InfoSec Guardians
InfoSec Guardians
  • 52
  • 67 340
🌐 OSI Model Explained: 7 Layers, Attack Types, Firewalls & TCP/IP Layers
In this comprehensive video, we break down the OSI Model and explore its 7 layers-Physical, Data Link, Network, Transport, Session, Presentation, and Application. But that’s not all! We also dive into:
Common Attack Types: Learn how different types of attacks target specific OSI layers.
Firewall Functions: Discover how firewalls interact with the OSI layers to protect your network.
TCP/IP Layers: Understand the relationship between the OSI Model and the TCP/IP protocol suite.
What you’ll learn:
Detailed explanation of each OSI layer and its role
How attacks exploit vulnerabilities at each layer
How firewalls safeguard against threats and manage network traffic
The connection between OSI and TCP/IP layers
Whether you’re a networking professional or just curious about network security, this video is packed with essential information. Don’t forget to like, share, and subscribe, and hit the notification bell to stay updated with our latest content!
Stay informed and let’s dive into the OSI Model! 🚀
🌐 Follow us on Twitter: InfoScGuardian
📷 Follow us on Instagram: infosecguardians👍 Like us on Facebook: groups/623146913044461
🌐 Linkedin: www.linkedin.com/company/infosecguardians
🌐 Join Telegram Channel: t.me/CisspInfosecGuardians
#Cybersecurity #Malware #InfoSecGuardians #CyberThreats #OnlineSafety #DigitalSecurity #CyberAwareness #MalwareProtection #CyberDefense #Infosec #SecurityTips #StaySafeOnline #MalwareThreats#OSIMode #Networking #Cybersecurity #Firewalls #TCPIP #InfoSecGuardians #NetworkSecurity #TechExplained
Переглядів: 537

