Channel Avatar

CCSP Certified @UCDxATJ-iTKl10RCw1viZQ_g@youtube.com

496 subscribers - no pronouns :c

My purpose behind establishing this channel is to provide co


14:11
Lecture 54: OWASP 10 | XXE | Insecure Deserialization| Broken Access Control | CCSP Exam Questions
15:03
Lecture 53: OWASP Part-3 | Security Misconfiguration | Insufficient Logging | CCSP | Exam Questions
13:08
Lecture 52: OWASP Part-2 | Top 10 | Web Vulnerabilities | XSS | CCSP | CISSP | Exam Questions
11:25
Lecture 51: OWASP | Web Vulnerabilities | Top 10| SQL Injection| CCSP | CISSP | Exam Questions
13:09
Lecture 50: Threat Modeling | PASTA | ATASM | CCSP | CISSP | Exam Questions
15:13
Lecture 49: Threat Modeling | STRIDE | DREAD | CCSP | CISSP | Exam Questions
15:13
Lecture 48: SDLC Process | DevOps | Agile | CI-CD | DevSecOps | CCSP | CISSP | Exam Questions
12:52
Lecture 47: Log Management and importance of SIEM System | CCSP | CISSP | Exam Questions
14:41
Lecture 46: How Does Tokenization Work | Introduction to Tokenization | Data Security Strategy |CCSP
19:34
lecture 45 - Data Security Strategies | Masking, Obfuscation, Anonymization, Pseudonymization | CCSP
18:16
lecture 44 - Data Discovery Techniques | Metadata, Labels, Content Analysis | Big Data | CCSP | ISC2
14:21
Lecture 43 - The 6 Phases of Data Security | Cloud data lifecycle | CSUSAD | DATUM | ISC2 CCSP
18:27
Lecture 42 - Difference between SOAP and Rest Web Services | XML | API | Stateless | CCSP | CISSP
23:14
Lecture 41 - Learn about Securing DNS Against Threats using DNSSEC | CCSP | CISSP | Exam questions
11:55
Lecture 40 - CSA STAR - Security, Trust, Assurance, and Risk Program
15:24
Lecture 39 - How does the USA do business with the EU? Learn Safe Harbor & Privacy Shield agreement
19:40
Lecture 38 - Remaining USA LAWS - SCA, CCPA and Cloud Act along with ISO 27018 and imp mapping table
21:13
Lecture 37 - Three Very Imp US LAWS - FedRAMP, FIMSA and HIPPA(HITECH) and CCSP CISSP exam questions
20:23
Lecture 36 - Learn about USA Laws on Computer Crime, PII and Privacy Laws related to CCSP and CISSP
17:18
Lecture 35 - Type of Evidences, Evidence Management and associated legal terms part of CCSP & CISSP
21:42
Lecture 34- Intellectual Property Rights, Digital Millennium, Espionage act and safeguard mechanisms
01:17:53
Domain-1-Class-5-Recording - Learn about key management, IAM, SSO and federation(SAML, OAuth, OIDC)
14:35
Lecture 33 - Civil, Criminal and Common laws, Preponderance and Beyond a reasonable doubt evidences
01:04:04
Domain-1-Class-4-Recording Cryptography advance concepts, TLS, PKI, Digital signature n certificate
20:57
Lecture 32 - GDPR, the EU's new data privacy law, key principles and CCSP exam related understanding
19:26
Lecture 31 - Different type of SOC reports and SAS70, SSAE -16 and SSAE -18 Engagements
16:21
Lecture 30 - Audit steps, Cloud Audit Challenges and Evolution of Audit metrologies
19:39
Lecture 29 - Digital forensic - Cloud Forensics, Chain of custody, Forensic steps and Best Practices
18:37
Lecture 28- What is eDiscovery and litigation hold? How to Conduct eDiscovery Investigation in Cloud
24:28
Lecture 27 - Legal, Compliance and Governance Risks and Safeguarding Mechanisms in Cloud
18:12
Lecture 26 - Implications of Weak IAM Systems and PAM Accounts
17:43
Lecture 25 - Top three risks in the cloud - Malicious Insider, Management Plan, Insecure APIs
15:51
Lecture 24 - Vendor lock in, Vendor Lock-Out, Different type of vendors and vendor specific risks
22:53
Lecture 23- Top 3 data risks in Cloud - Data Breach, Data loss and Ineffective Data Deletion
09:33
CCSP Exam Overview and New Promotional Offer - June
17:34
Lecture 22 - Virtualization risks - Guest Escape, Side Channel, VM Sprawl and Hypervisor attack
17:29
Lecture 21- What Is Virtualization? Difference between Container and Virtualization.
19:06
Lecture 20 - Data Dispersion in Cloud - secure way to replicate data.
21:33
Lecture 19 - What Is BCDR - Business Continuity and Disaster Recover and Difference between RPO RTO?
18:48
Lecture 18- Difference between Limits, Reservation and Share?
18:16
Lecture 17 - Cloud Basics - What Is the Cloud? Define Cloud Characteristics.
20:55
Lecture 16- Cloud Service Models. Difference between Iaas, Paas and Saas.
19:55
Lecture 15- Cloud Deployment Models - Different between Public, Private, Hybrid, Community Cloud
01:01:17
Domain-3-Class-4-Recording
12:15
Lecture 14- What is cloud access security broker(CASB)? Role of CASB and LDAP in IAAA.
01:14:17
Domain-2-Class-5-Recording
15:01
Lecture 13 - What is Authorization? How to ensure accountability?
01:08:13
Domain-2-Class-1-Recording
01:03:44
Domain-1-Class-3-Recording
03:31
Peace of Mind - New March Batches
01:20:50
Domain-1-Class-2-Recording
01:18:47
Domain-1-Class-1-recording
14:28
Lecture 12 - What is Federation and role of SAML, OAUTH, OIDC protocols?
14:21
Lecture 11 - What is Authentication and single sign on(SSO)?
03:49
new batches - ccsp
18:03
Lecture 10 - Identity and Access Management concepts - IDaaS
15:17
Lecture 9 - Uses of cryptography
19:00
Lecture 8 - Key Management concepts and questions
14:08
Lecture 7 - TLS Exam questions
11:24
Lecture 6 - TLS Handshake and record steps