- 137
- 582 149
KamilSec
United States
Приєднався 1 лис 2019
This channel is dedicated to a hands-on exploration of RMF/Cyber and IT Security, catering to students, employees, and cyber enthusiasts. It emphasizes fundamental concepts in IT and IT Security, with a particular focus on practical aspects of US FISMA, NIST, RMF, and FedRAMP.
Mohammed Kamil Zakari
MSc.IT, CISSP, CISM, CISA, CEH, CDPSE, AWS CDA, AWS SAP, eJPT
I CONDUCT INDIVIDUALIZED RESUME AND INTERVIEW PREP SESSIONS, and On Demand Interview Prep Videos for IT Sec Analyst/ISSO and SCA available as well. Reach out.
Help grow the channel below: By subscribing and liking the videos, Thank you.
Patreon Channel Support
www.patreon.com/kamilSec?fan_landing=true
Order your KamilSec (KS) Designs Merch
kamilsec.creator-spring.com/
- CashApp: $Kamilzak
- Zelle: kaamilzak@gmail.com
- Paypal: paypal.me/MZakari
Thank You
Connect:
Twitter: Kamilzak_1
Instagram: @Kamilzak1
E-mail: Kaamilzak@gmail.com
Mohammed Kamil Zakari
MSc.IT, CISSP, CISM, CISA, CEH, CDPSE, AWS CDA, AWS SAP, eJPT
I CONDUCT INDIVIDUALIZED RESUME AND INTERVIEW PREP SESSIONS, and On Demand Interview Prep Videos for IT Sec Analyst/ISSO and SCA available as well. Reach out.
Help grow the channel below: By subscribing and liking the videos, Thank you.
Patreon Channel Support
www.patreon.com/kamilSec?fan_landing=true
Order your KamilSec (KS) Designs Merch
kamilsec.creator-spring.com/
- CashApp: $Kamilzak
- Zelle: kaamilzak@gmail.com
- Paypal: paypal.me/MZakari
Thank You
Connect:
Twitter: Kamilzak_1
Instagram: @Kamilzak1
E-mail: Kaamilzak@gmail.com
Mastering Weekly ISSO Activities for Success!
The video discusses the importance of attending weekly ISSO meetings and reviewing audit logs for system updates and abnormalities.
Переглядів: 247
Відео
Mastering Continuous Monitoring: ISSO's Essential Practices
Переглядів 1583 місяці тому
The video discusses the continuous monitoring and documentation processes carried out by ISSO, along with their weekly activities in system updates and audits.
Avoiding Privilege Creep: Key ISSO Responsibilities Explained!
Переглядів 1153 місяці тому
The video discusses the responsibilities of an ISSO during the annual review cycle, emphasizing the importance of validating user access and avoiding privilege creep.
Secrets to Succeed as an ISSO Unveiled!
Переглядів 1113 місяці тому
The video discusses essential knowledge and relationships needed for an ISSO to ensure system security and support the organization's mission.
Essential Tips for Accurate System Maintenance Contact Management
Переглядів 854 місяці тому
Learn how to ensure your system maintenance contacts are up-to-date. This video covers the importance of verifying contact details for patch management leads and the best practices for collaborating with system owners and stakeholders. Stay organized for effective system management! #SystemMaintenance #ITManagement #PatchManagement #ContactManagement #TechTips #SystemOwner #StakeholderEngagemen...
Ensuring Accurate Control Implementation: Verify Your Tools!
Переглядів 684 місяці тому
Learn how to verify implementation statements for accuracy by checking the tools and software referenced within your control measures. This video guides you through the steps necessary to ensure all technical controls are up-to-date and effective. #ControlImplementation #VerificationProcess #TechTools #SoftwareManagement #OperationalControls #SystemSecurity #DataIntegrity #ComplianceChecklist #...
Ensuring Accurate Control Implementation: Verify Your Tools!
Переглядів 624 місяці тому
Learn how to verify implementation statements for accuracy by checking the tools and software referenced within your control measures. This video guides you through the steps necessary to ensure all technical controls are up-to-date and effective. #ControlImplementation #VerificationProcess #TechTools #SoftwareManagement #OperationalControls #SystemSecurity #DataIntegrity #ComplianceChecklist #...
