- 122
- 542 110
KamilSec
United States
Приєднався 1 лис 2019
This channel is dedicated to a hands-on exploration of RMF/Cyber and IT Security, catering to students, employees, and cyber enthusiasts. It emphasizes fundamental concepts in IT and IT Security, with a particular focus on practical aspects of US FISMA, NIST, RMF, and FedRAMP.
Mohammed Kamil Zakari
MSc.IT, CISSP, CISM, CISA, CEH, CDPSE, AWS CDA, AWS SAP, eJPT
I CONDUCT INDIVIDUALIZED RESUME AND INTERVIEW PREP SESSIONS, and On Demand Interview Prep Videos for IT Sec Analyst/ISSO and SCA available as well. Reach out.
Help grow the channel below: By subscribing and liking the videos, Thank you.
Patreon Channel Support
www.patreon.com/kamilSec?fan_landing=true
Order your KamilSec (KS) Designs Merch
kamilsec.creator-spring.com/
- CashApp: $Kamilzak
- Zelle: kaamilzak@gmail.com
- Paypal: paypal.me/MZakari
Thank You
Connect:
Twitter: Kamilzak_1
Instagram: @Kamilzak1
E-mail: Kaamilzak@gmail.com
Mohammed Kamil Zakari
MSc.IT, CISSP, CISM, CISA, CEH, CDPSE, AWS CDA, AWS SAP, eJPT
I CONDUCT INDIVIDUALIZED RESUME AND INTERVIEW PREP SESSIONS, and On Demand Interview Prep Videos for IT Sec Analyst/ISSO and SCA available as well. Reach out.
Help grow the channel below: By subscribing and liking the videos, Thank you.
Patreon Channel Support
www.patreon.com/kamilSec?fan_landing=true
Order your KamilSec (KS) Designs Merch
kamilsec.creator-spring.com/
- CashApp: $Kamilzak
- Zelle: kaamilzak@gmail.com
- Paypal: paypal.me/MZakari
Thank You
Connect:
Twitter: Kamilzak_1
Instagram: @Kamilzak1
E-mail: Kaamilzak@gmail.com
Відео
Essential Guide to Managing Hardware and Software Inventory
Переглядів 622 дні тому
Learn how to effectively track and update your hardware and software inventory in this informative video. Discover the importance of maintaining accurate records for service changes, upgrades, and new introductions to enhance your system's efficiency! #HardwareManagement #SoftwareInventory #ITInfrastructure #SystemUpdates #TechMaintenance #NetworkUpgrades #InventoryTracking #InformationTechnolo...
Understanding SSP: Key Interconnections and Compliance Overview
Переглядів 462 дні тому
Explore how information sharing occurs within and outside your agency in relation to the SSP. Discover essential details about the categorization of data, applicable laws, and the crucial security controls required for compliance. Stay informed and ensure all documentation is complete! #SSP #InformationSecurity #DataCompliance #SecurityControls #SystemInterconnections #DataManagement #FSMA #OMB...
Ensure Stakeholders' Contact Info is Always Accurate
Переглядів 252 дні тому
In this video, we emphasize the importance of maintaining up-to-date contact information for all stakeholders within the SSP. Discover best practices for tracking changes and ensure your system remains a reliable source of information throughout the year. #StakeholderManagement #ContactInformation #SSPUpdates #DataAccuracy #SystemDevelopment #LifecycleSupport #ProjectManagement #InformationUpda...
Episode 9: Configuration Management Plan (CM-9 Explained) | KamilSec
Переглядів 2885 днів тому
Episode 9: Configuration Management Plan (CM-9 Explained) | KamilSec Welcome to Episode 9 of KamilSec! In this episode, we dive deep into Configuration Management Plan (CM-9) and its significance in maintaining secure and compliant IT systems. Configuration Management Plan, or CM-9, is a crucial element in cybersecurity frameworks. This episode covers: 🔹 What is CM-9? - An introduction to Confi...
Maximizing IT Security: The Role of Separation of Duties
Переглядів 8615 днів тому
Discover the vital control requirement of separation of duties in IT security management. Learn how to identify and document individual duties for optimal protection against potential threats. Find out how to implement effective separation of duty metrics and prevent unauthorized access and damage. #ITSecurity #SeparationOfDuties #SecurityManagement #DataProtection #ThreatPrevention #AccessCont...