Відео

⚠️ Top Malware Threats You Need to Know
Переглядів 788Місяць тому
In this video, we cover common malware types, how they work, and tips to protect yourself. Stay ahead of cyber threats! In the Video 00:02 - Intro 00:40 - What is Malware 01:25 - Virus 02:12 - Worm 02:52 - Trojan 03:34 - Malware 04:15 - Ransomware 04:57 - Adware 05:35 - Spyware 06:13 - RootKit 06:48 - BotNet 07:47 - Comparison Table 🌐 Follow us on Twitter: InfoScGuardian 📷 Follow us...
Mastering ISC2 CC Domain 4: Network Security - Concepts & Practice Questions
Переглядів 2,3 тис.2 місяці тому
In this video, we dive into Domain 4 of the ISC2 Certified in Cybersecurity exam, focusing on Secure Network Architecture concepts. CC Domain 1 - ua-cam.com/video/6mG7q0jIW3w/v-deo.html CC Domain 2 - ua-cam.com/video/p7XJZITLlQY/v-deo.html CC Domain 3 - ua-cam.com/video/dO-4QSs2Hrs/v-deo.html 🌐 Follow us on Twitter: InfoScGuardian 📷 Follow us on Instagram: infosecguard...
Mastering ISC2 CC Domain 3: Access Control (DAC, MAC, RBAC)- Concepts & Practice Questions
Переглядів 1,7 тис.2 місяці тому
In this video, we dive into Domain 3 of the ISC2 Certified in Cybersecurity exam, focusing on Access Control Concepts (DAC, MAC, RBAC) concepts. CC Domain 1 - ua-cam.com/video/6mG7q0jIW3w/v-deo.html CC Domain 2 - ua-cam.com/video/p7XJZITLlQY/v-deo.html 🌐 Follow us on Twitter: InfoScGuardian 📷 Follow us on Instagram: infosecguardians👍 Like us on Facebook: g...
CISSP HARD Questions - Part 1: Domain 1, 2, & 3.
Переглядів 2,8 тис.2 місяці тому
Welcome to Part 1 of our CISSP Exam Practice Questions series! In this video, we tackle three essential domains to help you prepare for the CISSP certification: Domain 1: Security and Risk Management - Understand the foundational concepts of security policies, risk management, and compliance. Domain 2: Asset Security - Learn about protecting information and assets, data classification, and priv...
CISM Practice Questions: Domain 1
Переглядів 8315 місяців тому
Welcome to our CISM Domain 1 practice questions video! Test your understanding of the process of auditing information systems with our challenging questions. Each question is followed by a detailed explanation to help you grasp the concepts. Like, share, and subscribe for more CISM exam tips and practice questions! @InfoSecGuardians 🌐 Follow us on Twitter: InfoScGuardian 📷 Follow us...
Mastering ISC2 CC Domain 2: BC, DR & IR - Concepts & Practice Questions
Переглядів 3,7 тис.6 місяців тому
In this video, we dive into Domain 2 of the ISC2 Certified in Cybersecurity exam, focusing on Business Continuity (BC), Disaster Recovery (DR), and Incident Response concepts. CC Domain 1 - ua-cam.com/video/6mG7q0jIW3w/v-deo.html 🌐 Follow us on Twitter: InfoScGuardian 📷 Follow us on Instagram: infosecguardians👍 Like us on Facebook: groups/623146913044461 🌐...
Mastering ISC2 CC Domain 1: Security Principles - Concepts & Practice Questions
Переглядів 8 тис.6 місяців тому
In this video, we explore ISC2 CC Domain 1, covering key cybersecurity principles. From risk management to security controls, we break down complex topics for easy understanding. 🌐 Follow us on Twitter: InfoScGuardian 📷 Follow us on Instagram: infosecguardians 👍 Like us on Facebook: groups/623146913044461 🌐 Linkedin: www.linkedin.com/company/infosecguardia...
Mastering CISA Domain 1: Scenario-Based Questions for Auditors - Part 1/3
Переглядів 3386 місяців тому
Explore challenging scenarios in CISA Domain 1, testing your audit planning and execution skills. Prepare for the CISA exam and real-world auditing challenges with expert insights. #CISA #cisapracticequestions #practice #CISADomain1 #Cybersecurity #InfoSec #Certification #ExamPrep #audit 🌐 Follow us on Twitter: InfoScGuardian 📷 Follow us on Instagram: infosecguardians ...
RAPID FIRE QUESTIONS - SECURITY MODELS
Переглядів 1507 місяців тому