Mastering Hardware and Software Inventory Management
Переглядів 954 місяці тому
Learn how to effectively review and update your hardware and software inventory in the Dynamo system. This video guides you through essential steps to ensure your system remains efficient and up-to-date. Don’t miss our tips for maintaining accurate records! #InventoryManagement #DynamoSystem #SoftwareUpdates #HardwareReview #MicrosoftSQL #Virtualization #DatabaseManagement #SystemEfficiency #Te...
Ensuring Accurate Implementation Statements for Tools and Controls
Переглядів 554 місяці тому
Learn how to verify the accuracy of implementation statements related to tools and controls. This video covers essential checks for version consistency, approval processes, and management controls to maintain compliance. Stay current and informed! #ImplementationStatements #ManagementControls #ToolVerification #Compliance #ChangeManagement #AccountAuthorization #ProcessChecks #OperationalExcell...
Overview of the FedRAMP 800-53 Rev 5 New Test Case
Переглядів 3844 місяці тому
In this video, we reviewed the new FedRAMP test cases for rev 5 used by the 3PAO control assessors. We reviewed the changes and modifications to the test case template as compare to the rev 4 test case template. Whether you are an IT professional, cybersecurity enthusiast, FedRAMP 3PAO, FedRAMP Advisor or compliance officer, this video will provide you with the knowledge of the 800-53 Rev 5 Fed...
Essential Guide to Managing Hardware and Software Inventory
Переглядів 1074 місяці тому
Essential Guide to Managing Hardware and Software Inventory
Understanding SSP: Key Interconnections and Compliance Overview
Переглядів 1234 місяці тому
Understanding SSP: Key Interconnections and Compliance Overview
Ensure Stakeholders' Contact Info is Always Accurate
Переглядів 544 місяці тому
Ensure Stakeholders' Contact Info is Always Accurate
Episode 9: Configuration Management Plan (CM-9 Explained) | KamilSec
Переглядів 5195 місяців тому
Episode 9: Configuration Management Plan (CM-9 Explained) | KamilSec
Maximizing IT Security: The Role of Separation of Duties
Переглядів 1055 місяців тому
Maximizing IT Security: The Role of Separation of Duties
Maximizing Access Control: Key Strategies for Effective Security
Переглядів 805 місяців тому
Maximizing Access Control: Key Strategies for Effective Security
Unlocking the Secrets of Effective Plugin Management
Переглядів 2195 місяців тому
Unlocking the Secrets of Effective Plugin Management
How to Filter and Prioritize Vulnerabilities for Maximum Security : KamilSec
Переглядів 2035 місяців тому
How to Filter and Prioritize Vulnerabilities for Maximum Security : KamilSec
Analyzing Network Vulnerabilities: A Step-by-Step Guide for Effective Scanning
Переглядів 2365 місяців тому
Analyzing Network Vulnerabilities: A Step-by-Step Guide for Effective Scanning
Secrets to Effective Vulnerability Scanning: Boost Your Security! KmilSec
Переглядів 1885 місяців тому
Secrets to Effective Vulnerability Scanning: Boost Your Security! KmilSec
Streamline Your Monthly Scans: Organizing and Analyzing Data Efficiently
Переглядів 3095 місяців тому
Streamline Your Monthly Scans: Organizing and Analyzing Data Efficiently
Mastering Vulnerability Scan Analysis in Excel: Step-by-Step Guide: KamilSec
Переглядів 3855 місяців тому
Mastering Vulnerability Scan Analysis in Excel: Step-by-Step Guide: KamilSec
Top Vulnerability Scans: Identifying and Tracking System Weaknesses
Переглядів 2495 місяців тому
Top Vulnerability Scans: Identifying and Tracking System Weaknesses
Maximizing Vulnerability Analysis: Streamlining Insights for Efficient Assessment
Переглядів 2185 місяців тому
Maximizing Vulnerability Analysis: Streamlining Insights for Efficient Assessment
Episode 8: System Component Inventory (CM-8 Explained) | KamilSec
Переглядів 4595 місяців тому
Episode 8: System Component Inventory (CM-8 Explained) | KamilSec
Episode 7 Least Functionality (CM-7): KamilSec
Переглядів 8645 місяців тому
Episode 7 Least Functionality (CM-7): KamilSec
Episode 6 Configuration Settings (CM-6)
Переглядів 8645 місяців тому
Episode 6 Configuration Settings (CM-6)
Episode 5 Access Restriction For Change (CM-5)
Переглядів 3726 місяців тому
Episode 5 Access Restriction For Change (CM-5)
Episode 3 Configuration Change Control (CM-3)
Переглядів 3126 місяців тому
Episode 3 Configuration Change Control (CM-3)
Hi I noticed your UA-cam channel has great potential, and I can help it reach a larger audience! As a UA-cam SEO expert. I offer services like keyword optimization ,video SEO, and audience growth stages to boost your visibility and engagement. if you'd like to learn how I can help you Channel growth, Let's chat!