The Importance of Separation of Duties in Effective Internal Control
Переглядів 3315 днів тому
Discover why separation of duties is crucial for effective internal control to prevent errors and inappropriate actions. Learn how these controls protect against abuse and ensure a robust system. #InternalControl #SeparationOfDuties #RiskReduction #ErrorPrevention #InappropriateActions #ControlSystem #FinancialSecurity #FinancialManagement #AccountPayables #PaymentAuthorization
Maximizing Internal Control: Key Strategies for Effective Separation of Duties
Переглядів 18815 днів тому
Discover the crucial role of separation of duties in maintaining strong internal control systems. Learn how this practice minimizes the risk of errors and inappropriate actions within organizations. Explore the control requirements outlined in the special publication for a comprehensive understanding of this essential concept. #InternalControl #SeparationOfDuties #RiskMitigation #ControlRequire...
Preventing Collusion and Misuse: Separation of Duty in Access Control
Переглядів 10115 днів тому
Learn how separation of duty in access control can prevent collusion and misuse, reducing the risk of malevolent activity. Discover how this control addresses the potential for unauthorized access and conniving by individuals with malicious intent. Find out why it's crucial for organizations to implement this control to protect against fraud and abuse. #SeparationOfDuty #AccessControl #FraudPre...
Maximizing Access Control: Key Strategies for Effective Security
Переглядів 6015 днів тому
Discover the top strategies for ensuring strong access control in your organization. From examining policies and plans to identifying crucial roles, we'll guide you through the essential steps. Don't miss out on this valuable advice for maintaining security and preventing unauthorized access. #AccessControl #SecurityStrategy #EffectiveProtection #DataSecurity #PolicyAndProcedure #SystemSecurity...
The Power of Separation of Duty: Mitigating Risks and Promoting Security
Переглядів 4515 днів тому
Learn about the importance and benefits of the separation of duty control in maintaining a secure environment. Discover how this control helps prevent misuse and abuse of authorized access, reducing the risk of malevolent activity. Understand how collaboration and collusion play a crucial role in achieving malicious intent, highlighting why this control is essential. #SeparationOfDuty #RiskMiti...
Reduce the Risk of Abuse with Separation of Duties: Best Practices and Strategies
Переглядів 2215 днів тому
Learn how separation of duties can help prevent unauthorized privileges abuse and mitigate the risk of malicious activity. Discover effective techniques for dividing mission and support functions, and ensuring system security by segregating access control and audit functions. Don't miss this informative video! #SeparationOfDuties #RiskMitigation #UnauthorizedPrivileges #SecurityBestPractices #A...
Discover the Ultimate Inventory Management System! 📦💻🌟
Переглядів 2115 днів тому
Uncover the importance of a comprehensive and up-to-date inventory in maintaining effective property accountability. Learn how accurate hardware and software details can transform your information system and streamline operations. Don't miss out on this essential tool for success! #InventoryManagement #PropertyAccountability #HardwareSoftware #InformationSystem #Efficiency #StreamlineOperations...
Maximizing Efficiency: The Ultimate Guide to Information System Component Management
Переглядів 6915 днів тому
Maintaining an accurate inventory of information system components is crucial for organizations. Discover how proper asset management, risk identification and management, configuration management, and change control contribute to effective information system component management. Additionally, learn how it supports incident response, recovery, and enhances security. #EfficiencyMaximization #Inf...
Mastering Configuration Management: Unleashing the Power of System Component Inventory
Переглядів 4315 днів тому
In this episode of our Configuration Management series, we delve deep into CMA, also known as System Component Inventory. Learn how to effectively create and maintain a detailed inventory of hardware, software, and firmware for your information systems. Don't miss out, hit the subscribe button and join our thriving community! #ConfigurationManagement #SystemComponentInventory #ITInfrastructure ...
The Importance of Avoiding Duplicate Software Instances
Переглядів 1315 днів тому
Learn why avoiding duplicate software instances is crucial for organizational efficiency. Discover how to properly count multiple instances of the same software across different platforms such as Jira and ServiceNow. Stay tuned for expert tips and insights. #SoftwareEfficiency #DuplicateInstances #OrganizationalProductivity #SoftwareManagement #JiraTips #ServiceNowIntegration #TechnologySolutio...
