- 145
- 23 121
Protecte Academy
India
เข้าร่วมเมื่อ 29 ส.ค. 2023
Welcome to Protect Academy!
🚀 About Us:
At Protecte Academy, we're on a mission to empower you with the knowledge and skills to protect your digital world from cyber threats. Our channel is your go-to destination for informative cybersecurity training, tips, and insights.
🎯 What to Expect:
🔐 In-Depth Tutorials: We break down complex cybersecurity concepts into easy-to-understand lessons.
💡 Expert Insights: Learn from seasoned professionals and stay ahead of the latest threats.
🌟 Live Q&A Sessions: Get your burning cybersecurity questions answered in real-time.
🌟 Follow Us:
📱 Instagram: shorturl.at/jDZ36
💼 LinkedIn: shorturl.at/apELS
💻 Facebook: shorturl.at/dhoS6
📢 Stay Connected:
Join our growing community of cybersecurity enthusiasts and professionals.
🔗 Website:
Visit our website: learn.protecte.io
📧 Contact Us:
Have questions or suggestions? Feel free to reach out at support@protecte.io
Let's work together to create a safer digital world. 💪💻🌐
🚀 About Us:
At Protecte Academy, we're on a mission to empower you with the knowledge and skills to protect your digital world from cyber threats. Our channel is your go-to destination for informative cybersecurity training, tips, and insights.
🎯 What to Expect:
🔐 In-Depth Tutorials: We break down complex cybersecurity concepts into easy-to-understand lessons.
💡 Expert Insights: Learn from seasoned professionals and stay ahead of the latest threats.
🌟 Live Q&A Sessions: Get your burning cybersecurity questions answered in real-time.
🌟 Follow Us:
📱 Instagram: shorturl.at/jDZ36
💼 LinkedIn: shorturl.at/apELS
💻 Facebook: shorturl.at/dhoS6
📢 Stay Connected:
Join our growing community of cybersecurity enthusiasts and professionals.
🔗 Website:
Visit our website: learn.protecte.io
📧 Contact Us:
Have questions or suggestions? Feel free to reach out at support@protecte.io
Let's work together to create a safer digital world. 💪💻🌐
Mastering CISSP Domain 3 | Understanding System Capabilities of Information Systems | Part 7
Join Col. Subhajeet Naha (RETD) in Part 7 of the CISSP Domain 3 series, where he explores the critical system capabilities of information systems essential for securing and managing data. This session covers:
💻 Key capabilities of information systems that ensure security, reliability, and scalability
🔐 The role of these capabilities in protecting against cyber threats and vulnerabilities
🛠️ How to evaluate and implement secure information systems in your organization
This video is vital for CISSP exam preparation, helping you understand the technical aspects of system capabilities and how they contribute to an overall secure architecture.
About Us 💡
Protecte Academy is committed to empowering cybersecurity professionals with the skills and certifications needed to excel. Our experienced instructors deliver comprehensive training that equips you with practical knowledge for real-world cybersecurity challenges.
📝 Don’t forget to Like, Share, and Subscribe for more expert insights into cybersecurity!
🔗 Follow us:
LinkedIn: www.linkedin.com/company/protecte-academy/
Facebook: protecteacademy/
Instagram: shorturl.at/hlJBZ
Visit our website: learn.protecte.io for more information on our training programs and certifications.
For more details contact us at:
📞 +91 88006 42768
📨 sales@protecte.io
🌐 learn.protecte.io/
Stay tuned for more tips, strategies, and resources to help you on your CISSP journey. Don't forget to hit the like button and subscribe to our channel for the latest updates!🔔
#CISSP #InformationSystems #CybersecurityTraining #ProtecteAcademy #SystemCapabilities #DataSecurity #CyberSecurityManagement #InfoSec #SecurityArchitecture #CISSPExamPrep #TechSecurity #CyberSecurityCertification
💻 Key capabilities of information systems that ensure security, reliability, and scalability
🔐 The role of these capabilities in protecting against cyber threats and vulnerabilities
🛠️ How to evaluate and implement secure information systems in your organization
This video is vital for CISSP exam preparation, helping you understand the technical aspects of system capabilities and how they contribute to an overall secure architecture.