Hey Kamil, do you do one on one training?
What documents are needed to pass CM-2?
Great one.
Like Like Like
Kamil, please what sampling tool will you recommend to use during Testing AC-2(d)(1) during assessment . Thank you and hope to hear from you.
Try: randomizer.org/
I didn’t receive any email in my inbox
It should wok....
Can you please tell me what the private key is? Is it the same as the password?
No, private is not the same as the password. It is a secret key used in Encryption
Hi Kamil so an organization cannot self certify for CMMC?
Hi Ida, No an organization cannot self certify for CMMC
Hello Sir do you have any on going classes ?
Yes, I do have a GRC Cybersecurity currently in session. RMF session might be after the holidays
That's very good content ❤❤
Very informative
👌
Good day, during categorization, when you set up a meeting with the stakeholders, what questions will you ask the system owner to know the type of information type to choose from the nist.
Ask about the system descriptions, purpose of the system and the what information would the system process?
Great info! Where’d you get the template for the SSP?
Every organization has a template for SSP or you can leverage the NIST SP 800-18
Nice video
Great content
Great video
Is there a way to automate this from data in ServiceNOW?
Partially, but human input would still be needed.
did you have anything that discusses the CUI portion of the categorization?
No, I do not
Is there not a way to do this for free?...I need to send 1 email from an email account that does not have a mailbox setup.
Not sure if there is..
Miller Richard Johnson Steven Anderson Maria
Wow, encrypting emails with PGP Mailvelope sounds like a game-changer for confidentiality. As someone who values privacy, I'm always on the lookout for tools that can enhance digital security.
I am glad this helps
🎉
Hi, I am freelancer Or UA-cam SEO Experts. There are many problems with your videos due to which your videos are not uploading properly. Due to which your video is not getting views. So if you want I can solve your problems for free
Hi, when is your next training schedule?
please email kaamilzak@gmail.com
Thanks boss
Thanks. Well explained and helpful.
Thank you 🙏
You’re welcome
Thank you for all you do!!! May God bless you
You are so welcome, Ameen!
I love this very insightful
Glad it was helpful!
Thank you for this video Sir!! Before now, these concepts were so blur
You are very welcome
Thanks again. Is this CM9 related to implementation stage in the RMF or just SDLC only?
CM9 is needed throughout the system development
Thank you always for your knowledge sir!
You are always welcome Ida....I really appreciate you!
👏🏾
You are the best. Do you provide classes?
Yes I do.....Kaamilzak@gmail.com
Thank you Sir. Best Video so far
Glad you liked it
Simple and straight forward. Nice SOD explanation.
Thanks!
U r boring
Thanks 🙏. Very interesting !
You are very welcome
Thank you sir 🎉
You are very welcome Ida!
Great!
Least functionality. Waoooo. First time hearing this. You are simply the best sir. Be blessed.
Thanks a ton!
So well explained! its beyond amazing!
Glad it was helpful!
Thank you sir for always sharing your knowledge. 🙌🏾🙌🏾
Thanks Ida!
Great! Thank you Sir!
Most welcome!
Thanks sir.
Most welcome
Thanks for sharing this, very helpful. If you have a broadcast IP with a port (192.168.x.x: 0000 whose state shows CLOSE_WAIT on the netstat -ano). What does that mean?
This means the remote server side connection socket is closed and waiting on the local connection socket to close.
THANK YOU!!!
You're welcome!
Hello I need help to complete some policy templates for class. its due in a few days. Can I hire you please?
I would have loved to, however my tight schedule will not allow me.