Mastering Threat Hunting: Strategies for Cyber Defense - Part 10
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 10
9:40
Mastering Threat Hunting: Strategies for Cyber Defense - Part 9
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 9
8:51
Mastering Threat Hunting: Strategies for Cyber Defense - Part 8
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 8
10:36
Mastering Threat Hunting: Strategies for Cyber Defense - Part 7
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 7
10:33
Mastering Threat Hunting: Strategies for Cyber Defense - Part 6
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 6
11:35
Mastering Threat Hunting: Strategies for Cyber Defense - Part 5
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 5
8:59
Mastering Threat Hunting: Strategies for Cyber Defense - Part 4
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 4
9:32
Mastering Threat Hunting: Strategies for Cyber Defense - Part 3
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 3
9:54
Mastering Threat Hunting: Strategies for Cyber Defense - Part 1
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 1
25:23
Mastering Threat Hunting: Strategies for Cyber Defense - Part 2
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 2
7:42
Cyber Security Session on ICS Security
Center for Cyber Security Studies & Research
Cyber Security Session on ICS Security
1:40:30
Cyber Security Supply Chain Risk Managament
Center for Cyber Security Studies & Research
Cyber Security Supply Chain Risk Managament
3:38:16
आइये जाने साइबर सुरक्षा के बारे में..  #infosecurity #cybersecurity #technology
Center for Cyber Security Studies & Research
आइये जाने साइबर सुरक्षा के बारे में.. #infosecurity #cybersecurity #technology
11:50
Become a Cybersecurity Pro with (Ethical Hacker & Penetration Tester) EHPT Certification!
Center for Cyber Security Studies & Research
Become a Cybersecurity Pro with (Ethical Hacker & Penetration Tester) EHPT Certification!
3:06
Unlocking the World of Ethical Hacking & Penetration Testing!
Center for Cyber Security Studies & Research
Unlocking the World of Ethical Hacking & Penetration Testing!
0:58
Cyber Security: Everything You Need to Know! (In English)
Center for Cyber Security Studies & Research
Cyber Security: Everything You Need to Know! (In English)
9:48
Mastering Ethical Hacking: A Beginner's Guide to Web Penetration
Center for Cyber Security Studies & Research
Mastering Ethical Hacking: A Beginner's Guide to Web Penetration
5:55
How to Make a Career in Digital Forensics | CWFE Certification Guide
Center for Cyber Security Studies & Research
How to Make a Career in Digital Forensics | CWFE Certification Guide
5:21
CFCS2R Q3-2024 , Orientation  session
Center for Cyber Security Studies & Research
CFCS2R Q3-2024 , Orientation session
1:01:18
SecureSphere Foundation: Empowering Cybersecurity Experts
Center for Cyber Security Studies & Research
SecureSphere Foundation: Empowering Cybersecurity Experts
2:10
Inside a Security Operations Center: How It Works! #cybersecurityawareness #infosec
Center for Cyber Security Studies & Research
Inside a Security Operations Center: How It Works! #cybersecurityawareness #infosec
3:16
कैसे साइबर सुरक्षा ग्रामीण विकास में मदद कर सकती है #rural #ruraldevelopment
Center for Cyber Security Studies & Research
कैसे साइबर सुरक्षा ग्रामीण विकास में मदद कर सकती है #rural #ruraldevelopment
1:51
Importance of Cyber Security #infosec #cybersecurityawareness #cybersecuritytraining
Center for Cyber Security Studies & Research
Importance of Cyber Security #infosec #cybersecurityawareness #cybersecuritytraining
4:39
Cyber Security #cybersecurityawareness #cybersecurity #cybersecuritytraining #infosec
Center for Cyber Security Studies & Research
Cyber Security #cybersecurityawareness #cybersecurity #cybersecuritytraining #infosec
5:41
Mastering Email Security by Nikhil Srivastava
Center for Cyber Security Studies & Research
