Channel Avatar

CyberPlatter @UC7asNccszmEwzQn2P414NKA@youtube.com

23K subscribers - no pronouns :c

CyberPlatter is a cybersecurity-focused YouTube channel dedi


18:37
Microsoft Sentinel User & Entity Behavior Analytics UEBA​ | Anomaly Detection | Microsoft Sentinel
25:48
Microsoft Sentinel : Analytics Rules | Threat Detection | Scheduled Rules | Anomaly | Azure Sentinel
19:18
Microsoft Sentinel : Threat Intelligence | Microsoft Sentinel| Azure Sentinel | TAXII | Defender TI
47:07
DevSecOps Interview Questions and Answers | DevSecOps Tutorial | DevSecOps Training | DevSecOps
11:51
Microsoft Sentinel Tutorial: Threat Detection and Mitigation Workflow in Microsoft Sentinel| Azure
10:56
Microsoft Sentinel Tutorial: Entra ID integration with Sentinel Content Hub | Data Connectors
28:34
Microsoft Sentinel Tutorial: Microsoft Sentinel Content Hub | Microsoft Sentinel Data Connectors
23:51
Microsoft Sentinel Tutorial: Microsoft Sentinel Deployment and Azure RBAC | How to deploy Sentinel
36:16
Cybersecurity Interview Questions & Answers for Freshers | Entry-Level Cybersecurity Interview Q&A
11:38
Microsoft Sentinel Tutorial: Introduction, Capabilities, and Architecture | Sentinel Architecture
09:16
Complete Mediation - Secure Design Principle | How to Implement Complete Mediation | Prod Security
11:19
Design For Failure - Secure Design Principle | How to Implement Design for Failure | Prod Security
15:03
Economy of Mechanism | Benefits of Economy of Mechanism | How to Implement Economy of Mechanism
14:57
Infrastructure as Code | What is Infrastructure as Code | What is IaC | Benefits of IaC | DevSecOps
37:09
Secure Design 101: Understanding the Principle of Least Privilege | Secure Architecture Principle
34:09
SOC 2 Compliance | SOC 2 Audit Process | SOC 2 : Audit Process, Benefits & Trust Service Criteria
05:56
DevSecOps | What is DevSecops | What is DevOps | DevSecOps Training | DevOps Training | App Security
24:31
Windows Security: Virus & Threat Protection with Microsoft Defender Antivirus | Real-time Protection
32:02
Endpoint Security Interview Questions and Answers| Endpoint Protection Interview Questions & Answers
03:24:08
CCSP Practice Questions and Answers | CCSP Exam 2024 | CCSP Questions and Answers | CCSP Cert | CCSP
02:49:58
CISSP Practice Questions and Answers | CISSP Exam 2024 | CISSP Questions and Answers | CISSP Cert
47:11
Cloud Security Interview Questions and Answers | Scenario based Cloud Security Interview Questions
14:56
Microsoft Defender for Endpoint MDE : Submissions Page | Submit Files, Emails, Teams Messages, URLs
11:00
Microsoft Defender for Endpoint: Automated Investigation and Response| AIR in Microsoft Defender XDR
40:02
SOAR Interview Questions and Answers | Security Orchestration, Automation and Response | SOAR Course
14:26
Microsoft Defender for Endpoint MDE: Actions taken on a suspicious file in MDE or MS Defender XDR
13:56
Microsoft Defender for Endpoint MDE: Actions taken on a compromised device in MDE or MS Defender XDR
13:48
Microsoft Defender for Endpoint MDE: Live Response | What is Live Response in MDE? MS Defender XDR
19:14
Microsoft Defender for Endpoint : Network Protection in MDE | Attack Surface Reduction | ASR Rules
30:35
Azure Interview Questions and Answers| Part 2 | Azure Scenario-Based Interview Questions and Answers
02:43:33
Microsoft Defender for Endpoint Tutorial | Microsoft Defender for Endpoint Interview Questions | MDE
46:03
PCI DSS (Payment Card Industry Data Security Standard): Control Objectives, Requirements & Levels
05:16
Microsoft Defender for Endpoint MDE : How to test your antivirus with EICAR test file? AV Detection
22:25
Microsoft Defender for Endpoint MDE : Advanced Features| Advanced Features in Microsoft Defender XDR
15:23
Microsoft Defender for Endpoint (MDE) : Device Discovery | How to identify unmanaged devices in MDE?
10:23
Microsoft Defender for Endpoint (MDE) : What is Microsoft Defender for Endpoint? Overview of MDE
12:10
What is Microsoft Defender XDR? What is Microsoft 365 Defender? What is XDR? Microsoft Defender XDR
12:13
Microsoft Defender for Endpoint (MDE) : How to onboard clients to MDE via Intune? MDE Bulk Onboard
06:38
Microsoft Defender for Endpoint (MDE) : How to onboard clients to MDE via a Local Script
39:38
How to Conduct an Internal Audit? A step-by-step Guide to Internal IT Audit | Internal Auditing
16:41
DoS and DDoS Attacks Explained: Types and Countermeasures| Denial of Service Attack| DoS DDoS Attack
05:04:26
Cyber Security Full Course | Cyber Security Training | Cyber Security Tutorial| Cybersecurity Guide
01:10:09
Cryptography | Symmetric and Asymmetric Cryptography | Digital Signatures | Digital Certificates
32:49
Attacks and Countermeasures | Cyber Attacks and Countermeasures | Different Types of Attacks
16:43
MITRE ATTACK | MITRE ATT&CK | MITRE ATT&CK Explained with an Example | MITRE ATT&CK Analysis
11:51
Cross Site Scripting | Cross Site Scripting Attack and Countermeasures | Cross-Site Scripting | XSS
30:53
NIST RMF | NIST Risk Management Framework | Step by Step Guide to NIST RMF | Risk Management
31:03
Password Attacks and their Countermeasures | Password Attacks | Cyber Security Attacks
30:09
Threat Hunting Interview Questions and Answers | Cybersecurity Interview | Threat Hunting
13:39
Cyber Kill Chain | Cyber Kill Chain Explain | What is Cyber Kill Chain? Kill Chain | Cybersecurity
12:28
CISSP | Domain 1.3.1| Strategy, Goals, Mission, Objectives| Strategic, Tactical & Operational Plans
15:42
CISSP | Domain 1.6 | Policies, Standards, Baselines, Procedures, Guidelines | Security Policies
44:31
ISO 27001 Interview Questions and Answers | ISO 27001 | ISO 27001 Certification | Internal Audit
47:41
Third Party Risk Management | TPRM | Third Party Risk Assessment | TPRM Step by Step Guide| TPRM 101
42:33
Digital Forensics and Incident Response | DFIR | DFIR Step-by-Step Process | DFIR 101 | DFIR
20:02
CISSP | Domain1.2.1 | Confidentiality, Integrity, Availability, Authenticity, Non-repudiation| CIA
35:31
Azure Interview Questions and Answers| Part 1 | Azure Scenario-Based Interview Questions and Answers
06:24
CCSP | Cloud Computing Roles and Responsibilities | CCSP Full Course | CCSP Training | ISC2 CCSP
43:20
IT Audit Interview Questions and Answers | Part 2 | IT Auditing | IT Auditors | Internal IT Audit
26:43
Digital Certificates | Step-by-step process of Digital Certificate| Digital Certificates Explained