Channel Avatar

CyberPlatter @UC7asNccszmEwzQn2P414NKA@youtube.com

15K subscribers - no pronouns :c

More from this channel (soon)


05:56
DevSecOps | What is DevSecops | What is DevOps | DevSecOps Training | DevOps Training | App Security
24:31
Windows Security: Virus & Threat Protection with Microsoft Defender Antivirus | Real-time Protection
32:02
Endpoint Security Interview Questions and Answers| Endpoint Protection Interview Questions & Answers
03:24:08
CCSP Practice Questions and Answers | CCSP Exam 2024 | CCSP Questions and Answers | CCSP Cert | CCSP
02:49:58
CISSP Practice Questions and Answers | CISSP Exam 2024 | CISSP Questions and Answers | CISSP Cert
47:11
Cloud Security Interview Questions and Answers | Scenario based Cloud Security Interview Questions
14:56
Microsoft Defender for Endpoint MDE : Submissions Page | Submit Files, Emails, Teams Messages, URLs
11:00
Microsoft Defender for Endpoint: Automated Investigation and Response| AIR in Microsoft Defender XDR
40:02
SOAR Interview Questions and Answers | Security Orchestration, Automation and Response | SOAR Course
14:26
Microsoft Defender for Endpoint MDE: Actions taken on a suspicious file in MDE or MS Defender XDR
13:56
Microsoft Defender for Endpoint MDE: Actions taken on a compromised device in MDE or MS Defender XDR
13:48
Microsoft Defender for Endpoint MDE: Live Response | What is Live Response in MDE? MS Defender XDR
19:14
Microsoft Defender for Endpoint : Network Protection in MDE | Attack Surface Reduction | ASR Rules
30:35
Azure Interview Questions and Answers| Part 2 | Azure Scenario-Based Interview Questions and Answers
02:43:33
Microsoft Defender for Endpoint Tutorial | Microsoft Defender for Endpoint Interview Questions | MDE
46:03
PCI DSS (Payment Card Industry Data Security Standard): Control Objectives, Requirements & Levels
05:16
Microsoft Defender for Endpoint MDE : How to test your antivirus with EICAR test file? AV Detection
22:25
Microsoft Defender for Endpoint MDE : Advanced Features| Advanced Features in Microsoft Defender XDR
15:23
Microsoft Defender for Endpoint (MDE) : Device Discovery | How to identify unmanaged devices in MDE?
10:23
Microsoft Defender for Endpoint (MDE) : What is Microsoft Defender for Endpoint? Overview of MDE
12:10
What is Microsoft Defender XDR? What is Microsoft 365 Defender? What is XDR? Microsoft Defender XDR
12:13
Microsoft Defender for Endpoint (MDE) : How to onboard clients to MDE via Intune? MDE Bulk Onboard
06:38
Microsoft Defender for Endpoint (MDE) : How to onboard clients to MDE via a Local Script
39:38
How to Conduct an Internal Audit? A step-by-step Guide to Internal IT Audit | Internal Auditing
16:41
DoS and DDoS Attacks Explained: Types and Countermeasures| Denial of Service Attack| DoS DDoS Attack
05:04:26
Cyber Security Full Course | Cyber Security Training | Cyber Security Tutorial| Cybersecurity Guide
01:10:09
Cryptography | Symmetric and Asymmetric Cryptography | Digital Signatures | Digital Certificates
32:49
Attacks and Countermeasures | Cyber Attacks and Countermeasures | Different Types of Attacks
16:43
MITRE ATTACK | MITRE ATT&CK | MITRE ATT&CK Explained with an Example | MITRE ATT&CK Analysis
11:51
Cross Site Scripting | Cross Site Scripting Attack and Countermeasures | Cross-Site Scripting | XSS
30:53
NIST RMF | NIST Risk Management Framework | Step by Step Guide to NIST RMF | Risk Management
31:03
Password Attacks and their Countermeasures | Password Attacks | Cyber Security Attacks
30:09
Threat Hunting Interview Questions and Answers | Cybersecurity Interview | Threat Hunting
13:39
Cyber Kill Chain | Cyber Kill Chain Explain | What is Cyber Kill Chain? Kill Chain | Cybersecurity
12:28
CISSP | Domain 1.3.1| Strategy, Goals, Mission, Objectives| Strategic, Tactical & Operational Plans
15:42
CISSP | Domain 1.6 | Policies, Standards, Baselines, Procedures, Guidelines | Security Policies
44:31
ISO 27001 Interview Questions and Answers | ISO 27001 | ISO 27001 Certification | Internal Audit
47:41
Third Party Risk Management | TPRM | Third Party Risk Assessment | TPRM Step by Step Guide| TPRM 101
42:33
Digital Forensics and Incident Response | DFIR | DFIR Step-by-Step Process | DFIR 101 | DFIR
20:02
CISSP | Domain1.2.1 | Confidentiality, Integrity, Availability, Authenticity, Non-repudiation| CIA
35:31
Azure Interview Questions and Answers| Part 1 | Azure Scenario-Based Interview Questions and Answers
35:57
DevSecOps Interview Questions And Answers| Part 1| DevSecOps Training| DevSecops Tutorial| DevSecOps
06:24
CCSP | Cloud Computing Roles and Responsibilities | CCSP Full Course | CCSP Training | ISC2 CCSP
43:20
IT Audit Interview Questions and Answers | Part 2 | IT Auditing | IT Auditors | Internal IT Audit
26:43
Digital Certificates | Step-by-step process of Digital Certificate| Digital Certificates Explained
23:20
Digital Signatures| Step-by-step process of creating Digital Signature| Digital Signature Explained
06:41
Symmetric vs Asymmetric Encryption| Comparison between Symmetric & Asymmetric Cryptograph| Encrypt
09:41
SAST vs DAST vs IAST vs RASP vs SCA | App Security | Comparison between SAST, DAST, IAST, RASP, SCA
40:28
GRC Interview Questions and Answers | Part 1 | Governance, Risk and Compliance Interview Questions
30:42
What is Spoofing - Threats and Countermeasures | Types of Spoofing Attacks |Cybersecurity Interview
09:42
Secure Coding Best Practices | Cybersecurity Interview | Secure Coding Practices | Secure Coding
09:43
CCSP | Cloud Service Models | IaaS, PaaS, SaaS | Cloud Shared Responsibility Model | Cloud Security
07:43
CCSP | Cloud Computing | Key Characteristics of Cloud Computing | Pros and Cons of Cloud Computing
39:35
Incident Response Interview Questions and Answers| Part 1| Cybersecurity Incident Response Interview
40:43
Linux Interview Questions and Answers | Part 1 | Linux Admin Interview Questions and Answers
40:11
Identity and Access Management Interview Questions and Answers | Part 1 | Cybersecurity Interview `
42:20
Threat Intelligence Interview Questions and Answers | Part 1 | Cybersecurity Interview| Threat Intel
33:28
Entry level SOC Analyst Interview Questions and Answers for Freshers | Part 2| SOC Interview Q&A
35:46
Scenario Based Vulnerability Management Interview Questions and Answers |Cybersecurity Interview
43:25
Patch Management Interview Questions and Answers| Part 1|Cybersecurity Interview Questions & Answers