About Us 💡
Protecte Academy is committed to empowering cybersecurity professionals with the skills and certifications needed to excel. Our experienced instructors deliver comprehensive training that equips you with practical knowledge for real-world cybersecurity challenges.
📝 Don’t forget to Like, Share, and Subscribe for more expert insights into cybersecurity!
🔗 Follow us:
LinkedIn: www.linkedin.com/company/protecte-academy/
Facebook: protecteacademy/
Instagram: shorturl.at/hlJBZ
Visit our website: learn.protecte.io for more information on our training programs and certifications.
For more details contact us at:
📞 +91 88006 42768
📨 sales@protecte.io
🌐 learn.protecte.io/
Stay tuned for more tips, strategies, and resources to help you on your CISSP journey. Don't forget to hit the like button and subscribe to our channel for the latest updates!🔔
#CISSP #InformationSystems #CybersecurityTraining #ProtecteAcademy #SystemCapabilities #DataSecurity #CyberSecurityManagement #InfoSec #SecurityArchitecture #CISSPExamPrep #TechSecurity #CyberSecurityCertification
มุมมอง: 7
วีดีโอ
Mastering CISSP Domain 3 | Bell-LaPadula, Clark-Wilson, Brewer-Nash | Part 6
มุมมอง 217 ชั่วโมงที่ผ่านมา
In Part 6 of the CISSP Domain 3 series, Col. Subhajeet Naha (RETD) breaks down critical security models that shape how access control is managed in cybersecurity systems. This session covers: 🔐 The Bell-LaPadula Model and its focus on confidentiality 📊 The Clark-Wilson Model and how it ensures data integrity 🛡️ The Brewer-Nash Model and its role in preventing conflicts of interest 📈 Evaluation ...
Mastering CISSP Domain 3 | System Architecture, Zero Trust & Access Control Matrix | Part 5
มุมมอง 2812 ชั่วโมงที่ผ่านมา
Join Col. Subhajeet Naha (RETD) in Part 5 of the CISSP Domain 3 series, where he covers key access control concepts that are vital for securing systems and data. This session focuses on: 🛡️ Understanding Access Control Systems and their architecture 🔐 The importance of Zero Trust security models in modern networks 📊 Exploring the Access Control Matrix and its role in enforcing security policies...
Mastering CISSP Domain 3 | Understanding Cryptography Attacks | Part 4
มุมมอง 1816 ชั่วโมงที่ผ่านมา
In Part 4 of the CISSP Domain 3 series, Col. Subhajeet Naha (RETD) discusses the various cryptography attacks that every cybersecurity professional needs to be aware of. This session covers: 🛡️ Common cryptographic attacks (e.g., Man-in-the-Middle, Brute Force, Ciphertext-only attacks) 🔍 How these attacks exploit weaknesses in cryptographic systems 🛠️ Best practices and strategies for mitigatin...
Mastering CISSP Domain 3 | Symmetric Key Management, Asymmetric Algorithms | Part 3
มุมมอง 26วันที่ผ่านมา
Explore key concepts in Part 3 of the CISSP Domain 3 series with Col. Subhajeet Naha (RETD)! In this session, dive into: 🔐 Effective management of symmetric keys 📊 An overview of asymmetric algorithms and their applications 🔑 Understanding Public Key Infrastructure (PKI) and its role in secure communication This video is designed to enhance your CISSP exam preparation and expand your expertise ...
