Podcast Episodes

Back to Search
APT 29 Cozy Bear: The Conspiracy That Will Blow Your Mind!
APT 29 Cozy Bear: The Conspiracy That Will Blow Your Mind!

In this Episode, we are exposing the APT 29 Cozy Bear Conspiracy that nobody talks about! APT 29, also known as Cozy Bear, is a sophisticated hacking…

1 year, 3 months ago

Short Long
View Episode
What is SOC as a Service (SOCaaS)
What is SOC as a Service (SOCaaS)

SOC as a Service (SOCaaS) is a cybersecurity solution where organizations outsource their security monitoring and incident response to specialized pr…

1 year, 3 months ago

Short Long
View Episode
Web Application Security: The Secret to Hack-Proof Apps Part 2
Web Application Security: The Secret to Hack-Proof Apps Part 2

In this Episode, you will discover 𝐬𝐭𝐞𝐩-𝐛𝐲-𝐬𝐭𝐞𝐩 𝐦𝐞𝐭𝐡𝐨𝐝𝐬 𝐭𝐨 𝐬𝐞𝐜𝐮𝐫𝐞 𝐲𝐨𝐮𝐫 𝐰𝐞𝐛 𝐚𝐩𝐩𝐥𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬 from common threats like SQL injection, cross-site scripting,…

1 year, 3 months ago

Short Long
View Episode
Web Application Security: The Secret to Hack-Proof Apps Part 1
Web Application Security: The Secret to Hack-Proof Apps Part 1

Web Application Security: The Secret to Hack-Proof Apps" is your gateway to mastering the critical skills necessary to protect your web applications …

1 year, 3 months ago

Short Long
View Episode
Web Application Basics: A Quick Guide for Beginners
Web Application Basics: A Quick Guide for Beginners

Welcome to our quick guide on Web Applications! In this Epiosode, we'll cover the basics of web applications, including what they are, how they work,…

1 year, 3 months ago

Short Long
View Episode
How to Implement ISO 27001:2022 Like a Pro – Step-by-Step Guide
How to Implement ISO 27001:2022 Like a Pro – Step-by-Step Guide

In this comprehensive Episode, InfosecTrain's expert instructors guide you through the updated ISO 27001:2022 standard, providing you with all the kn…

1 year, 3 months ago

Short Long
View Episode
7 Principles of Privacy by Design
7 Principles of Privacy by Design

Privacy by Design (PbD) is a proactive way to make sure privacy is incorporated from the beginning in technology, systems, and procedures. The integr…

1 year, 3 months ago

Short Long
View Episode
What Just Happened in Lebanon? Understanding Synchronized Explosions
What Just Happened in Lebanon? Understanding Synchronized Explosions

The entire world is in a state of fear due to the alarmingly severe cybersecurity vulnerabilities that have claimed multiple innocent lives in Lebano…

1 year, 3 months ago

Short Long
View Episode
Certified Ethical Hacker (CEH) Exam Prep : Step-by-Step Breakdown to Certification | Day 2
Certified Ethical Hacker (CEH) Exam Prep : Step-by-Step Breakdown to Certification | Day 2

Welcome to Day 2 of the CEH Exam Prep: Hack Your Way to Success at InfosecTrain! This session takes your ethical hacking skills to the next level, en…

1 year, 3 months ago

Short Long
View Episode
Commonly Asked ISC2 CC Exam Questions with Answers Part-2
Commonly Asked ISC2 CC Exam Questions with Answers Part-2

In our previous blog, we compiled some basic domain-wise ISC2 CC Exam Practice Questions with Answers, which helped many aspiring cybersecurity profe…

1 year, 3 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us