you are doing wonderful job Prab! . you have a special talent to convey things which directly transfer ( low latency , high speed ) things to our brains :) . Awesome! . Infini band ! infini respect!
Awesome Work!!The Question at 1:42:00 , the answer Prabh calls out is for B-Beta but the marked answer on the screen says A-Alpha. Can you please clarify.
Hi prabh , you explanations were really good in understanding all 8 domains. Yesterday i sat for the exam knowing all the concepts which i watched through religiuosly and did my sybex reading once. I failed because not that i was low on knowledge , I couldnt actually comprehend their language . The moment it found my weakness in the first 50, it started exploiting me with high technical questions( zero days)which were lengthy enough to make you not understand. I prepared for 6 months , having 10+ yrs of exp and same engineering batch. Any advice , would help me a lott .Thx prabh
Great video! Although I don’t necessarily agree with the last answer. Two issues, most threats originate via email or on an endpoint. Most organizations run this capability on their firewalls today yet attackers easily penetrate the FW with ransomware attacks daily. The best option would be endpoint protection if you have to choose 1. Most attacks are E/W, what good is the perimeter firewall? Second best would be email server protection but the question does not mention email as a primary threat vector.
@ Prabh Nair. thanks for sharing insights of domain 4 in interesting and clearer way, i hv a doubt at 1.50.19 you said mail is encrypted with public key, did u mean private key?
Attention ! @Prabh Nair! errata!! After 1:43:10 th you are saying "B for beta but the actual answer is 'A' , though the video it highlights also the Answer A!! I am a bit confused too. Please do a voice correction, if I am correct.
you are doing wonderful job Prab! . you have a special talent to convey things which directly transfer ( low latency , high speed ) things to our brains :) . Awesome! . Infini band ! infini respect!
Do you have videos for the other CISSP domains? This is great... I'm getting more technical advice from you than other sources.
Thank You Prabh, this content is very much helpful and informative to approach questions sincerely.
Thank you for all you do for the community Prabh. I will let you know once I pass the exam. All your videos are really helpful🙏
Awesome Work!!The Question at 1:42:00 , the answer Prabh calls out is for B-Beta but the marked answer on the screen says A-Alpha. Can you please clarify.
It's a sujatha
@@PrabhNair1 Thank you so much. You're amazing!! Keep continuing your good work and you have a great fan following overseas.
Thank you for the video
Great video as usual. Appreciate all you do for the CISSP community, Prabh
You do amazing work. Thanks for your valuable insights.
Great explanation and thank you for adding latest 2024 topics. It would be helpful if you can provide more 2024 CISSP additions in coffee shots
Awesome Video Prabh. I was struggling particularly with D4. this video gave me confidence.
Bro , this is really helpful, thank you for the valuable work!
Good one Prabh..
Thanks,
I knew most of the Answers. but it is very helpful and your explanation.
keep it up.
Thank you so much Prabh 👏 words alone cannot express my gratitude ❤
Hi prabh , you explanations were really good in understanding all 8 domains. Yesterday i sat for the exam knowing all the concepts which i watched through religiuosly and did my sybex reading once. I failed because not that i was low on knowledge , I couldnt actually comprehend their language . The moment it found my weakness in the first 50, it started exploiting me with high technical questions( zero days)which were lengthy enough to make you not understand. I prepared for 6 months , having 10+ yrs of exp and same engineering batch. Any advice , would help me a lott .Thx prabh
Great video! Although I don’t necessarily agree with the last answer. Two issues, most threats originate via email or on an endpoint. Most organizations run this capability on their firewalls today yet attackers easily penetrate the FW with ransomware attacks daily. The best option would be endpoint protection if you have to choose 1. Most attacks are E/W, what good is the perimeter firewall? Second best would be email server protection but the question does not mention email as a primary threat vector.
Excellent explanation as always. I wish I watched this video before my first attempt 😪
Great conceptual questions !
Excellent work Prabh. Many thanks for your effort
@ Prabh Nair. thanks for sharing insights of domain 4 in interesting and clearer way, i hv a doubt at 1.50.19 you said mail is encrypted with public key, did u mean private key?
Prabh, you are saying BGP instead of IGP at 3:54 minute. The answer is A.
Amazing video Prabh. Thanks for taking that effort for us.
Attention !
@Prabh Nair! errata!!
After 1:43:10 th you are saying "B for beta but the actual answer is 'A' , though the video it highlights also the Answer A!! I am a bit confused too. Please do a voice correction, if I am correct.
Sorry it's A
The domain that made rip my hair off the most. Now i know why so many IT pros are bald.
Thanks for sharing! Some solutions not Some solution
as always, awesome content !!
Pls do More sessions for Isc2 CC..
Its been a while you did on that
Mr. Prabh, good day, is there anyway to contact you, to get some guidance to c level certification and subsequent trainings... Please do reply
Good work
As per my understanding RIP supports 15 hops , 16th one not reachable..
Appreciate the videos Prabh, because of you in passed the CC!🙏🏿
dns poisoning vs pharming...seems to be a thin line difference..
Prabh sir: could you explain the same?
Thank you