Very informative and professionaly answered techmical interview questions...hoping for more such videos on Firewalls and Cyber Security....great help for job seekers keep it up ....!!!
Waa it's very useful to me becz now i have learning a cyber security course.thank u so much it' very very useful to mee thanks a lot and nice explanation 😊
00:05 Cyber security is about protecting data from unauthorized access to prevent theft or destruction. 02:02 Understanding DNS and CIA Triad in Cyber Security 04:10 Difference between vulnerability and penetration testing 06:21 Understanding the OSI model layers. 08:24 Ways to remove BIOS password 10:28 Cyber Security Interview Questions And Answers Summary 12:38 Web Cracking and Session Hijacking 14:43 Key Cyber Security Interview Questions 16:49 WPA2 is the most used protocol in wifi security Crafted by Merlin AI.
This is good, do MAC addresses have hyphens? I thought it was the colon: between pairs. Quick acronym for the OSI layer "Do Not Throw Salami Pizza Away". Hope this helps.
Thank you so much for appreciating the content. Your feedback motivates us to make more such content. Unfortunately, we don't share the source code or presentation deck with anyone. Although, if you wish to learn from Industry Experts and IIT Faculty, do fill out this form and we will reach out to you. Have a great day! . Google Form: forms.gle/XWy7MtQPrHkgq7Pt7
If you wish to learn Cyber Security from top experts and get a certification, then kindly call our course advisors on IND: +91-7022374614 US: 1-800-216-8930 (Toll-Free).
I mean!! This is very basic!! I have given numerous interviews for VAPT and for auditors!! Apart from the CIA, and box testings no one will ask such questions!!
Thank you so much for appreciating the content. Your feedback motivates us to make more such content. Unfortunately, we don't share the source code or presentation deck with anyone. Although, if you wish to learn from Industry Experts and IIT Faculty, do fill out this form and we will reach out to you. Have a great day! . Google Form: forms.gle/XWy7MtQPrHkgq7Pt7
Thank you so much for appreciating the content. Your feedback motivates us to make more such content. Unfortunately, we don't share the source code or presentation deck with anyone. Although, if you wish to learn from Industry Experts and IIT Faculty, do fill out this form and we will reach out to you. Have a great day! . Google Form: forms.gle/XWy7MtQPrHkgq7Pt7
Very informative and professionaly answered techmical interview questions...hoping for more such videos on Firewalls and Cyber Security....great help for job seekers keep it up ....!!!
@Amit Waghmare Glad you liked it 😊 Do like, share & subscribe to our channel to get updates on upcoming videos.
Waa it's very useful to me becz now i have learning a cyber security course.thank u so much it' very very useful to mee thanks a lot and nice explanation 😊
Glad you liked it 😊 Do like, share & subscribe to our channel to get updates on upcoming videos.
😊00@@Intellipaat
good but you need more technical scenario based versions of this.
Crystal clear answers.
Voice is perfect to understand.
Tq so much. 🥰
@Crazy Planet Glad you liked it. Do like, share & subscribe to our channel to get updates on upcoming videos.
perfect explanation of tech knowledge
@Gaurav Rathi Glad you think so! Do like, share & subscribe to our channel to get updates on upcoming videos.
Nice collection of points and easy to understand
Thanks for liking @Pratyush Mitra Do like, share & subscribe to our channel to get updates on upcoming videos.
@@Intellipaat Done & Thanks
Awesome. God bless you guys.
Most welcome 😊 Do like, share & subscribe to our channel to get updates on upcoming videos.
00:05 Cyber security is about protecting data from unauthorized access to prevent theft or destruction.
02:02 Understanding DNS and CIA Triad in Cyber Security
04:10 Difference between vulnerability and penetration testing
06:21 Understanding the OSI model layers.
08:24 Ways to remove BIOS password
10:28 Cyber Security Interview Questions And Answers Summary
12:38 Web Cracking and Session Hijacking
14:43 Key Cyber Security Interview Questions
16:49 WPA2 is the most used protocol in wifi security
Crafted by Merlin AI.
This is good, do MAC addresses have hyphens? I thought it was the colon: between pairs. Quick acronym for the OSI layer "Do Not Throw Salami Pizza Away". Hope this helps.
@James Mettauer If you wish to get Personal support Kindly call our advisors on IND : +91-7022374614 US : 1-800-216-8930 (Toll Free).