Are you ready to test your understanding of security models? In this rapid-fire question session, we'll challenge your knowledge of various security models, including Bell-LaPadula, Biba, Clark-Wilson, Brewer-Nash (Chinese Wall), and more! Answer as many questions as you can correctly and see how well you know these essential concepts in cybersecurity. Whether you're preparing for a certificati...
Rapid Fire Questions - Cryptography
Переглядів 1707 місяців тому
Are you preparing for the CISSP/ CCSP or CISM exam? Test your knowledge with these 40 tough questions focused on CRYPTOGRAPHY. Each question is designed to challenge your understanding of security models, cryptography, key management, digital signatures, and more.
Mastering DLP Interview Prep: Skills, Scenarios, and Solutions
Переглядів 3,9 тис.7 місяців тому
In this video, we dive deep into Data Loss Prevention (DLP) interview preparation, covering the fundamentals of DLP, key skills needed for DLP roles, different types of DLP solutions, their strengths and weaknesses, and scenario-based interview questions. Whether you're preparing for a cybersecurity interview or simply looking to enhance your knowledge of DLP, this video has something for you. ...
SOC Tools - SIEM EDR XDR MDR and SOAR Explained
Переглядів 4,9 тис.7 місяців тому
Learn the differences between SIEM, EDR, XDR, MDR, and SOAR in cybersecurity. Discover how each tool works with examples to enhance your security knowledge. CISSP Flash Cards - ua-cam.com/play/PLEnO1vtFgq4aeRw5Uw3tLmtMdZHEMpcBE.html CISSP Practice Questions Playlist - youtu.be/playlist?list=PLEnO1vtFgq4ZgooAJuD5iKDLGw9IzFSXQ&si=1ClI4hnOdrVZcyhX Domain 1 - ua-cam.com/video/BXWUuOQyjqc/v-deo.html...
CISSP 2024 Practice Questions (Scenario-Based) - Domain 7: Security Operations #CISSP
Переглядів 3,5 тис.8 місяців тому
CISSP Domain - 7 covers 13% of the CISSP exam and covers security operations. The day-to-day security tasks are not limited to an information security professional monitoring security incidents in a dark SOC computer lab. Instead, security operations is a broad categorization of information security tasks that ranges from how an organization handles security investigations to applying resource ...
CISSP 2023 Practice Questions (Scenario-Based) - Domain 6: Security Assessment & Testing #CISSP
Переглядів 2,3 тис.Рік тому
CISSP 2023 Practice Questions (Scenario-Based) - Domain 6: Security Assessment & Testing #CISSP
CISSP 2023 Practice Questions (Scenario-Based) - Domain 5 : Identity and Access Management #CISSP
Переглядів 4,2 тис.Рік тому
CISSP 2023 Practice Questions (Scenario-Based) - Domain 5 : Identity and Access Management #CISSP
CISSP 2023 Practice Questions (Scenario-Based) - Domain 4 : Communication and Network Security
Переглядів 6 тис.Рік тому
CISSP 2023 Practice Questions (Scenario-Based) - Domain 4 : Communication and Network Security
CISSP 2023 Practice Questions (Scenario-Based) - Domain 3: Security Architecture & Engineering
Переглядів 4 тис.Рік тому
CISSP 2023 Practice Questions (Scenario-Based) - Domain 3: Security Architecture & Engineering
CISSP 2023 Practice Questions (Scenario-Based) - Domain 2: Asset Security
Переглядів 2,9 тис.Рік тому
CISSP 2023 Practice Questions (Scenario-Based) - Domain 2: Asset Security
CRISC 2023 PRACTICE QUESTIONS - DOMAIN 2 : IT Risk Assessment
Переглядів 562Рік тому
CRISC 2023 PRACTICE QUESTIONS - DOMAIN 2 : IT Risk Assessment
CISSP 2023 Practice Questions (Scenario-Based) - Domain 1: Security & Risk Management
Переглядів 5 тис.Рік тому
CISSP 2023 Practice Questions (Scenario-Based) - Domain 1: Security & Risk Management
Mastering Cryptanalysis: Unlocking the Secrets of Cryptographic Systems -Domain 3 CISSP & CISM, CISA
Переглядів 526Рік тому
Mastering Cryptanalysis: Unlocking the Secrets of Cryptographic Systems -Domain 3 CISSP & CISM, CISA

