Security For You
Security For You
  • 367
  • 190 386

Відео

Intrusion Detection and Prevention Systems 💥 All discussed - Working, types, difference & Benefits
Переглядів 102Місяць тому
Intrusion Detection and Prevention Systems 💥 All discussed - Working, types, difference & Benefits
Step by step process of how a Firewall monitors Data packets | Explained with a simple example 💥
Переглядів 602 місяці тому
Step by step process of how a Firewall monitors Data packets | Explained with a simple example 💥
What is Firewall? How it works in securing your network? Ultimate step by step guide for beginners.
Переглядів 2434 місяці тому
What is Firewall? How it works in securing your network? Ultimate step by step guide for beginners.
Environmental Controls in IT - What are the things to consider? Ultimate guide 💥
Переглядів 874 місяці тому
Environmental Controls in IT - What are the things to consider? Ultimate guide 💥
False Rejection Rate, False Acceptance Rate and Crossover / Equal Error Rate in Access control 💥
Переглядів 1414 місяці тому
False Rejection Rate, False Acceptance Rate and Crossover / Equal Error Rate in Access control 💥
IT Governance vs IT Management 💥 Roles and Responsibilities of both | Explained @security_for_you
Переглядів 824 місяці тому
IT Governance vs IT Management 💥 Roles and Responsibilities of both | Explained @security_for_you
How Email communication works? What are different protocols used for sending & receiving emails? 🔥
Переглядів 1014 місяці тому
How Email communication works? What are different protocols used for sending & receiving emails? 🔥
What are Cache and Cookies? Risks they pose and how to mitigate? All explained 🔥
Переглядів 934 місяці тому
What are Cache and Cookies? Risks they pose and how to mitigate? All explained 🔥
Data States - At Rest, In Transit & In Use | How Ecom websites secure your data while in use? 💥
Переглядів 1074 місяці тому
Data States - At Rest, In Transit & In Use | How Ecom websites secure your data while in use? 💥
Vulnerability vs Exploit - Are these same? Let's understand how Vulnerabilities are exploited 💥
Переглядів 784 місяці тому
Vulnerability vs Exploit - Are these same? Let's understand how Vulnerabilities are exploited 💥
Why Passwords are stored as Hash & not Encrypted? Why Hashing + Salting is secure than Encryption? 💥
Переглядів 2204 місяці тому
Why Passwords are stored as Hash & not Encrypted? Why Hashing Salting is secure than Encryption? 💥
Risks of using Public Wifi - How to protect yourself while using Public Wi-Fi? #risks 🔥
Переглядів 634 місяці тому
Risks of using Public Wifi - How to protect yourself while using Public Wi-Fi? #risks 🔥
Dictionary Attacks - How these are different from Brute Force attacks? How to protect yourself? 💥
Переглядів 285 місяців тому
Dictionary Attacks - How these are different from Brute Force attacks? How to protect yourself? 💥
Risks of Cloud Computing - Major 14 risks discussed along with controls to mitigate risks. 💥
Переглядів 945 місяців тому
Risks of Cloud Computing - Major 14 risks discussed along with controls to mitigate risks. 💥
Right To Audit - Why is it an Important clause in Contract or Agreement from Infosec perspective? 💥
Переглядів 435 місяців тому
Right To Audit - Why is it an Important clause in Contract or Agreement from Infosec perspective? 💥
SOC 1 vs SOC 2 vs SOC 3 | Overview, Purpose, Differences, Examples, Benefits - All discussed 💥
Переглядів 1055 місяців тому
SOC 1 vs SOC 2 vs SOC 3 | Overview, Purpose, Differences, Examples, Benefits - All discussed 💥
Data Handling methods & Requirements for Public, Restricted, Confidential & High Risk Information 💥
Переглядів 935 місяців тому
Data Handling methods & Requirements for Public, Restricted, Confidential & High Risk Information 💥
What is Dumpster Diving in Information Security? Risks of Dumpster Diving & how to Mitigate them? 💥
Переглядів 1935 місяців тому
What is Dumpster Diving in Information Security? Risks of Dumpster Diving & how to Mitigate them? 💥
What is Non-compete clause? Why is it used in agreement? Is it enforceable in court of law? 💥
Переглядів 1095 місяців тому
What is Non-compete clause? Why is it used in agreement? Is it enforceable in court of law? 💥
Hypervisor attacks - How to mitigate them? Role of hypercalls in these attacks? All explained 💥
Переглядів 945 місяців тому
Hypervisor attacks - How to mitigate them? Role of hypercalls in these attacks? All explained 💥
Buffer Overflow Attacks - How hackers exploit the vulnerability & How to Mitigate Risks? Explained💥
Переглядів 1055 місяців тому
Buffer Overflow Attacks - How hackers exploit the vulnerability & How to Mitigate Risks? Explained💥
Hypervisor - Types, Benefits and Things to consider while choosing the right Hypervisor 💥
Переглядів 515 місяців тому
Hypervisor - Types, Benefits and Things to consider while choosing the right Hypervisor 💥
What is Scope Creep? How to prevent it in your projects? Explained with examples 💥
Переглядів 185 місяців тому
What is Scope Creep? How to prevent it in your projects? Explained with examples 💥
Virtual Machines - How they are transforming power of Computing? Why should you use VMs? Explained 💥
Переглядів 285 місяців тому
Virtual Machines - How they are transforming power of Computing? Why should you use VMs? Explained 💥
Virtualization and different methods - OS, Application, Network, Storage, App Server virtualisation
Переглядів 1345 місяців тому
Virtualization and different methods - OS, Application, Network, Storage, App Server virtualisation
Cloud service models - Saas, PaaS, IaaS | What are responsibilities of CSP & You? Explained easily
Переглядів 755 місяців тому
Cloud service models - Saas, PaaS, IaaS | What are responsibilities of CSP & You? Explained easily
What are USB related Risk and How to mitigate them? All discussed in details 🔥 Ultimate guide
Переглядів 1365 місяців тому
What are USB related Risk and How to mitigate them? All discussed in details 🔥 Ultimate guide
Cloud Computing and Cloud deployment models | Factors & Risks to keep in mind? Everything explained💥
Переглядів 755 місяців тому
Cloud Computing and Cloud deployment models | Factors & Risks to keep in mind? Everything explained💥
Types of backups - Full, Incremental & Differential 💥 Explained in details with example 🔥
Переглядів 2145 місяців тому
Types of backups - Full, Incremental & Differential 💥 Explained in details with example 🔥

