Channel Avatar

Gagan (Gags) Singh @UCVbiTxWGm6avj5ZLbJEyreg@youtube.com

669 subscribers

CISSP Practice Tests are launching in October 2025 at Learn


06:17
TACACS+ Explained | CISSP Domain 5 | 2025 Cybersecurity Concepts
07:37
RADIUS Explained | CISSP Domain 5 | 2025 Cybersecurity Concepts
05:09
Kerberoasting Explained Step by Step CISSP Domain 5 2025
06:01
Silver Ticket Detect and Mitigate Step by Step CISSP Domain 5 2025
06:52
Silver Ticket Attacks Explained Step by Step CISSP Domain 5 2025
05:46
Golden Ticket Detect and Mitigate Step by Step CISSP Domain 5 2025
06:51
Golden Ticket Attacks Explained Step by Step CISSP Domain 5 2025
08:58
Kerberos Explained Step by Step CISSP Domain 5 2025
05:29
Data Diode vs Firewall: Hardware vs Software Security Explained CISSP 2025 Cybersecurity Concepts
08:37
NIST Change Management Process: Essential CISSP 2025 Cybersecurity Controls CM-3 CM-4 CM-5 Explained
09:04
ISC2 CBK Change Management Process: Risk-Based CISSP 2025 Cybersecurity Framework Explained
07:20
OWASP SAMM v2.0 Explained: Application Security for CISSP 2025
09:58
ACID Properties: Database Security Fundamentals CISSP 2025 Cybersecurity Concepts Explained
12:34
SCAP: Security Content Automation Protocol - NIST Framework for Vulnerability Management CISSP 2025
07:54
Hypervisors Type 1 vs Type 2 and Virtualization Explained | Must-Know for CISSP Certification 2025
12:55
IAST Interactive Application Security Testing (SAST vs DAST vs IAST Comparison) CISSP Cybersecurity
12:02
Polyinstantiation: Preventing Unauthorized Inference | CISSP 2025 Cybersecurity Concepts Explained
10:25
SAST vs DAST: Application Security Testing Methodologies CISSP 2025 Cybersecurity Concepts Explained
14:48
Hot, Warm, and Cold Disaster Recovery Site Strategies: CISSP 2025 Cybersecurity Concepts Explained
08:30
RTO, WRT, MTD & RPO Disaster Recovery Metrics: Essential CISSP 2025 Cybersecurity Concepts Explained
10:20
Data Sanitization Methods for CISSP 2025: Clear, Purge, Destroy - Cybersecurity Essentials
10:12
SOC Reports for CISSP: Essential Knowledge for Passing in 2025
06:40
STRIDE Threat Model Explained: Essential Cybersecurity Concept You Must Know in 2025 for CISSP
04:54
Pre-Action vs Deluge: Fire Suppression Systems for CISSP Cybersecurity Certification 2025
07:43
Due Diligence vs Due Care: Cybersecurity Risk Management Concepts for CISSP Certification 2025
06:53
Gramm-Leach-Bliley Act (GLBA): Fundamentals Explained for CISSP 2025 Prep & Cybersecurity
06:12
Sarbanes-Oxley Act (SOX): Fundamentals Explained for CISSP 2025 Prep & Cybersecurity
13:39
Cybersecurity: Data Security Roles Domain 1 CISSP Exam 2025 A Complete Guide
07:07
The Five Rules of Digital Forensic Evidence CISSP Exam Prep for Cybersecurity Professionals
07:25
CISSP Security Operations: Legal Hold & Chain of Custody Explained for Cybersecurity Professionals
06:51
CISSP Quantitative Risk Assessment Formulas: A Step-by-Step Guide for Cybersecurity Professionals.
11:53
Time of Check Time of Use TOCTOU: A Critical Cybersecurity Vulnerability Explained
11:21
HSM Applications & Security Professional's Role Industry Use Cases Part 3
11:20
HSM Lifecycle & Implementation Best Practices Part 2
08:05
Hardware Security Modules HSMs Explained Fundamentals & Technical Capabilities Part 1
01:55
Cryptographic Key Period Explained in less than 2 minutes.
13:53
How I passed CISSP Exam
01:26
FIDO2 Explained in less than 2 minutes
03:10
Certification vs Accreditation: Key Concepts for CISSP