КОМЕНТАРІ

  • @WhiteHat-1337
    @WhiteHat-1337 15 днів тому

    Amazing, really helpful!

  • @phozisambungwa3314
    @phozisambungwa3314 20 днів тому

    Thank you Can you please do Domain 5

  • @lipeng21cn
    @lipeng21cn 24 дні тому

    This is not for CISSP , it's for kindergarten

  • @anupanu-yc5kq
    @anupanu-yc5kq 28 днів тому

    Qun 4, I can not agree with the answer,,, Network traffic analysis can help identify whether the employee transferred sensitive data to external parties. While important for tracking exfiltration, this step would be more effective after securing the digital evidence from the employee’s work computer. It is typically used to complement forensic analysis on the employee's machine but does not replace the need to preserve physical evidence. The most critical step in any digital forensic investigation is to ensure that the integrity of the evidence is maintained. Using a write blocker to create a forensic image of the employee’s computer ensures that the original data remains unchanged during the investigation. This allows the security team to perform subsequent analysis on the forensic image, preserving the chain of custody and ensuring the evidence can be used in court if necessary. If the data is gone, no point of jumping into NW traffic analysis as 1st step, It can be done later after securing the evidence.

  • @anupanu-yc5kq
    @anupanu-yc5kq 28 днів тому

    Can not agree with Qn4 answer,, It should be B , A firewall rule audit involves reviewing the rules configured in the firewall to ensure they are properly set up to block unauthorized traffic. While this is valuable for ensuring policy compliance, it doesn’t provide a complete picture of how the firewall performs under attack scenarios or whether its rules are effective in practice. Where as apenetration test simulates real-world attacks to determine how well the firewall can block unauthorized traffic and identify any vulnerabilities that attackers could exploit. It involves actively attempting to bypass the firewall's defenses and provides insights into its overall effectiveness in a controlled, ethical manner. This test is comprehensive because it not only checks for configuration issues but also tests the firewall’s ability to stop unauthorized access.

  • @anupanu-yc5kq
    @anupanu-yc5kq 28 днів тому

    Qun 8 , "SAML assertions are sent to the Service Provider (SP) during the initial user login" .. This statement is correct but incomplete. SAML assertions contain information about the user’s identity, authentication, and attributes. These assertions are sent to the Service Provider (SP) by the Identity Provider (IdP) after the user authenticates with the IdP. This process allows the SP to grant the user access to its resources based on the received assertion

  • @anupanu-yc5kq
    @anupanu-yc5kq 28 днів тому

    Can not agree with Q3 answer, you can not kick someone out & that is not your responsibility. it should be option C, When dealing with a data breach involving sensitive customer information, the first priority should be to understand the full scope of the breach by conducting an internal investigation. This helps determine the extent of the leak, the specific data involved, and the employee's actions. Based on the investigation findings, the organization can take appropriate steps to mitigate damage and ensure future breaches don’t occur. Notifying affected customers is critical in maintaining transparency and complying with regulatory requirements (e.g., GDPR, CCPA) to ensure the organization’s legal obligations are met.

  • @anupanu-yc5kq
    @anupanu-yc5kq 28 днів тому

    Not agreeing with Q3 answer.. A CDN can significantly enhance the network’s resilience to DDoS attacks by distributing traffic across multiple servers, making it harder for attackers to overwhelm a single point of failure. CDNs are designed to handle large amounts of traffic and have built-in capabilities to absorb traffic spikes, including those caused by DDoS attacks. This reduces the burden on the company’s core infrastructure, IDPS can play a role in detecting abnormal traffic patterns and blocking known attack vectors. However, IDPS alone may not be able to handle the volume and scale of DDoS traffic, especially if the attack overwhelms the network at a volume larger than the IDPS can process.

  • @nanajus1
    @nanajus1 Місяць тому

    I just passed my exam. The videos are helpful

  • @BAEESCOPE2010
    @BAEESCOPE2010 Місяць тому

    These lectures are fantastic. Thank you very much.

  • @abhishek1986nits
    @abhishek1986nits Місяць тому

    I think that for question 4, Option C is more appropriate. Can anyone comment?

    • @VigneshSahoo
      @VigneshSahoo 8 годин тому

      Option C is good but the thing here is, whenever there is a restructure happening in the organization, review should be the first thing done before developing any security policies.

  • @lisankumamoto
    @lisankumamoto Місяць тому

    Question 44? ua-cam.com/users/clipUgkxf4azsK2JjKkjHYDz8aBznLBiNzztcWZv?si=JQPXC4G2iY4097Be

  • @AndyEsun
    @AndyEsun Місяць тому

    question 3 , something you are and something you have was mixed up, something you have was explained as something you are , i think it was just a slip.

  • @user-de3yo1lt5k
    @user-de3yo1lt5k Місяць тому

    Are all the questions in final cissp exam, scenario-based like these? Or will be there technical questions too?

    • @InfoSecGuardians
      @InfoSecGuardians Місяць тому

      There will be very few direct questions as well. But they will less weightage.