КОМЕНТАРІ

  • @lildizzle29
    @lildizzle29 6 годин тому

    ❤❤❤❤

  • @kinstony4273
    @kinstony4273 5 днів тому

    Great example 🎉❤

  • @brendynixie8714
    @brendynixie8714 23 дні тому

    Brother what💀I did not mean to click this shi 😭

  • @lowunited6220
    @lowunited6220 Місяць тому

    Wow very informative! Its best to learn about things like these to stay safe and stay away

  • @streamspoart2671
    @streamspoart2671 Місяць тому

    FBI i swear! I'm just looking for Deadpool 2 reference when she said IUD and Deadpool said "a bomb?"

  • @Qwertuiop-f8n
    @Qwertuiop-f8n Місяць тому

    Bro really explaining IED's like a highschool teacher, damn...

  • @ilovedance_yt
    @ilovedance_yt Місяць тому

    best idea 💡😜

  • @jessfilmdiaries
    @jessfilmdiaries Місяць тому

    I've seen banks list positions as Model risk governance specialist. Is this the same as a GRC specialist?

  • @DanetteKshlerin
    @DanetteKshlerin Місяць тому

    Gonzalez Melissa Johnson Karen Hernandez Ronald

  • @biomedlib
    @biomedlib Місяць тому

    Greetings, I enjoyed your video. Would you say that Preventive Controls are more important than Detective Controls? Thank you.

  • @ButtonSjdoml
    @ButtonSjdoml 2 місяці тому

    Martin Timothy Martinez Mary Garcia Timothy

  • @alexwatson5961
    @alexwatson5961 2 місяці тому

    But how to stay safe?

  • @kaitlynmierswe4017
    @kaitlynmierswe4017 2 місяці тому

    Wilson Robert Martin Maria Hernandez Eric

  • @WattHowar-e9i
    @WattHowar-e9i 2 місяці тому

    Moore Patricia Thompson George Clark Richard

  • @NoraBerg-g8p
    @NoraBerg-g8p 2 місяці тому

    Miller Cynthia Johnson Brian Robinson Brian

  • @spiderman699
    @spiderman699 2 місяці тому

    Well explained and thank u🎉

  • @vasanthakumar525
    @vasanthakumar525 2 місяці тому

    How can I contact you?

  • @GwenStephens-e4m
    @GwenStephens-e4m 2 місяці тому

    Miller Donna Rodriguez David Lewis Scott

  • @TheresaMitchell-v4r
    @TheresaMitchell-v4r 3 місяці тому

    Miller Anthony Walker Kenneth Allen Steven

  • @aminvogue
    @aminvogue 3 місяці тому

    Hi Dushyant, this vdo on 3 Matrices is "Golden" hats off to you.

    • @security_for_you
      @security_for_you 3 місяці тому

      Thank you for encouraging to do better everytime 🙏😄

  • @satyanikhil8128
    @satyanikhil8128 3 місяці тому

    Amazing, can we get the ppt used for this?

  • @prashanthkumar4222
    @prashanthkumar4222 3 місяці тому

    If SOD is not maintained developer,approver are same as a auditor what action need to be taken?

  • @Omairi86
    @Omairi86 3 місяці тому

    Can a server in a DMZ pose a security risk to the rest of the network? Like if i put my playstation ip on DMZ network will it put any danger on my other devices if it got hacked ? Thank you in advance.

