Podcast Episodes
Back to Search
How to Make a Career in Red Team & Pentesting | Career in Cybersecurity : Red Teaming / Pentesting
Are you passionate about ethical hacking and cybersecurity? Want to break into the exciting world of Red Teaming and Penetration Testing? In this epi…
9 months, 3 weeks ago
What is Security Risk Assessment and How Does It Work? | Types of Risk Assessment
In this episode of the InfosecTrain podcast, we break down Security Risk Assessment—a critical process for identifying, analyzing, and mitigating cyb…
9 months, 3 weeks ago
What is Enterprise Security Architecture? | How Dose cybersecurity Architecture work in Enterprises
In this episode of the InfosecTrain podcast, we delve into the concept of Enterprise Security Architecture (ESA) and explore how cybersecurity archit…
9 months, 3 weeks ago
What is OT Security? | Why OT security is important? | What are OT Cyber Security Challenges
OT security is commonly used to protect Industrial Systems and networks from attacks. Operational technology security is used to protect and control …
10 months ago
Building Privacy Management System in Organization | What is Privacy Management?
Privacy management tools help organizations conduct privacy impact assessments, check processing activities against requirements from privacy regulat…
10 months ago
Understanding Packets and Protocols | Wireshark Guide to Network Analysis
In this Episode, we focus on understanding packets and protocols, key components of network communication, and their crucial role in network analysis…
1 year ago
Introduction and Understanding of Wireshark | Comprehensive Wireshark Guide
We introduce and explain Wireshark, one of the most powerful tools for network analysis and packet sniffing. Wireshark is widely used by network prof…
1 year ago
Effective CISM Exam Strategies for Success | Think Like a Manager
In this Episode, we explore how adopting a managerial mindset can significantly enhance your CISM exam strategies. The CISM exam is not just a test o…
1 year ago
Types of Password Attacks Password
Password cracking is the process of figuring out passwords from data passing through or stored on a computer. It can be done to help someone regain a…
1 year ago
CEH Module 7: Malware Threats
Module 7 of CEH: Malware Threats explains the basics of different types of harmful software (malware) and how they can negatively affect computers an…
1 year ago