Thank you for this video Sir!! Before now, these concepts were so blur
Thanks again. Is this CM9 related to implementation stage in the RMF or just SDLC only?
CM9 is needed throughout the system development
Thank you always for your knowledge sir!
You are always welcome Ida....I really appreciate you!
👏🏾
You are the best. Do you provide classes?
Yes I do.....Kaamilzak@gmail.com
Thank you Sir. Best Video so far
Glad you liked it
Simple and straight forward. Nice SOD explanation.
Thanks!
U r boring
Thanks 🙏. Very interesting !
You are very welcome
Thank you sir 🎉
You are very welcome Ida!
Great!
Least functionality. Waoooo. First time hearing this. You are simply the best sir. Be blessed.
Thanks a ton!
So well explained! its beyond amazing!
Glad it was helpful!
Thank you sir for always sharing your knowledge. 🙌🏾🙌🏾
Thanks Ida!
Great! Thank you Sir!
Most welcome!
Thanks sir.
Most welcome
Thanks for sharing this, very helpful. If you have a broadcast IP with a port (192.168.x.x: 0000 whose state shows CLOSE_WAIT on the netstat -ano). What does that mean?
This means the remote server side connection socket is closed and waiting on the local connection socket to close.
THANK YOU!!!
You're welcome!
Hello I need help to complete some policy templates for class. its due in a few days. Can I hire you please?
I would have loved to, however my tight schedule will not allow me.
Another nice one. Thank you Sir
Very welcome
Thanks Kamil!
You are welcome!
Thank you Kamil . God bless you.
You are welcome, Ameen 🙏
Thanks boss. 🙏
You're very welcome
Thank you for this new video. Please, can you do more videos on privacy when have some time. Thank you
okay
How do say it if they ask you at the interview. I hope you teach that in the future
I do have some interview prep videos for sale via my Patreon page...Link in the video description.
Thanks again 🙌🏾🙌🏾🙌🏾
Any time!
Always happy to listen to you Kamil 🎊 🎉
You're the best!
Thank you so much brother
Always welcome
Very precise
Glad it was helpful!
My understanding was if a federal agency does the CSO FedRAMP Authorization then this security package cannot be reused by other agencies. The other agency must redo CSO FedRAMP Authorization review
They just need to request the package for their internal review, and that should suffice
If you know, you know ! Real mentor. Great job. 👏🏾 Thanks 🙏
Thanks!
Good information!
Thanks!
Awesome!
Thanks!
Hello Kamil, Thank you for your videos, they are great and well-explained. Please continue the series and cover the remaining controls. I look forward to your explanations!
Thank you, I will. The 9 to 5 pressure is a bit much
good job mate
Thanks!
Great explanation!! Should all (a) to (l) as well as enhancements be documented as part of the account management plan?
Yes, as long as it is part of the control requirements.
This is great. I was just asked this in my interview yesterday 💯 great content bro and God bless you for sharing the knowledge
Glad it was helpful!
I love this video bro. Some great training. Always loves supporting a brother 💯🇬🇭
Big up massive to my subscribers!
How we can make a good Dashboard once we are done with the analysis, please do video on that too
I believe you can leverage excel capabilities
U are an excellent teacher thankx alot forndoing whatbu do best
It's my pleasure
Your content is amazing KamilSec, on point about email header analysis. By the way, consider doing a video on FilterBounce. I can testify it beats the pants off of Debounce, NeverBounce, ZeroBounce and all others. Plus, with the monthly free verification, it gets even better.
Hey there KamilSec, love your content on email headers and shady links. Great stuff! Have you ever looked into FilterBounce? It is the real deal when it comes to email verification. Unlike some other tools, it actually gives you spot-on results, with a bounce rate less than 1%. You should give it a shot.
Great information!
Glad it was helpful!
Well done brotherly!!!
Thanks!
Excellent content and presentation. I'm using this to prepare for an upcoming SCA interview. Thank you so much brother!
Best of luck!
Very informative!
Glad it was helpful!
what if u find a stablished connection in cmd but the pid found in cmd doesnt show on task manager?
It should, sometimes you just have to expand the rows
Very insightful
Glad it was helpful!
Awesome, very clear and concise, just got an Isso position, is there a way I can contact you for further assistance ❤
kaamilzak@gmail.com
How do you get the CVE to wrap in the formula bar?
ALT + Enter