Mastering Email Security by Nikhil Srivastava
1:05:53
ISO 27001 Framework Introduction, Risk Assessment, Clause 4-6
Center for Cyber Security Studies & Research
ISO 27001 Framework Introduction, Risk Assessment, Clause 4-6
4:03:15
Data Backup, Ransomware and Intro to Malware Analysis
Center for Cyber Security Studies & Research
Data Backup, Ransomware and Intro to Malware Analysis
4:40:31
Bhagavad Gita & Cybersecurity: Timeless Wisdom for a Modern Digital World #infosecurity #cyber
Center for Cyber Security Studies & Research
Bhagavad Gita & Cybersecurity: Timeless Wisdom for a Modern Digital World #infosecurity #cyber
1:27
Session on VAPT
Center for Cyber Security Studies & Research
Session on VAPT
4:03:41
पावर सेक्टर में साइबर सुरक्षा: ऊर्जा की रक्षा, देश की सुरक्षा #cybersecurity #infosec #power
Center for Cyber Security Studies & Research
पावर सेक्टर में साइबर सुरक्षा: ऊर्जा की रक्षा, देश की सुरक्षा #cybersecurity #infosec #power
1:32
Device/End Point Security & SCADA Security
Center for Cyber Security Studies & Research
Device/End Point Security & SCADA Security
10:35
Ransomware Explained: Protect Your Devices!  #infosec #cybersecurity #hack #CFCS2R
Center for Cyber Security Studies & Research
Ransomware Explained: Protect Your Devices! #infosec #cybersecurity #hack #CFCS2R
0:57
Confidentiality in Cyber Security: Explained! #infosec #cybersecurity #hack #CFCS2R
Center for Cyber Security Studies & Research
Confidentiality in Cyber Security: Explained! #infosec #cybersecurity #hack #CFCS2R
1:00
Beware of These Online Scams! Stay Safe! #infosec #cybersecurity #hack #CFCS2R
Center for Cyber Security Studies & Research
Beware of These Online Scams! Stay Safe! #infosec #cybersecurity #hack #CFCS2R
0:47
मजबूत पासवर्ड बनाएं और सुरक्षित रहें!  #cybersecurity #infosec #smartphone
Center for Cyber Security Studies & Research
मजबूत पासवर्ड बनाएं और सुरक्षित रहें! #cybersecurity #infosec #smartphone
1:00
𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐞𝐝 𝐖𝐢𝐧𝐝𝐨𝐰𝐬 𝐅𝐨𝐫𝐞𝐧𝐬𝐢𝐜 𝐄𝐱𝐩𝐞𝐫𝐭 (𝐂𝐖𝐅𝐄)
Center for Cyber Security Studies & Research
𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐞𝐝 𝐖𝐢𝐧𝐝𝐨𝐰𝐬 𝐅𝐨𝐫𝐞𝐧𝐬𝐢𝐜 𝐄𝐱𝐩𝐞𝐫𝐭 (𝐂𝐖𝐅𝐄)
1:26
Public Wi-Fi Risks: Stay Safe! #infosec #cybersecurity #hack #CFCS2R
Center for Cyber Security Studies & Research
Public Wi-Fi Risks: Stay Safe! #infosec #cybersecurity #hack #CFCS2R
0:50
TCP vs UDP: Quick Explainer!  #infosec #cybersecurity #hack #CFCS2R
Center for Cyber Security Studies & Research
TCP vs UDP: Quick Explainer! #infosec #cybersecurity #hack #CFCS2R
1:00
Understanding the OSI Model in 1 Minute: A Detailed Breakdown
Center for Cyber Security Studies & Research
Understanding the OSI Model in 1 Minute: A Detailed Breakdown
1:09
Safe Online Shopping Tips: Spot Secure Sites & Avoid Scams! #cybersecurity  #dataprotection #infosec
Center for Cyber Security Studies & Research
Safe Online Shopping Tips: Spot Secure Sites & Avoid Scams! #cybersecurity #dataprotection #infosec
0:47
Law of Attraction for Success in Exams.  #Manifestation #mindsetshift #VisualizeYourFuture
Center for Cyber Security Studies & Research
Law of Attraction for Success in Exams. #Manifestation #mindsetshift #VisualizeYourFuture
0:42
Start Your Cyber security Career  with Center for cyber security studies and research
Center for Cyber Security Studies & Research
Start Your Cyber security Career with Center for cyber security studies and research
0:59
Stay Safe on Social Media! 🛡️ #cfcs2r #cybersecurity
Center for Cyber Security Studies & Research
Stay Safe on Social Media! 🛡️ #cfcs2r #cybersecurity
0:59
Why You Need Two-Factor Authentication NOW!  #cfcs2r #2fa #cybersecurity  #education
Center for Cyber Security Studies & Research
Why You Need Two-Factor Authentication NOW! #cfcs2r #2fa #cybersecurity #education
0:48
Spot & Avoid Phishing Attacks! 🚫📧 #CFCS2R #cybersecurity #phishingattacks
Center for Cyber Security Studies & Research
Spot & Avoid Phishing Attacks! 🚫📧 #CFCS2R #cybersecurity #phishingattacks