  • @JossOrtan
    @JossOrtan 4 місяці тому

    Great video! The distinctions between data security and data privacy were explained so clearly. Do you think organizations tend to prioritize one over the other, and what impact does that have?

  • @olracmike1686
    @olracmike1686 4 місяці тому

    Nice One!

  • @aswathyr2617
    @aswathyr2617 4 місяці тому

    Thank you sir ,really helpful.

  • @gmddmg
    @gmddmg 4 місяці тому

    Hello, and thanks for this great video. I have a question though (min 2:00). In my opinion, these sound more like key results, meaning concrete achievements as part of a bigger "Objective". Correct? The KPI would be "Customer Satisfaction" but "Reduce the avarage time to complete checkout by 20%" sounds more like an objective. Am I missing something? Thanks!

  • @mr.pawansinghrathore3359
    @mr.pawansinghrathore3359 4 місяці тому

    Superb performance

  • @babulalgodara8359
    @babulalgodara8359 4 місяці тому

    Insightful 💡

  • @Esoteric.Knowledge.Evolution
    @Esoteric.Knowledge.Evolution 4 місяці тому

    Nice one

  • @mr.pawansinghrathore3359
    @mr.pawansinghrathore3359 4 місяці тому

    Subscribe to more information

  • @vishvanathgangoli4874
    @vishvanathgangoli4874 4 місяці тому

    Good Effort

  • @HimanshuNegi-yk8ni
    @HimanshuNegi-yk8ni 4 місяці тому

    Thanks 👍

  • @manvishekhawat9075
    @manvishekhawat9075 4 місяці тому

    👍🏻👍🏻

  • @anilraja7799
    @anilraja7799 5 місяців тому

    Nice explanation for hashing with salt.

  • @iljabrudel6224
    @iljabrudel6224 5 місяців тому

    Thank you for the video. Good and simple way to understand hashing, encryption and what hashing with a salt gives as a benefit. Would you recommend a secure, prooven way of implementing hashing with salting that recognized with nationals or international standards?

  • @germainkone9029
    @germainkone9029 5 місяців тому

    Nice job. Thanks 🙏

  • @katlegoramz3588
    @katlegoramz3588 5 місяців тому

    This was greatly explained one can start implementing such process Thank you

    • @security_for_you
      @security_for_you 5 місяців тому

      Thank you so much 😀 Glad you liked it.

  • @vuppuabhishek8547
    @vuppuabhishek8547 5 місяців тому

    Super

  • @AnuShrivastav-zw6ls
    @AnuShrivastav-zw6ls 5 місяців тому

    I have 5 years of Network Security exp. On firewall/proxy/Antivirus n all. I want to go in mngmt but still keep in touch with cybersecurity concepts. Which certification is good and easy for me out of CISM or CRISC ?

  • @germainkone9029
    @germainkone9029 5 місяців тому

    Thanks sir. How this is related to data management? Data ownership ? Thanks

    • @security_for_you
      @security_for_you 5 місяців тому

      Hey, please connect me one to one on LinkedIn. I will guide you.

    • @germainkone9029
      @germainkone9029 5 місяців тому

      @@security_for_you sure. thanks.

  • @security_for_you
    @security_for_you 5 місяців тому

    ua-cam.com/video/H06O925j08w/v-deo.html

  • @security_for_you
    @security_for_you 5 місяців тому

    Change Management: Ultimate Guide for Auditors | Emergency vs Normal Change

  • @mr.potterhead2278
    @mr.potterhead2278 5 місяців тому

    Correction There are 4 components in IED 1. Explosive 2. Detonator 3. Power source 4. Switch And there are 4 different types of switch mechanisms 1. Anti Handling switch which is also Victim Operative ...in this the victim himself is the operator 2. Ambient switch 3. Time Delay switch 4. Remote control or Radio control

  • @germainkone9029
    @germainkone9029 6 місяців тому

    Nice work

  • @germainkone9029
    @germainkone9029 6 місяців тому

    Another great one 👍🏿. Thanks

  • @germainkone9029
    @germainkone9029 6 місяців тому

    Thank you so much 🙌🏾🙏

    • @security_for_you
      @security_for_you 6 місяців тому

      I hope you found value from this video. 🙏🙂

    • @germainkone9029
      @germainkone9029 6 місяців тому

      @@security_for_you Very informative. Thanks 🙏

  • @security_for_you
    @security_for_you 6 місяців тому

    Video on KPI, KRI and KCI - ua-cam.com/video/_T8p4VbDNbE/v-deo.htmlsi=Q8RpNPHDTRTqElm6

  • @security_for_you
    @security_for_you 6 місяців тому

    Video on KPI, KRI and KCI - ua-cam.com/video/_T8p4VbDNbE/v-deo.htmlsi=Q8RpNPHDTRTqElm6

  • @kritikashekhawat6820
    @kritikashekhawat6820 6 місяців тому

    Very well explained. Really helpful for someone like me who is a beginner.