Podcast Episodes
Back to Search
How do Phishing and Spoofing Attacks Impact Businesses?
In recent years, prominent organizations and companies have been victims of cybercrime, ranging from data breaches to unlawful access to financial ac…
2 years, 5 months ago
Why IAPP CIPP/E Training & Certification with Infosectrain?
The CIPP/E training from InfosecTrain helps you to learn the basics of data privacy and European data protection. It covers all the essential element…
2 years, 5 months ago
What are 5 Key Services in AWS? | AWS Cloud Services
In this Podcast, we dive deep into the world of Amazon Web Services (AWS) and explore the 5 Key Services that every cloud enthusiast must know. Wheth…
2 years, 5 months ago
A Tribute To Kevin Mitnick Most Wanted Hacker & Cybersecurity Professional
Welcome to this captivating tribute dedicated to Kevin Mitnick, the Most Wanted Hacker turned Cybersecurity Professional! In this Podcast, we delve d…
2 years, 5 months ago
Incident Response in the Cloud (AWS) | Phases of Incident Response | AWS Native tools used for IR
InfosecTrain hosts a live event entitled “Incident Response in AWS Cloud” with certified expert ‘Krish.’ For more details or free demo with our exper…
2 years, 5 months ago
Types of Viruses
Viruses are becoming increasingly prevalent every day in the digital world due to the widespread adoption of internet connectivity and other digital …
2 years, 5 months ago
Interview Questions for Incident Handler
Organizational cybersecurity is essential in the modern digital environment, where cybercrime and data breaches continue to present serious business …
2 years, 5 months ago
What is the Key Difference between AWS Guardduty and Detective?
In this Podcast, we dive deep into the world of AWS security solutions, focusing on the crucial comparison between AWS GuardDuty and Detective. If yo…
2 years, 5 months ago
Black Box vs. White Box vs. Grey Box Penetration Testing
With the rising prevalence of cybercrime, there is a growing need for penetration testing in organizations. This legitimate form of cyberattack allow…
2 years, 5 months ago
Physical Architecture of Network
In today’s tech-savvy world, networking is essential to every individual and industry’s daily activities. However, with more enterprises relying on t…
2 years, 5 months ago