0:53
Top Password Security Tips in 60s! #cybersecurity #password #CFCS2R #securespherefoundation
Center for Cyber Security Studies & Research
Top Password Security Tips in 60s! #cybersecurity #password #CFCS2R #securespherefoundation
0:46
Session on Network Security( 4 Hours Session)
Center for Cyber Security Studies & Research
Session on Network Security( 4 Hours Session)
4:14:14
Understanding NIST Cybersecurity Framework (CSF) 2.0: A Comprehensive Guide
Center for Cyber Security Studies & Research
Understanding NIST Cybersecurity Framework (CSF) 2.0: A Comprehensive Guide
1:59:56
Introduction to Cyber Security as Cyber Risk Management
Center for Cyber Security Studies & Research
Introduction to Cyber Security as Cyber Risk Management
2:08:55
Digital Forensics Bootcamp
Center for Cyber Security Studies & Research
Digital Forensics Bootcamp
3:41:44
Foundations of Cyber Defense: The Importance of CIA in Cyber Security
Center for Cyber Security Studies & Research
Foundations of Cyber Defense: The Importance of CIA in Cyber Security
1:01:58
Cyber Security
Center for Cyber Security Studies & Research
Cyber Security
CrowdStrike outage affects Microsoft systems worldwide Explained in Hindi
Center for Cyber Security Studies & Research
CrowdStrike outage affects Microsoft systems worldwide Explained in Hindi
6:51
"𝑯𝒂𝒄𝒌𝒊𝒏𝒈 𝒕𝒉𝒆 𝑯𝒖𝒎𝒂𝒏: 𝑨𝒓𝒆 𝒀𝒐𝒖 𝒕𝒉𝒆 𝑾𝒆𝒂𝒌𝒆𝒔𝒕 𝑳𝒊𝒏𝒌 𝒊𝒏 𝒀𝒐𝒖𝒓 𝑪𝒚𝒃𝒆𝒓𝒔𝒆𝒄𝒖𝒓𝒊𝒕𝒚?
Center for Cyber Security Studies & Research
"𝑯𝒂𝒄𝒌𝒊𝒏𝒈 𝒕𝒉𝒆 𝑯𝒖𝒎𝒂𝒏: 𝑨𝒓𝒆 𝒀𝒐𝒖 𝒕𝒉𝒆 𝑾𝒆𝒂𝒌𝒆𝒔𝒕 𝑳𝒊𝒏𝒌 𝒊𝒏 𝒀𝒐𝒖𝒓 𝑪𝒚𝒃𝒆𝒓𝒔𝒆𝒄𝒖𝒓𝒊𝒕𝒚?
1:22:20
Chainsaw for Windows Event log Analysis
Center for Cyber Security Studies & Research
Chainsaw for Windows Event log Analysis
21:16
Windows Event Log Analysis
Center for Cyber Security Studies & Research
Windows Event Log Analysis
40:12
LNK Files & Browser Forensics
Center for Cyber Security Studies & Research
LNK Files & Browser Forensics
32:17
USB Forensics
Center for Cyber Security Studies & Research
USB Forensics
21:13
Shellbags Forensics
Center for Cyber Security Studies & Research
Shellbags Forensics
36:25
Understanding Windows Registries
Center for Cyber Security Studies & Research
Understanding Windows Registries
44:33
Installing and Using FTK Imager, Capturing the Volatile Memory, RAM DUMP, DumpIt, Belkasoft Memory
Center for Cyber Security Studies & Research
Installing and Using FTK Imager, Capturing the Volatile Memory, RAM DUMP, DumpIt, Belkasoft Memory
48:42
Digital Forensics - Analyze the Prefetch and Registry
Center for Cyber Security Studies & Research
Digital Forensics - Analyze the Prefetch and Registry
46:57
Webinar on "Understanding the MITRE ATT&CK Framework " Speaker: Dr. Prashant Saxena
Center for Cyber Security Studies & Research
Webinar on "Understanding the MITRE ATT&CK Framework " Speaker: Dr. Prashant Saxena
47:51
International Conference on AI in Cyber Security- Part 3
Center for Cyber Security Studies & Research
International Conference on AI in Cyber Security- Part 3
1:35:25
International Conference on AI in Cyber Security - Part 2
Center for Cyber Security Studies & Research
International Conference on AI in Cyber Security - Part 2
1:31:45
XSS ATTACK ON SOCIAL MEDIA BY DR. SALIHA BATHOOL
Center for Cyber Security Studies & Research
XSS ATTACK ON SOCIAL MEDIA BY DR. SALIHA BATHOOL
1:11:44
Orientation Session of Digital Forensics Bootcamp
Center for Cyber Security Studies & Research
Orientation Session of Digital Forensics Bootcamp
36:52
Presentation on Windows Security by CFCS2R Interns
Center for Cyber Security Studies & Research
Presentation on Windows Security by CFCS2R Interns
3:20:25
Mastering Windows Security: Essential Hardening Techniques for a Robust System
Center for Cyber Security Studies & Research
Mastering Windows Security: Essential Hardening Techniques for a Robust System
31:54
Presentation by Interns on Linux File System Basics.
Center for Cyber Security Studies & Research
Presentation by Interns on Linux File System Basics.