Bro it depends on the device you use MAC Address comes up with - and : symbol
Varies on device like phone and laptop
7 layers: " Plz Do Not Throw Salami Pizza Away"
perfect soft skills
@aashiq ali sm Do like, share & subscribe to our channel to get updates on upcoming videos.
Nice tips with understanding language
thankyou
Most welcome 😊 Do like, share & subscribe to our channel to get updates on upcoming videos.
Awesome 👍👍👍
Glad you liked it 😊 Do like, share & subscribe to our channel to get updates on upcoming videos.
Good job! Thank you
Our pleasure! @Zarghoon Shinwari Do like, share & subscribe to our channel to get updates on upcoming videos.
Очень благодарны вам за дельную связку.
Glad you found the video helpful. Stay tuned for such content.
Hi. This is really informative. Can yoy please share the notes. It'll be really helpful. Thank you
Thank you so much for appreciating the content. Your feedback motivates us to make more such content. Unfortunately, we don't share the source code or presentation deck with anyone. Although, if you wish to learn from Industry Experts and IIT Faculty, do fill out this form and we will reach out to you. Have a great day!
.
Google Form: forms.gle/XWy7MtQPrHkgq7Pt7
thanks sir
@Aravindaraj C Most welcome Do like, share & subscribe to our channel to get updates on upcoming videos.
Very good presentation sir
Keep watching. Do like, share & subscribe to our channel to get updates on upcoming videos.
Can you plesae create more smilar video, Its awsome for interview cracking
ASAP. @Mayur Wadhe Do like, share & subscribe to our channel to get updates on upcoming videos.😊
Can we refer this interview questions for network security interview too?
More videos about Cyber Security skills
New subscriber ❤🎉🎉
❤️❤️❤️
can you please create short informative video regarding cyber security
Ya sure @Deepak R Nair Do like, share & subscribe to our channel to get updates on upcoming videos.
Greater work with out cyber security no more network security! Thank for effort
Very good information
thank you @NEELAM MOR
Want owasp top 10 . Mitigations and examples.
Pls.
How to prepare for ch certification and examination??
@Janhvi Khandait For personal support, you can reach out to our course advisors on IND: +91-7022374614 US: 1-800-216-8930 (Toll-Free).
can you provide notes to me its very informative
@Sure! Please share your e-mail ID so that we can share the required files
Can you provide notes to me it's very informative
@@Intellipaat can you provide notes to me its very informative
Please provide notes
hi sir,,you are Video's Good But its to fast,, slow voice record,,
plz, accepted my request, THANQ
Ok. Thanks @Ramu Onteddu Do like, share & subscribe to our channel to get updates on upcoming videos.
Good information but you should speak more slowly so that others can understand you.
If you wish to learn Cyber Security from top experts and get a certification, then kindly call our course advisors on IND: +91-7022374614 US: 1-800-216-8930 (Toll-Free).
can u please share notes of these
@Akash Chavan Sure! Please share your e-mail ID so that we can share the required files.
I mean!! This is very basic!! I have given numerous interviews for VAPT and for auditors!! Apart from the CIA, and box testings no one will ask such questions!!
You mean to say interview questions are much easier than these questions in the video?
These questions can help freshers because they will have basic knowledge
@@Indoamerican17 much harder
@@ashupochh8310 doesn’t matter I’m a stripper now
@@Indoamerican17 you mean sniper?
Please Give me the pdf along with the answer
Thank you so much for appreciating the content. Your feedback motivates us to make more such content. Unfortunately, we don't share the source code or presentation deck with anyone. Although, if you wish to learn from Industry Experts and IIT Faculty, do fill out this form and we will reach out to you. Have a great day!
.
Google Form: forms.gle/XWy7MtQPrHkgq7Pt7
from where we can get the pdf of these questions?
@miracle kohli subscribe to our channel to know right answer.
👍
2 factor authentication is easily can be hacked it is common
Can u please share notes of these
Thank you so much for appreciating the content. Your feedback motivates us to make more such content. Unfortunately, we don't share the source code or presentation deck with anyone. Although, if you wish to learn from Industry Experts and IIT Faculty, do fill out this form and we will reach out to you. Have a great day!
.
Google Form: forms.gle/XWy7MtQPrHkgq7Pt7