Channel Avatar

Cyber Security Entertainment @UCA88P8LVa18fjOarJkeNVvQ@youtube.com

4K subscribers - no pronouns :c

The purpose of this channel is to share Information Security


05:13
IoCs & IoAs
05:42
STIX and TAXII - Cyber Threat Intelligence
06:01
Dynamic Web Application Security Testing (DAST)
14:25
Firewall Deployment - Security Zone, Security Policy, Address Book, RVI, VLAN, Subnet, App Traffic
12:21
MITRE ATT&CK
01:38
Zoombombing Attack on Video conferencing platforms
22:22
Evolution of WLAN Security
03:50
Cyber Risk Management Terminologies
05:31
DHCP Snooping
05:41
Enticement vs Entrapment
06:13
Services of SIEM
12:59
Cryptographic Key Management Practices
05:54
Process for Attack Simulation & Threat Analysis (PASTA)
08:04
Functions & Types of Cloud Access Security Broker (CASB)
08:19
Phases of Data Loss/ Leakage Prevention (DLP)
11:51
Protection for Intellectual Property
24:01
NIST CyberSecurity Framework (CSF)
06:09
Supply Chain Security Guidance - UK National Cyber Security Center
05:12
Privacy by Design (PbD)
05:21
Limitations of CIA Triad
03:29
Just in Time (JIT) Access
12:26
SOC Functions by SANS
14:55
6 x Access Control Models (RBAC, RuBAC, MAC, DAC, ABAC, Risk BAC)
14:20
NIST Security Recommendations for Server-based Hypervisor Platforms (NIST SP 800-125A )
03:51
Lockheed Martin's Cyber Kill Chain
04:19
Virtual Patching (External Patching, Just-in-Time Patching)
05:04
Breach Attack Simulation (BAS)
03:59
Same-Origin Policy (SOP)
04:02
Broken Object Level Authorization (BOLA)
08:47
Software Assurance Maturity Model (SAMM)
11:16
Software defined Security (SDS / SDSec)
07:30
Risk Treatment / Risk Response
03:01
RTO, RPO, MTD - Disaster Recovery Metrics
06:07
Whitelisting & Blacklisting
03:42
DevSecOps
09:28
Digital Forensics Procedures
08:10
Audit Program for Software Development
06:02
Types of Cyber Investigation Techniques
08:42
Type of Information security Documents
14:21
Types of Application Security Testing
12:56
Cyber Threat Intelligence (CTI)
13:40
Media Sanitization
14:53
Cyber Security Controls Selection and Implementation
09:49
Data Roles
04:04
Evaluation of Cyber Security Awareness Program
04:09
Timing Attack (Side Channel Attack)
06:43
Cyber Asset Attack Surface Management (CAASM)
28:08
CIS Critical Security Controls
04:04
Misuse Case Testing
12:08
VXLAN Concepts and Architecture
03:50
Interface Testing
02:59
Test Coverage Analysis
01:48
Vulnerability Scan - Mitigating DoS Effects
01:31
Li-Fi
03:02
Overview of PKI Services
11:10
Intro to Zero Trust Architecture (ZTA)
04:24
Cloud Access Security Broker (CASB)
01:53
Security Information & Event Management (SIEM)
05:52
User & Entity Behavior Analytics (UEBA)
15:30
Security of MicroServices