What are logs and how they are monitored?
52 mins; July 12, 2023
Day - 11: Overview of Threat Detection | Event vs. Incident | What is Incident Response?
80 hours 14 mins; July 12, 2023
Day - 10: What is SOC? | Roles and functions of SOC | Tools and Techniques used in SOC
88 hours 15 mins; July 12, 2023
Day -9: What is Cloud Service Models? | Cloud Deployment Models | Future of Cloud Computing
100 hours 36 mins; July 12, 2023
Day - 8: What is Cloud Computing? | What is cloud? | Cloud vs On-premises
106 hours 40 mins; July 11, 2023
Day - 7: Type of Mobile Platform | Rooting v/s Jailbreaking | Stock Android Vs. Custom Rom
61 hours 39 mins; July 11, 2023
Day -10: 2023 Latest Cyber Security Interview Questions and Answers
24 mins; July 11, 2023
Day - 9: What is chain of custody? | Order of Volatility | Miter Att&ck | Cryptography
70 hours 34 mins; July 11, 2023
Day - 8: What is Volatile and Non Volatile Data? | Network Forensic | WireShark
86 hours 25 mins; July 11, 2023
Why is AWS a Better Choice?
5 mins; July 10, 2023
Day - 7: what is Digital Forensic? | Types of Cyber Crime | General Forensic Process
87 hours 54 mins; July 10, 2023
Day - 6: What is Penetration Testing? | Ethical Hacking Vs. Malicious Activities
82 hours 8 mins; July 10, 2023
CIPM InfosecTrain Review | CIPM Success Stories | Parag Kulkarni CIPM Gladiator
13 mins; July 10, 2023
What is Mobile Cloud Computing?
5 mins; July 07, 2023
GuardDuty vs. Detective
5 mins; July 07, 2023
Why Choose the Data Protection Officer Course with InfosecTrain?
5 mins; July 07, 2023
MAC Flooding Attack
3 mins; July 05, 2023
Challenges and Benefits of Application Security
4 mins; July 03, 2023
Defense with Kali Purple | Understanding Kali OS | Exploring Tools and Application
35 mins; July 03, 2023
What's New in AZ-500? | Deep Dive into Key Topics | AZ-500 Q&A Session
53 mins; July 03, 2023
Day - 6: What is Threat Intelligence? | Benefits & Stages of Cyber Threat Intelligence
80 hours 58 mins; July 03, 2023
How to Deal with Cyber Extortion?
4 mins; June 30, 2023
MITRE ATT&CK: Meaning, Uses, Benefits
5 mins; June 30, 2023
Day - 5 : Introduction to Cross Site Scripting | XSS (Cross Site Scripting) Practical
74 hours 39 mins; June 29, 2023
Day - 4: What is Password Cracking Techniques | Types of Password Attacks | Rainbow Table
85 hours 41 mins; June 29, 2023
Day- 3: What is Ethical Hacking? | Ethical Hacking Phases | Enumeration
72 hours 58 mins; June 29, 2023
Day - 2 Introduction to Kali Linux | Basic Linux Commands | What is IP Address?
74 hours 2 mins; June 29, 2023
Day - 1: What is Information Security? | CIA Triad | Red Team and Blue Team
70 hours 40 mins; June 29, 2023
Day - 5: What is Social Engineering and It's Techniques | Types of Social Engineering
74 hours 22 mins; June 29, 2023
Day 4 : What is Cyberbullying and Cyber Etiquettes? | How to report cyberbullying?
100 hours 24 mins; June 28, 2023
Day 3 : Protecting personal information | Cyberbullying and Cyber Etiquettes
82 hours 0 mins; June 28, 2023
What is AWS S3 Glacier?
4 mins; June 27, 2023
Role of Blockchain in Cybersecurity
4 mins; June 27, 2023
Day 2 : What is security? | Information security vs Cybersecurity vs Privacy
83 hours 44 mins; June 26, 2023
Day 1 : What is a Network? | Types of networks | What is Internet?
90 hours 58 mins; June 22, 2023
Is Chat GPT Cyber Secure? | ChatGPT For Cybersecurity | ChatGPT Privacy Issues!