  • @alaaelbe7753
    @alaaelbe7753 Місяць тому

    Very impressive presentation

  • @ubi-wan-kenobi
    @ubi-wan-kenobi Місяць тому

    Your question 7 is quite confusing and counterintuitive seeing as the ans should be D even according to your explanation.

  • @WellsLindsay-e6e
    @WellsLindsay-e6e Місяць тому

    Taylor Barbara Perez Maria Martinez Brian

  • @SpicyPunkRockerOfficial
    @SpicyPunkRockerOfficial 2 місяці тому

    Hey I got 7/8 not bad 😄

  • @m.salmankhan5274
    @m.salmankhan5274 2 місяці тому

    Beautiful graphics and good explanations can you make it cyber security all 5 domain's all questions and answers videoes 5 part details explanation thank you

    • @InfoSecGuardians
      @InfoSecGuardians Місяць тому

      Domain 3 - ua-cam.com/video/dO-4QSs2Hrs/v-deo.html Domain 4 - ua-cam.com/video/WfY_HAMSPOQ/v-deo.html

  • @DerrickJLive
    @DerrickJLive 2 місяці тому

    Why would you choose an AI voice that has vocal fry at the end of every sentence?

  • @shylajanay
    @shylajanay 2 місяці тому

    Thank you!

  • @anupanu-yc5kq
    @anupanu-yc5kq 2 місяці тому

    Question 4 1. Use a write blocker to create a forensic image of the employee's work computer. Explanation: Write Blocker and Forensic Imaging: The first priority in digital forensics is to ensure that the original data is not altered in any way. A write blocker is a tool that prevents any changes to the data on the storage device being investigated. Creating a forensic image (an exact bit-by-bit copy) of the employee's work computer ensures that the investigation can proceed using the copy, while the original remains unaltered and intact for potential legal proceedings. Perform Live Forensic Analysis: This might be necessary in some cases, but it is usually not the first step because it can alter data on the system, which might compromise the integrity of the evidence. Conduct Network Traffic Analysis: While useful for identifying unauthorized data transfers, it should come after preserving the digital evidence. Network traffic analysis might also require real-time monitoring, which is not the initial step in preserving evidence. File Carving Tools: These tools are used to recover deleted files, which could be part of the analysis phase but should occur after the forensic image has been created. Thus, creating a forensic image with a write blocker is the first and most critical step in this type of investigation.

  • @TonyMontana-pe6vf
    @TonyMontana-pe6vf 2 місяці тому

    An intelligent AI machine speaking.

  • @stringbean3442
    @stringbean3442 2 місяці тому

    This seems like more like a english test think im going to study the diary

    • @InfoSecGuardians
      @InfoSecGuardians 2 місяці тому

      All ISC2 exams are a test of English as well.

    • @stringbean3442
      @stringbean3442 2 місяці тому

      @@InfoSecGuardians for sure it seems like properly understanding what is asked is key, here thanx for the detailed break down of the concepts its really hepful.

  • @varma9114
    @varma9114 2 місяці тому

    in domain 3 as physical access control you missed the two-person rule, two-person integrity, two-person control. these are main functions. Also, in logical access control you missed the topic about ABAC model. However, the video was good, but i'm expecting domain 4 & domain 5 in upcoming video. thnq @Infosec Guardians

    • @InfoSecGuardians
      @InfoSecGuardians 2 місяці тому

      Thanks for your review. Two-person control & ABAC are not covered in CC as per the Exam Outline released by ISC2. However, I will make a separate video covering all types of access controls.

    • @varma9114
      @varma9114 2 місяці тому

      @@InfoSecGuardians ok please cover the topics of domain 3,4,5 full of scenario based questions ,that will help to prepare for isc2 cc exam. Thnq👍

  • @dolapoodexy4709
    @dolapoodexy4709 2 місяці тому

    Your videos are really helpful 😊

  • @maloseevanschaba7343
    @maloseevanschaba7343 2 місяці тому

    When are you doing domain 4?

