Podcast Episodes

Back to Search
How do Phishing and Spoofing Attacks Impact Businesses?
How do Phishing and Spoofing Attacks Impact Businesses?

In recent years, prominent organizations and companies have been victims of cybercrime, ranging from data breaches to unlawful access to financial ac…

2 years, 5 months ago

Short Long
View Episode
Why IAPP CIPP/E Training & Certification with Infosectrain?
Why IAPP CIPP/E Training & Certification with Infosectrain?

The CIPP/E training from InfosecTrain helps you to learn the basics of data privacy and European data protection. It covers all the essential element…

2 years, 5 months ago

Short Long
View Episode
What are 5 Key Services in AWS? | AWS Cloud Services
What are 5 Key Services in AWS? | AWS Cloud Services

In this Podcast, we dive deep into the world of Amazon Web Services (AWS) and explore the 5 Key Services that every cloud enthusiast must know. Wheth…

2 years, 5 months ago

Short Long
View Episode
A Tribute To Kevin Mitnick Most Wanted Hacker & Cybersecurity Professional
A Tribute To Kevin Mitnick Most Wanted Hacker & Cybersecurity Professional

Welcome to this captivating tribute dedicated to Kevin Mitnick, the Most Wanted Hacker turned Cybersecurity Professional! In this Podcast, we delve d…

2 years, 5 months ago

Short Long
View Episode
Incident Response in the Cloud (AWS) | Phases of Incident Response | AWS Native tools used for IR
Incident Response in the Cloud (AWS) | Phases of Incident Response | AWS Native tools used for IR

InfosecTrain hosts a live event entitled “Incident Response in AWS Cloud” with certified expert ‘Krish.’ For more details or free demo with our exper…

2 years, 5 months ago

Short Long
View Episode
Types of Viruses
Types of Viruses

Viruses are becoming increasingly prevalent every day in the digital world due to the widespread adoption of internet connectivity and other digital …

2 years, 5 months ago

Short Long
View Episode
Interview Questions for Incident Handler
Interview Questions for Incident Handler

Organizational cybersecurity is essential in the modern digital environment, where cybercrime and data breaches continue to present serious business …

2 years, 5 months ago

Short Long
View Episode
What is the Key Difference between AWS Guardduty and Detective?
What is the Key Difference between AWS Guardduty and Detective?

In this Podcast, we dive deep into the world of AWS security solutions, focusing on the crucial comparison between AWS GuardDuty and Detective. If yo…

2 years, 5 months ago

Short Long
View Episode
Black Box vs. White Box vs. Grey Box Penetration Testing
Black Box vs. White Box vs. Grey Box Penetration Testing

With the rising prevalence of cybercrime, there is a growing need for penetration testing in organizations. This legitimate form of cyberattack allow…

2 years, 5 months ago

Short Long
View Episode
Physical Architecture of Network
Physical Architecture of Network

In today’s tech-savvy world, networking is essential to every individual and industry’s daily activities. However, with more enterprises relying on t…

2 years, 5 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us