1 min; June 20, 2023
What is Information Security Lifecycle Management ?
5 mins; June 16, 2023
Top AWS Cost Optimization Tools
5 mins; June 15, 2023
How to become a Malware Analyst?
5 mins; June 13, 2023
NIST Cybersecurity Framework 2.0
4 mins; June 09, 2023
What is a command-line interface (CLI)? | Pros and Cons of Using AWS CLI
5 mins; June 09, 2023
RSA Archer Interview Questions
5 mins; June 08, 2023
How to prevent DDoS attacks?
5 mins; June 08, 2023
AWS vs. Azure: How are they different?
5 mins; June 06, 2023
Top Network Security Tools
5 mins; June 05, 2023
Top Tools To Manage Your Apps In The Cloud?
3 mins; June 01, 2023
What is Malware? | Types of Malware | Malware Attack
4 mins; May 31, 2023
Why Use DevOps On Azure?
5 mins; May 31, 2023
What Is Password Cracking?
5 mins; May 30, 2023
What is a Trojan Horse Virus? | Types of Trojan | How Does Trojan Work?
4 mins; May 30, 2023
AWS EC2 vs. Lambda: Exploring Compute Options in the Cloud
4 mins; May 29, 2023
OT Network Architecture | OT Cybersecurity Controls | Introduction to ICS/OT Pentesting
188 hours 16 mins; May 29, 2023
Vendor-Specific Vs. Vendor-Neutral Certification in Cloud Security
5 mins; May 29, 2023
What is ICS/OT Cybersecurity? | IT vs OT | OT Communication Protocols
169 hours 1 min; May 29, 2023
What is a virtual private cloud (VPC)? | Why is VPC Used? | Key Features of a VPC
4 mins; May 26, 2023
What is AWS Elastic Beanstalk? | Elastic Beanstalk Uses | Advantage of AWS Beanstalk
4 mins; May 25, 2023
How to Build a Successful Career in Cloud Security in 2023
5 mins; May 24, 2023
Top Azure Developer Tools
5 mins; May 19, 2023
Roles and Responsibilities of a Network Administrator
5 mins; May 19, 2023
What is Archer? | What is Integrated Risk Management? | RSA Archer Tools?
36 mins; May 19, 2023
What's New in AWS Certified Security Specialty | AWS Certified Security Specialty Q&A
80 hours 4 mins; May 18, 2023
Unveiling OSINT Techniques | Key Concepts of OSINT | Importance and Benefits of OSINT
45 mins; May 17, 2023
Interview Prep for Security Operations Center (SOC) | SOC Interview Questions
40 mins; May 17, 2023
History of Cyber Kill Chain | Steps of Cyber Kill Chain
47 mins; May 17, 2023
Top Business Analyst Interview Questions To Ace That Job Interview
5 mins; May 17, 2023
Common Cyber Attacks and Ways to Prevent Them
5 mins; May 16, 2023
Active Attack vs. Passive Attack
4 mins; May 12, 2023
Introduction to Data Privacy | Regulations around Data Privacy | DPO activities
77 hours 49 mins; May 11, 2023
AWS Certified Security Specialty Exam Prep Masterclass | InfosecTrain
34 mins; May 11, 2023
Top Tools and Software for Ethical Hacking
5 mins; May 10, 2023
Top Security Analyst Certifications
5 mins; May 09, 2023
Introduction To Azure Security | Network Security on Azure | InfosecTrain
119 hours 8 mins; May 09, 2023
Introduction to Governance, Privacy, Identity and Compliance Capabilities
117 hours 53 mins; May 09, 2023
Bug Bounty Vs. Vulnerability Disclosure Programs
5 mins; May 09, 2023
Core Azure Solution and Management Tools | Azure Monitoring Service | Azure Serverless Technology
118 hours 8 mins; May 05, 2023
Uncover the Secrets of the CISSP and ISSAP Exams - Strategy Tips from InfosecTrain
35 mins; May 05, 2023
Azure Cloud Fundamentals | What is Azure? | Key Azure Services
114 hours 50 mins; May 05, 2023
Top Ethical Hacking Tools Trending In 2023
5 mins; May 05, 2023