274 тысяч подписчиков
580 видео
Information Security Business continuity planning Checklist| ISO 27001 BCP Checklist| ISMS checklist
(IN) SECURITY POLICY | Cyber security Policy| ISMS Policy | IT Security Policy, ISO 27001, infosec
What is Routing | IP Routing process step by step | Routing protocols | Router table| Static routing
Version Control |Version |Subversion |svn tutorial | version control system | data version control
Cloud Data Protection| Cloud Security checklist | secure cloud migration | Secure cloud computing
Software Security checklist |Application Security| Web security audit |Security in SDLC | infosec
ISO 27001 Audit Checklist - ISO 27001 checklist - ISO 27001 assessment questionnaire, ISM Checklist
IT Security| IT Audit| IT security audit Checklist | IT risk audit | Information system audit
ISO 27001 clause 10.2 - ISMS Continual improvement -ISO 27001 audit checklist | information security
ISO 27001 Clause 10.1 | ISO 27001 Nonconformity and corrective action | iso 27001 audit checklist
ISO 27001 clause 9.3 Checklist - ISMS Management review - MRM - information security checklist, 27K
ISO 27001 Clause 9.2 - ISO 27001 internal audit checklist - ISO 27001 audit checklist - ISMS
Set your ISMS Context correctly | ISO 27001 Context of the organization audit Checklist
Client Server - Client Server Model - client server architecture - what is web server
Cloud Security Audit | Cloud Computing Security | Cloud Security Checklist | Cloud Audit Checklist
Online ISO Training - Vital Inputs | ISO Training | ISO courses | Online ISO Courses
Firewall Security Audit Checklist | Network Firewall Security Checklist | Firewall Device Security
Modem - What is a modem | How Does Modem work | modulation | modulator | what is modem
DNS TUNNELING | Data Exfiltration with DNS TUNNELING | Advanced Persistent Threat | cyber threats
Bridge Network function| What is a Network Bridge | Bridge in Networking |Spanning tree |Bridge uses
Network Security Checklist | Network Audit | Network Security Audit | Network Security Assessment
How to Write INFORMATION SECURITY POLICY | What is information security policy | IT security policy
Database - Prime, Non prime attributes - Partial, Full, Transitive Functional Dependency | DBMS
What does IT Security Checklist include? | IT audit checklist | Information System Audit Checklist
VLAN Explained | what is VLAN | VLANs | VLAN tagging | VLAN configuration| VLAN Switch | Vlan Trunk
ISO 27001 Checklists | ISO 27001 Requirements | ISO 27001 audit Checklists for all clauses
Balanced Scorecard | Strategy maps | Performance Management | Performance evaluation | kpi
ISO 27001 Clause 6.2 Checklist | ISMS objectives Checklist | ISO 27001 audit checklist | infosec
How to use Filezilla FTP - How to Download Filezilla FTP | how to setup FileZilla FTP | ftp server
How DNS works - DNS LOOKUP | DNS forward Look up explained STEP BY STEP with EXAMPLES | domain name
Nmap demo - Network mapper - Nmap port scan - port scanner - Nmap tutorial - how to use Nmap
Networking tutorial for beginners | Computer Networking Fundamentals | Networking History
DATA LINK LAYER in OSI Model | Data Link Layer Protocol | Data Link Layer Tutorial | Networking
DBMS - STRONG entity Vs WEAK entity | Difference between Strong Entity and Weak Entity | database
ISO 27001 Clause 7.4 audit - ISMS Communication checklist - ISO 27001 audit checklist, ISMS audit
DBMS - Data WAREHOUSE Concepts | Business intelligence |Data warehousing|Data warehouse architecture
SNMP Protocol | SNMP Tutorial | UDP | network monitoring tools | network protocols
Advanced Persistent Threats [ FUNDAMENTALS & MITIGATION ] | advanced threat protection | Infosec
Termination !? No More | ISO 27001 Resources, Competence & Awareness audit Checklist - Vital Inputs
PHISHING Attacks | What is Phishing | Types of Phishing | How to Prevent Phishing | Phishing example
Application Layer explained | Application Layer Tutorial |Application layer Protocols | OSI model
LINUX from Scratch | What is Linux distro |What is Linux Operating System| Linux file system| Kernel
Nightmare of Not Doing enough for Database Security! | Database Server Security Audit Checklist
Presentation Layer of OSI model | Presentation Layer explained | Presentation Layer Tutorial
COMPILER| INTERPRETER |Difference between Interpreter and Compiler| Interpreter vs Compiler Animated
Major Sources Of Risk In Construction |Construction Industry major Safety Issues |Construction risks
How to change default search engine in Mozilla Firefox|How to change default search engine firefox
Network Configuration - LAN WAN configuration| network address translation| DHCP | MAC Address| CCNA
Application Security Checklist - App Security - Application Security Audit Checklist | What, How why
Database Attributes | Types of Attributes | Classification of Attributes | Categories of Attributes
STEGANOGRAPHY Practical | Steganography examples | Steganography Techniques | Cyber Threats
Central processing Unit | What is CPU | How CPU works | Animation
How Firewall Works | Types of Firewall | Firewall Performance| Firewall Positioning |Firewall Tuning
How computer works | What is Programming |Computer Fundamentals | coding
Relational Database - MANY to MANY Relationship | Many to Many | many to many relationship in DBMS
SCANNING Network Perimeter Security | Network security | Firewall Basics - endpoint security
Website Security - Vital Inputs | Website Security Audit | Website Security Checklist
MAC ADDRESS | What is MAC Address | How to Find MAC Address | MAC address cmd | MAC addressing
Database keys - Find keys in DBMS | Find Keys in Database | DBMS keys | database management system
What is FTP - File Transfer Protocol | How to use ftp | FTP Tutorial | FileZilla | ftp server
Major Risks in Information Security | ISO 27001 Risk Management audit Checklist - Vital Inputs