Mastering CISSP Domain 3 | Modern Cryptography, Symmetric & Asymmetric Keys | Part 2
มุมมอง 50วันที่ผ่านมา
Mastering CISSP Domain 3 | Modern Cryptography, Symmetric & Asymmetric Keys | Part 2
Mastering CISSP Domain 3 | Symmetric & Asymmetric Cryptography Explained | Part 1
มุมมอง 4814 วันที่ผ่านมา
Mastering CISSP Domain 3 | Symmetric & Asymmetric Cryptography Explained | Part 1
Master CISSP Domain 2 | Continuous Audit, CASB & Data Roles Explained | Part 4
มุมมอง 4314 วันที่ผ่านมา
Master CISSP Domain 2 | Continuous Audit, CASB & Data Roles Explained | Part 4
Master CISSP Domain 2 | Shared Responsibilities, EOL Management & DRM Explained | Part 3
มุมมอง 3821 วันที่ผ่านมา
Master CISSP Domain 2 | Shared Responsibilities, EOL Management & DRM Explained | Part 3
Master CISSP Domain 2 | System Identification, Asset Handling & Data Protection Explained | Part 2
มุมมอง 6121 วันที่ผ่านมา
Master CISSP Domain 2 | System Identification, Asset Handling & Data Protection Explained | Part 2
Master CISSP Domain 2 | Information Assets & Inventory Management Essentials Explained | Part 1
มุมมอง 9328 วันที่ผ่านมา
Master CISSP Domain 2 | Information Assets & Inventory Management Essentials Explained | Part 1
Master CISSP Domain 1 | BIA, Supply Chain Risk & Content Review Explained | Part 17
มุมมอง 122หลายเดือนก่อน
Master CISSP Domain 1 | BIA, Supply Chain Risk & Content Review Explained | Part 17
Master CISSP Domain 1 | Laws, Regulations & Compliance Explained | Part 16
มุมมอง 56หลายเดือนก่อน
Master CISSP Domain 1 | Laws, Regulations & Compliance Explained | Part 16
Master CISSP Domain 1 | Business Continuity Explained | Part 15
มุมมอง 53หลายเดือนก่อน
Master CISSP Domain 1 | Business Continuity Explained | Part 15
Master CISSP Domain 1 | Risk Register & Risk Management Frameworks Explained | Part 14
มุมมอง 40หลายเดือนก่อน
Master CISSP Domain 1 | Risk Register & Risk Management Frameworks Explained | Part 14
Master CISSP Domain 1 | Quantitative Risk Management Explained | Part 13
มุมมอง 60หลายเดือนก่อน
Master CISSP Domain 1 | Quantitative Risk Management Explained | Part 13
Master CISSP Domain 1 | Asset Valuation & Delphi Technique Explained | Part 12
มุมมอง 44หลายเดือนก่อน
Master CISSP Domain 1 | Asset Valuation & Delphi Technique Explained | Part 12
Master CISSP Domain 1 | Internal Audits, Industry Standards & Privacy Policies | Part 11
มุมมอง 37หลายเดือนก่อน
Master CISSP Domain 1 | Internal Audits, Industry Standards & Privacy Policies | Part 11
Master CISSP Domain 1: Personnel Security Policies Explained | Part 10
มุมมอง 47หลายเดือนก่อน
Master CISSP Domain 1: Personnel Security Policies Explained | Part 10
Master CISSP Domain 1: Risk Assessment, Threat Modeling, & DREAD Explained | Part 9
มุมมอง 70หลายเดือนก่อน
Master CISSP Domain 1: Risk Assessment, Threat Modeling, & DREAD Explained | Part 9
CISSP Domain 1 Explained: Security Control Frameworks (Part 8)
มุมมอง 892 หลายเดือนก่อน
CISSP Domain 1 Explained: Security Control Frameworks (Part 8)
CISSP Domain 1 Explained: Security Management, Due Diligence & Planning (Part 7)
มุมมอง 702 หลายเดือนก่อน
CISSP Domain 1 Explained: Security Management, Due Diligence & Planning (Part 7)
CISSP Domain 1 Explained: Security Governance & Third-Party Governance (Part 6)
มุมมอง 502 หลายเดือนก่อน
CISSP Domain 1 Explained: Security Governance & Third-Party Governance (Part 6)
CISSP Domain 1 Explained: Projection Mechanisms, Encryption & Security Boundaries (Part 5)
มุมมอง 722 หลายเดือนก่อน
CISSP Domain 1 Explained: Projection Mechanisms, Encryption & Security Boundaries (Part 5)
