Розмір відео: 1280 X 720853 X 480640 X 360
Показувати елементи керування програвачем
Автоматичне відтворення
Автоповтор
Wonderful Sir. Very fruitful to all security professionals.
Thank you 😊
Did not understand much, but the tables and pictures showed enough to make good sense of it. Thanks!
Thank you so much for the feedback
Sashank..you have a great...quality voice...
Thank you sir 😊
Thanks for sharing sir..Really Helpful for us
You are welcome,,any suggestions for new videos?
Great job Shashank. Waiting for next video.👍
This was amazing sir, knowledge made easy, thank you sir
You are welcome 😊
Very well explained in a simple way.I am waiting for your Risk Mitigation videoThanks
You are welcome will upload it soon ,,stay tuned
Excellent
Good job done... really explained well... waiting for your risk mitigation video....
Thank you so muchPlease find the link to risk mitigation videoua-cam.com/video/6Z3WK3O6P8Q/v-deo.html
superb
Very Informative Thank you, Shashank, Any Videos on CISM Would be grateful
Thank you, will try to cover that
Very helpful
Great Shashank
Thank you sir
🔥
Please more videos on security, it is good knowledge sharing
Thank you sir,, will keep uploading
Sir, you have to create more videos related Corporate security professionals
Would be great if u create a video on server n firewall n database risk assessment and management
Thank you for suggestion but I am not physical security professional not information security,,, so firewall and database are not my strong areas
Sir kya aap third party risk assessment k upar vedio daal skte hai
What do you mean by third party risk assessment
Hello brother I am master student in cybersecurity I have subject of information assurance and risk management My question is In the system adfs get hijack what should we do and how should we contro labor cost
very informative plzzz sir isky notes b provide kr dain
Sure I will do that
Send me please form
Wonderful Sir. Very fruitful to all security professionals.
Thank you 😊
Did not understand much, but the tables and pictures showed enough to make good sense of it. Thanks!
Thank you so much for the feedback
Sashank..you have a great...quality voice...
Thank you sir 😊
Thanks for sharing sir..Really Helpful for us
You are welcome,,any suggestions for new videos?
Great job Shashank. Waiting for next video.👍
Thank you sir 😊
This was amazing sir, knowledge made easy, thank you sir
You are welcome 😊
Very well explained in a simple way.I am waiting for your Risk Mitigation video
Thanks
You are welcome will upload it soon ,,stay tuned
Excellent
Good job done... really explained well... waiting for your risk mitigation video....
Thank you so much
Please find the link to risk mitigation video
ua-cam.com/video/6Z3WK3O6P8Q/v-deo.html
superb
Very Informative Thank you, Shashank, Any Videos on CISM Would be grateful
Thank you, will try to cover that
Very helpful
Great Shashank
Thank you sir
🔥
Please more videos on security, it is good knowledge sharing
Thank you sir,, will keep uploading
Sir, you have to create more videos related Corporate security professionals
Would be great if u create a video on server n firewall n database risk assessment and management
Thank you for suggestion but I am not physical security professional not information security,,, so firewall and database are not my strong areas
Sir kya aap third party risk assessment k upar vedio daal skte hai
What do you mean by third party risk assessment
Hello brother I am master student in cybersecurity I have subject of information assurance and risk management
My question is In the system adfs get hijack what should we do and how should we contro labor cost
very informative plzzz sir isky notes b provide kr dain
Sure I will do that
Send me please form