Thank you @prabh and sure we would love more videos. Actually I am preparing for CISSP and your explanation takes it to different level in sense of understanding. I have seen other videos for CISSP but not invoking intereset as your videos does.
Very informative video on Active and Passive Reconnaissance. The vulnerability assessment and user awareness about social engineering frauds are really a few of the controls that organizations may adopt and implement in the form of policies and procedures to avoid operational disruptions and security and maintenance of the network. Effective controls lead to the minimization of data losses and breaches but the controls should be evaluated from the operating effectiveness point of view in addition to risk mappings.
Hi @Prabh Thanks for sharing this its very informative but if there are pentesters on OSCP & OSEP level or you can say more experianced testers what kind of questions we can ask them which combaines both theory and senario based.
Dear Prabh, thank you for making this video which will really help us. Gained a good information and knowledge by watching your many videos... Am new to this and like to move head in this field .. I really want to get connect with you to get some guidence to shape up myself .. please let me know how I can contact you ? Thank you for time 😊
Thank you @prabh and sure we would love more videos. Actually I am preparing for CISSP and your explanation takes it to different level in sense of understanding. I have seen other videos for CISSP but not invoking intereset as your videos does.
Thanks for sharing the knowledge. Yes, please do make more interview videos and important topics for web nd network pentesting.
Very informative video on Active and Passive Reconnaissance. The vulnerability assessment and user awareness about social engineering frauds are really a few of the controls that organizations may adopt and implement in the form of policies and procedures to avoid operational disruptions and security and maintenance of the network. Effective controls lead to the minimization of data losses and breaches but the controls should be evaluated from the operating effectiveness point of view in addition to risk mappings.
Great sir. Daily video would be highly appreciated
We need more of this, it’s very informative and helpful. Thank you.
Very nice video sir, we want more videos on penetration testing interview.
Hi @Prabh
Thanks for sharing this its very informative but if there are pentesters on OSCP & OSEP level or you can say more experianced testers what kind of questions we can ask them which combaines both theory and senario based.
Please do some videos on cloud vulnerability assessment
Hello
Can u create penetration testing boot camp
Sir is it Ethical Hacking Interview questions or Penetration Testing interview questions?, Please do confirm & change/Edit in Thumbnail
It will covered both
@@PrabhNair1 ok sir, Thanks for the confirmation 👍
Dear Prabh, thank you for making this video which will really help us. Gained a good information and knowledge by watching your many videos... Am new to this and like to move head in this field .. I really want to get connect with you to get some guidence to shape up myself .. please let me know how I can contact you ?
Thank you for time 😊