CISSP Domain 1 Explained: Security & Risk Management | DAD Triad, Serial Controls & Defense (Part 4)
มุมมอง 902 หลายเดือนก่อน
CISSP Domain 1 Explained: Security & Risk Management | DAD Triad, Serial Controls & Defense (Part 4)
CISSP Domain 1 Explained: Security & Risk Management | Mastering the CIA Triad (Part 3)
มุมมอง 522 หลายเดือนก่อน
CISSP Domain 1 Explained: Security & Risk Management | Mastering the CIA Triad (Part 3)
CISSP Domain 1 Explained: Security & Risk Management | Exam Insights & Domain Overview (Part 2)
มุมมอง 1402 หลายเดือนก่อน
CISSP Domain 1 Explained: Security & Risk Management | Exam Insights & Domain Overview (Part 2)
CISSP Domain 1 Explained: Security & Risk Management | Col. Naha's Live Class Insights | Part 1
มุมมอง 4342 หลายเดือนก่อน
CISSP Domain 1 Explained: Security & Risk Management | Col. Naha's Live Class Insights | Part 1
Thanks Very informative session 👏
Hi Captain why did you mention cissp retired?
Words,, Col Subhajeet, Retired, CISSP ..... good catch
Thank you Subhajeet & Luv Johar for your Cloud Security insights 😊
@@rameshnambaru4303 thank you
Where was the live notification, I missed it l😢
Today's daily bullet eas very informative. Looking forward for the next. Shabbir Karu CISA, Pune
It was very insightful session. 👍
Excellent & very informative session
👍
Informative sessions 👍
Crystal Clear Concepts and easy to understand.
Visit learn.protecte.io/products/672f535dfd87f048354106d4?dgps_u=c&dgps_s=ucpd&dgps_t=cp_u&dgps_uid=64c75c38e4b03f652d4f9abe for downloading the notes
Thank you for the notes. Do you have same for CCSP?
Under production
For downloading the Cornell Notes learn.protecte.io/products/672f535dfd87f048354106d4?dgps_u=c&dgps_s=ucpd&dgps_t=cp_u&dgps_uid=64c75c38e4b03f652d4f9abe
excellent notes by Naha sir for all CISSP aspirants
Kindly upload parts in shorter intervals
52:21 I strongly feel the answer should be B) Access control Because, now that the unusual spike has been identified, Incident Response will be triggered to investigate and mitigate the issue. Since the access control was broken, there was infiltration resulting in spike in outbound traffic
@@shahid7066 access control failure may result into a spike but incident response failed in detecting … all access control violations do not lead to data exfiltration… but good that you are debating and that is base formation for cissp
Thanks for the videos, i think part 3 is missing.
You are correct, I will make sure to add it back to the playlist!
@Protecteacademy Hi Captain, need your help which practice apps you can recommend I already tried learnzApp this is my 2nd attempt would you recommend boson?
How many years of cyber security experience is required to enroll for the course? I'm from a non-IT and Non-Service security background
0 years, I have students from HR and finance background who are joining GRC positions after completing the trainings
Insightful , Thank you !!
Thanks, please subscribe to our channel
Hi sir I have followed your TH-cam cissp playlist and passed the cert, Thanks a lot.
Thanks for sharing, according to the Official Study Guide ...No read up (Simple security) is for Bella-LaPadula
No read-up is there in Biba also. But, the logic is different. You are not allowed to read up so that you do not end up corrupting your information
The aim of Biba is to protect Integrity
@@Protecteacademy thanks for clarifying
You have violated the star property by "writing down" this information to us. But no worries, I am not a spy lol.
