Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 10
9:40
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 9
8:51
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 8
10:36
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 7
10:33
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 6
11:35
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 5
8:59
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 4
9:32
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 3
9:54
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 1
25:23
Center for Cyber Security Studies & Research
Mastering Threat Hunting: Strategies for Cyber Defense - Part 2
7:42
Center for Cyber Security Studies & Research
Cyber Security Session on ICS Security
1:40:30
Center for Cyber Security Studies & Research
Cyber Security Supply Chain Risk Managament
3:38:16
Center for Cyber Security Studies & Research
आइये जाने साइबर सुरक्षा के बारे में.. #infosecurity #cybersecurity #technology
11:50
Center for Cyber Security Studies & Research
Become a Cybersecurity Pro with (Ethical Hacker & Penetration Tester) EHPT Certification!
3:06
Center for Cyber Security Studies & Research
Unlocking the World of Ethical Hacking & Penetration Testing!
0:58
Center for Cyber Security Studies & Research
Cyber Security: Everything You Need to Know! (In English)
9:48
Center for Cyber Security Studies & Research
Mastering Ethical Hacking: A Beginner's Guide to Web Penetration
5:55
Center for Cyber Security Studies & Research
How to Make a Career in Digital Forensics | CWFE Certification Guide
5:21
Center for Cyber Security Studies & Research
CFCS2R Q3-2024 , Orientation session
1:01:18
Center for Cyber Security Studies & Research
SecureSphere Foundation: Empowering Cybersecurity Experts
2:10
Center for Cyber Security Studies & Research
Inside a Security Operations Center: How It Works! #cybersecurityawareness #infosec
3:16
Center for Cyber Security Studies & Research
कैसे साइबर सुरक्षा ग्रामीण विकास में मदद कर सकती है #rural #ruraldevelopment
1:51
Center for Cyber Security Studies & Research
Importance of Cyber Security #infosec #cybersecurityawareness #cybersecuritytraining
4:39
Center for Cyber Security Studies & Research
Cyber Security #cybersecurityawareness #cybersecurity #cybersecuritytraining #infosec
5:41
Center for Cyber Security Studies & Research
Mastering Email Security by Nikhil Srivastava
1:05:53
Center for Cyber Security Studies & Research
ISO 27001 Framework Introduction, Risk Assessment, Clause 4-6
4:03:15
Center for Cyber Security Studies & Research
Data Backup, Ransomware and Intro to Malware Analysis
4:40:31
Center for Cyber Security Studies & Research
Bhagavad Gita & Cybersecurity: Timeless Wisdom for a Modern Digital World #infosecurity #cyber
1:27
Center for Cyber Security Studies & Research
Session on VAPT
4:03:41
Center for Cyber Security Studies & Research
पावर सेक्टर में साइबर सुरक्षा: ऊर्जा की रक्षा, देश की सुरक्षा #cybersecurity #infosec #power
1:32
Center for Cyber Security Studies & Research
Device/End Point Security & SCADA Security
10:35
Center for Cyber Security Studies & Research
Ransomware Explained: Protect Your Devices! #infosec #cybersecurity #hack #CFCS2R
0:57
Center for Cyber Security Studies & Research
Confidentiality in Cyber Security: Explained! #infosec #cybersecurity #hack #CFCS2R
1:00
Center for Cyber Security Studies & Research
Beware of These Online Scams! Stay Safe! #infosec #cybersecurity #hack #CFCS2R
0:47
Center for Cyber Security Studies & Research
मजबूत पासवर्ड बनाएं और सुरक्षित रहें! #cybersecurity #infosec #smartphone
1:00
Center for Cyber Security Studies & Research
𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐞𝐝 𝐖𝐢𝐧𝐝𝐨𝐰𝐬 𝐅𝐨𝐫𝐞𝐧𝐬𝐢𝐜 𝐄𝐱𝐩𝐞𝐫𝐭 (𝐂𝐖𝐅𝐄)
1:26