2:50:43
Video Tutorial to Install Ubuntu and Kali Linux on VM Ware
Center for Cyber Security Studies & Research
Video Tutorial to Install Ubuntu and Kali Linux on VM Ware
24:05
UNDERSTANDING AWS CLOUD AND LINUX
Center for Cyber Security Studies & Research
UNDERSTANDING AWS CLOUD AND LINUX
1:37:41
Orientation Session of Interns at CFCS2R
Center for Cyber Security Studies & Research
Orientation Session of Interns at CFCS2R
25:16
Unraveling Digital Forensics: Part 1
Center for Cyber Security Studies & Research
Unraveling Digital Forensics: Part 1
1:05:57
Mastering Web Security with Burp Suite | Comprehensive Tutorial
Center for Cyber Security Studies & Research
Mastering Web Security with Burp Suite | Comprehensive Tutorial
1:38:48
Mastering Subnetting for Network Security | A Comprehensive Tutorial
Center for Cyber Security Studies & Research
Mastering Subnetting for Network Security | A Comprehensive Tutorial
1:40:58
The Ultimate Beginner's Guide to Understanding Networking Basics Part 1
Center for Cyber Security Studies & Research
The Ultimate Beginner's Guide to Understanding Networking Basics Part 1
1:54:11
Deep dive into Broken Access control A01:2021 and Cryptographic Failures A02:2021
Center for Cyber Security Studies & Research
Deep dive into Broken Access control A01:2021 and Cryptographic Failures A02:2021
1:20:40
Mastering OSINT: A Comprehensive Guide for Effective Intelligence Gathering- Part 2
Center for Cyber Security Studies & Research
Mastering OSINT: A Comprehensive Guide for Effective Intelligence Gathering- Part 2
1:31:18
Mastering OSINT: A Comprehensive Guide for Effective Intelligence Gathering- Part 3
Center for Cyber Security Studies & Research
Mastering OSINT: A Comprehensive Guide for Effective Intelligence Gathering- Part 3
19:54
Emerging Security Threats & Safety Mitigations
Center for Cyber Security Studies & Research
Emerging Security Threats & Safety Mitigations
55:49
Mastering OSINT: A Comprehensive Guide for Effective Intelligence Gathering- Part 1
Center for Cyber Security Studies & Research
Mastering OSINT: A Comprehensive Guide for Effective Intelligence Gathering- Part 1
1:38:10
Securing the Grid: Cyber Security in the Power Sector | #CyberSecurity #PowerSector #GridProtection
Center for Cyber Security Studies & Research
Securing the Grid: Cyber Security in the Power Sector | #CyberSecurity #PowerSector #GridProtection
44:56
Mastering Malware: Understanding Types and Techniques for Analysis
Center for Cyber Security Studies & Research
Mastering Malware: Understanding Types and Techniques for Analysis
48:26
🔒 Secure Your Digital Life 🌐 | Protecting Your Online World
Center for Cyber Security Studies & Research
🔒 Secure Your Digital Life 🌐 | Protecting Your Online World
1:18:58
Understanding Cybersecurity Policies: A Deep Dive
Center for Cyber Security Studies & Research
Understanding Cybersecurity Policies: A Deep Dive
1:43:10
Mastering Cybersecurity: RISK Assessment & Risk Management Explained
Center for Cyber Security Studies & Research
Mastering Cybersecurity: RISK Assessment & Risk Management Explained
3:26:42
NIST Cyber Security Framework Explained: Understanding Core, Tiers & Profiles
Center for Cyber Security Studies & Research
NIST Cyber Security Framework Explained: Understanding Core, Tiers & Profiles
2:22:20
Demystifying Firewall, IPS, and IDS: Your Complete Guide to Network Security #cybersecurity #snort
Center for Cyber Security Studies & Research
Demystifying Firewall, IPS, and IDS: Your Complete Guide to Network Security #cybersecurity #snort
3:14:51
MITRE ATT&CK Framework in Hindi.... #cybersecurity #mitre #threathunting
Center for Cyber Security Studies & Research
MITRE ATT&CK Framework in Hindi.... #cybersecurity #mitre #threathunting
53:59
Cyber Security Risk , CIA Triad, Risk Assessment , Q&A by Prashant Saxena
Center for Cyber Security Studies & Research
Cyber Security Risk , CIA Triad, Risk Assessment , Q&A by Prashant Saxena
2:25:30
Understanding MITRE Attack Framework #mitre #IOC #cybersecurity #threathunting
Center for Cyber Security Studies & Research
Understanding MITRE Attack Framework #mitre #IOC #cybersecurity #threathunting
52:30
Basic Introduction to Cyber Security and General Concepts
Center for Cyber Security Studies & Research
Basic Introduction to Cyber Security and General Concepts
1:29:24