    • @InfoSecGuardians
      @InfoSecGuardians 2 місяці тому

      I am on it. Will be done by next Sunday. Domain-4 will be a bit lengthy.

  • @AhsanKhawaja-l4e
    @AhsanKhawaja-l4e 2 місяці тому

    Not accurate

  • @TheShoaibbadshah
    @TheShoaibbadshah 2 місяці тому

    is this your real voice, or you are using AI generated voice, and I appreciate the hard work you put in .

  • @asherkhan7997
    @asherkhan7997 2 місяці тому

    Amazing details in-depth explanation

  • @furkanozdemir1ify
    @furkanozdemir1ify 3 місяці тому

    Best video I found on the web so far. Thanks

  • @LateInCyber0424
    @LateInCyber0424 3 місяці тому

    great vids! hope we can get domain 3 - 5

  • @khanget
    @khanget 3 місяці тому

    Some of the answers are not correct in this video can't agree to the given explanation to the answer.

  • @sumithooda121
    @sumithooda121 3 місяці тому

    Question 44 and 45, answer should be A

    • @JJohnson-im4cc
      @JJohnson-im4cc 27 днів тому

      Totally agree with you. Particularly 44 as the question states that the security gaps have already been identified.

  • @EngAyyad
    @EngAyyad 3 місяці тому

    if i study on this video i will pass the exam?

    • @GamerzFaiths
      @GamerzFaiths 3 місяці тому

      @@EngAyyad I use LinkedIn learning with Mike

    • @InfoSecGuardians
      @InfoSecGuardians 2 місяці тому

      No resource can guarantee a PASS. It will be your own hard work and understanding of the topics. I am only helping to highlight the key points, so that you understand the topic better.

    • @brandogenius
      @brandogenius 2 місяці тому

      Recommend to buy the resources from isc2 website to insure you pass your exam

  • @backuashan
    @backuashan 4 місяці тому

    The speech synthesizer could be better, this one is distracting

    • @InfoSecGuardians
      @InfoSecGuardians 2 місяці тому

      Sure... Will try the improvements in future videos.

  • @sukhisohal329
    @sukhisohal329 5 місяців тому

    👌👌

  • @GamerzFaiths
    @GamerzFaiths 5 місяців тому

    In the authentication portion of the video you have Something you are and something you have mixed up. You explain it right, but the slides are wrong.

  • @sukhisohal329
    @sukhisohal329 6 місяців тому

    👌👌

  • @VishwanathBhandwale
    @VishwanathBhandwale 6 місяців тому

    2 question answer should be C

  • @AnonymousVv3
    @AnonymousVv3 6 місяців тому

    Siem peppering

  • @AnonymousVv3
    @AnonymousVv3 6 місяців тому

    And a peppering in cyber security is a cryptographic tactic

  • @AnonymousVv3
    @AnonymousVv3 6 місяців тому

    MD5 message digest algorithm version 5

  • @AnonymousVv3
    @AnonymousVv3 6 місяців тому

    Code execution and spatial Theory

  • @AnonymousVv3
    @AnonymousVv3 6 місяців тому

    Risk Theory of asset and key concepts how bad bear markets are. They are

  • @AnonymousVv3
    @AnonymousVv3 6 місяців тому

    Asset security and domain 8 for hospitals and ODNI for TIPS which is a domain policy Transaction inflation protection service? Think so in asset. Anti fraud

  • @sauravjain1403
    @sauravjain1403 6 місяців тому

    Great explanation

  • @abodymohumed8925
    @abodymohumed8925 6 місяців тому

    Thanks so much but we need more and more questions

  • @painkillerO8
    @painkillerO8 7 місяців тому

    do they have full CISSP training?

  • @wariyo2833
    @wariyo2833 7 місяців тому

    Please correct question 21 Biba Model for Integrity should be "No write up, and no read down"