@@youtubeviolatedme7123 public information was allowed LOL
Dont choose any career for high pay...bad idea
Thanks, please subscribe to our channel
Thanks for sharing. The illustration was spot on.. interesting the way you pronounce discretionary
@@supersmart671 thanks
@@Protecteacademy just for your consideration th-cam.com/video/I0WuxIQA5Xg/w-d-xo.htmlsi=NCvbZQNclZLBzWgg
After these two questions I am a certified CISSP failure....
Dont Worry.. Be at it...Thats why we are there
I got it completely wrong
Hope it Helps
Thank God...i got this right 🎉🎉🎉🎉🎉
Great
Thanks for the tricky CISSP question example .
@@tigerjon1 Happy to help.. Subscribe to our channel and we will keep posting such interesting and tricky questions
Thanks for sharing. There was a question in the Cybex Security guide about voiding the ATO of contractor how is it not taking an action?
The questions is Sybex are direct. Voiding the ATO would be done by senior management. A technician would not be voiding the contract.
Hi , just confirming the Domain 4 answer should be firewall.....since IDS can't block the attacks but only detect....
NGFW come with IDS IPS capabilities
We still recommend Sybex 10 edition
I can't thank you enough. This session brings so much about GRC from fundamental to advanced. Totally useful for me 🎉
Great to hear!
Sybex CISSP is 10th edition now. Which is around 6K INR. The Destination CISSP Concise guide is in the first edition...
Second edition of Dest cert kindle version launching 12th June for 3 USD.
DestCert has released 2nd edition!!!
@@girishprabhakar9292 thanks
i want to renroll cyber security course
Hi Omar, Can you please share your phone number. We will contact you.
Thank you for sharing the words of wisdom,this would definitely benefit the aspiring candidates 🙌
You're so welcome!
Hello I am an aspiring CISA.I come from a fintech domain where I am a software implementation team member.As I study for the exam I have a lot of questions regarding the opportunities I should look for (as I am sure I will clear the exam - it is a necessity) Coming from not so technical background just by passing the exam what are the future roles I can look at. Are there a few more things I should learn in addition to passing the CISA exam? I am sure there are many like me who have numerous questions in this regard. Can you make a short guidance video in this context.will be of some great help. Thanks, Bhagya
You should look at GRC analyst roles. TPM roles in IT project management industry
Hi Sir, I have completed ISO27001 and Business continuity certification with 2.5 years work ex with projects in Cyber maturity , ITGC and ITACs which certiications I should take up next?
CISA Should be your next goal
Very informative and gives a clear picture , thank you 👏👏
Hi Sir I have completed ISO27001 and BCMS certification. And currently working on Cyber Maturity assessments, vendor management etc. What next certification I should take up need your guidance on it.
CISA, CISSP, Common Criteria, SOC2
Great info...
High Quality content, as always. And clearly, Col Naha has put in a lot of effort to formulate the explainer questions. Highly recommended.
Learn at your own pace. Earn a prestigious certificate of completion, 5 CPE Points, and become Interview Ready! First 100 Enrollments to get flat 50% off! ENROLL NOW: learn.protecte.io/courses/Governance-Risk-Management-and-Compliance-GRC-Analyst-6538fb83e4b036e384ffaff5-6538fb83e4b036e384ffaff5
Very Good videos so far!!!
Thanks!
Level up your cybersecurity career with our knowledge and training platform. Visit us today at learn.protecte.io Or write to us here- support@protecte.io Happy learning 🛡🎓
Thank you, sir. High quality content, as always.
Thanks Benjamin
Are you a Cybersecurity enthusiast looking to upskill? Visit our learning centre to supercharge your career: learn.protecte.io/courses
Are you a cybersecurity enthusiast who is looking to upskill? Visit our website and supercharge your career! learn.protecte.io/courses
That’s awesome to hear! Good luck with your TH-cam channel!
Thank you so much!!
Visit our website at www.learn.protecte.io for some engaging content and courses