you are doing wonderful job Prab! . you have a special talent to convey things which directly transfer ( low latency , high speed ) things to our brains :) . Awesome! . Infini band ! infini respect!
Awesome Work!!The Question at 1:42:00 , the answer Prabh calls out is for B-Beta but the marked answer on the screen says A-Alpha. Can you please clarify.
Attention ! @Prabh Nair! errata!! After 1:43:10 th you are saying "B for beta but the actual answer is 'A' , though the video it highlights also the Answer A!! I am a bit confused too. Please do a voice correction, if I am correct.
Great video! Although I don’t necessarily agree with the last answer. Two issues, most threats originate via email or on an endpoint. Most organizations run this capability on their firewalls today yet attackers easily penetrate the FW with ransomware attacks daily. The best option would be endpoint protection if you have to choose 1. Most attacks are E/W, what good is the perimeter firewall? Second best would be email server protection but the question does not mention email as a primary threat vector.
@ Prabh Nair. thanks for sharing insights of domain 4 in interesting and clearer way, i hv a doubt at 1.50.19 you said mail is encrypted with public key, did u mean private key?
Hi prabh , you explanations were really good in understanding all 8 domains. Yesterday i sat for the exam knowing all the concepts which i watched through religiuosly and did my sybex reading once. I failed because not that i was low on knowledge , I couldnt actually comprehend their language . The moment it found my weakness in the first 50, it started exploiting me with high technical questions( zero days)which were lengthy enough to make you not understand. I prepared for 6 months , having 10+ yrs of exp and same engineering batch. Any advice , would help me a lott .Thx prabh
Do you have videos for the other CISSP domains? This is great... I'm getting more technical advice from you than other sources.
you are doing wonderful job Prab! . you have a special talent to convey things which directly transfer ( low latency , high speed ) things to our brains :) . Awesome! . Infini band ! infini respect!
Awesome Work!!The Question at 1:42:00 , the answer Prabh calls out is for B-Beta but the marked answer on the screen says A-Alpha. Can you please clarify.
It's a sujatha
@@PrabhNair1 Thank you so much. You're amazing!! Keep continuing your good work and you have a great fan following overseas.
Great video as usual. Appreciate all you do for the CISSP community, Prabh
You do amazing work. Thanks for your valuable insights.
Thank you for all you do for the community Prabh. I will let you know once I pass the exam. All your videos are really helpful🙏
Thanks,
I knew most of the Answers. but it is very helpful and your explanation.
keep it up.
Awesome Video Prabh. I was struggling particularly with D4. this video gave me confidence.
Great explanation and thank you for adding latest 2024 topics. It would be helpful if you can provide more 2024 CISSP additions in coffee shots
Prabh, you are saying BGP instead of IGP at 3:54 minute. The answer is A.
Attention !
@Prabh Nair! errata!!
After 1:43:10 th you are saying "B for beta but the actual answer is 'A' , though the video it highlights also the Answer A!! I am a bit confused too. Please do a voice correction, if I am correct.
Sorry it's A
Excellent explanation as always. I wish I watched this video before my first attempt 😪
Great video! Although I don’t necessarily agree with the last answer. Two issues, most threats originate via email or on an endpoint. Most organizations run this capability on their firewalls today yet attackers easily penetrate the FW with ransomware attacks daily. The best option would be endpoint protection if you have to choose 1. Most attacks are E/W, what good is the perimeter firewall? Second best would be email server protection but the question does not mention email as a primary threat vector.
Thank you for the video
@ Prabh Nair. thanks for sharing insights of domain 4 in interesting and clearer way, i hv a doubt at 1.50.19 you said mail is encrypted with public key, did u mean private key?
Hi prabh , you explanations were really good in understanding all 8 domains. Yesterday i sat for the exam knowing all the concepts which i watched through religiuosly and did my sybex reading once. I failed because not that i was low on knowledge , I couldnt actually comprehend their language . The moment it found my weakness in the first 50, it started exploiting me with high technical questions( zero days)which were lengthy enough to make you not understand. I prepared for 6 months , having 10+ yrs of exp and same engineering batch. Any advice , would help me a lott .Thx prabh
Bro , this is really helpful, thank you for the valuable work!
Thank you so much Prabh 👏 words alone cannot express my gratitude ❤
Excellent work Prabh. Many thanks for your effort
Amazing video Prabh. Thanks for taking that effort for us.
Good one Prabh..
The domain that made rip my hair off the most. Now i know why so many IT pros are bald.
Thanks for sharing! Some solutions not Some solution
Great conceptual questions !
as always, awesome content !!
Pls do More sessions for Isc2 CC..
Its been a while you did on that
Mr. Prabh, good day, is there anyway to contact you, to get some guidance to c level certification and subsequent trainings... Please do reply
As per my understanding RIP supports 15 hops , 16th one not reachable..
Appreciate the videos Prabh, because of you in passed the CC!🙏🏿
dns poisoning vs pharming...seems to be a thin line difference..
Prabh sir: could you explain the same?
Good work
Thank you