Center for Cyber Security Studies & Research
Public Wi-Fi Risks: Stay Safe! #infosec #cybersecurity #hack #CFCS2R
0:50
Center for Cyber Security Studies & Research
TCP vs UDP: Quick Explainer! #infosec #cybersecurity #hack #CFCS2R
1:00
Center for Cyber Security Studies & Research
Understanding the OSI Model in 1 Minute: A Detailed Breakdown
1:09
Center for Cyber Security Studies & Research
Safe Online Shopping Tips: Spot Secure Sites & Avoid Scams! #cybersecurity #dataprotection #infosec
0:47
Center for Cyber Security Studies & Research
Law of Attraction for Success in Exams. #Manifestation #mindsetshift #VisualizeYourFuture
0:42
Center for Cyber Security Studies & Research
Start Your Cyber security Career with Center for cyber security studies and research
0:59
Center for Cyber Security Studies & Research
Stay Safe on Social Media! 🛡️ #cfcs2r #cybersecurity
0:59
Center for Cyber Security Studies & Research
Why You Need Two-Factor Authentication NOW! #cfcs2r #2fa #cybersecurity #education
0:48
Center for Cyber Security Studies & Research
Spot & Avoid Phishing Attacks! 🚫📧 #CFCS2R #cybersecurity #phishingattacks
0:53
Center for Cyber Security Studies & Research
Top Password Security Tips in 60s! #cybersecurity #password #CFCS2R #securespherefoundation
0:46
Center for Cyber Security Studies & Research
Session on Network Security( 4 Hours Session)
4:14:14
Center for Cyber Security Studies & Research
Understanding NIST Cybersecurity Framework (CSF) 2.0: A Comprehensive Guide
1:59:56
Center for Cyber Security Studies & Research
Introduction to Cyber Security as Cyber Risk Management
2:08:55
Center for Cyber Security Studies & Research
Digital Forensics Bootcamp
3:41:44
Center for Cyber Security Studies & Research
Foundations of Cyber Defense: The Importance of CIA in Cyber Security
1:01:58
Center for Cyber Security Studies & Research
Cyber Security
Center for Cyber Security Studies & Research
CrowdStrike outage affects Microsoft systems worldwide Explained in Hindi
6:51
Center for Cyber Security Studies & Research
"𝑯𝒂𝒄𝒌𝒊𝒏𝒈 𝒕𝒉𝒆 𝑯𝒖𝒎𝒂𝒏: 𝑨𝒓𝒆 𝒀𝒐𝒖 𝒕𝒉𝒆 𝑾𝒆𝒂𝒌𝒆𝒔𝒕 𝑳𝒊𝒏𝒌 𝒊𝒏 𝒀𝒐𝒖𝒓 𝑪𝒚𝒃𝒆𝒓𝒔𝒆𝒄𝒖𝒓𝒊𝒕𝒚?
1:22:20
Center for Cyber Security Studies & Research
Chainsaw for Windows Event log Analysis
21:16
Center for Cyber Security Studies & Research
Windows Event Log Analysis
40:12
Center for Cyber Security Studies & Research
LNK Files & Browser Forensics
32:17
Center for Cyber Security Studies & Research
USB Forensics
21:13
Center for Cyber Security Studies & Research
Shellbags Forensics
36:25
Center for Cyber Security Studies & Research
Understanding Windows Registries
44:33
Center for Cyber Security Studies & Research
Installing and Using FTK Imager, Capturing the Volatile Memory, RAM DUMP, DumpIt, Belkasoft Memory
48:42
Center for Cyber Security Studies & Research
Digital Forensics - Analyze the Prefetch and Registry
46:57
Center for Cyber Security Studies & Research
Webinar on "Understanding the MITRE ATT&CK Framework " Speaker: Dr. Prashant Saxena
47:51
Center for Cyber Security Studies & Research
International Conference on AI in Cyber Security- Part 3
1:35:25
Center for Cyber Security Studies & Research
International Conference on AI in Cyber Security - Part 2
1:31:45
Center for Cyber Security Studies & Research
XSS ATTACK ON SOCIAL MEDIA BY DR. SALIHA BATHOOL
1:11:44
Center for Cyber Security Studies & Research
Orientation Session of Digital Forensics Bootcamp
36:52
Center for Cyber Security Studies & Research
Presentation on Windows Security by CFCS2R Interns
3:20:25
Center for Cyber Security Studies & Research
Mastering Windows Security: Essential Hardening Techniques for a Robust System
31:54
Center for Cyber Security Studies & Research
Presentation by Interns on Linux File System Basics.
2:50:43
Center for Cyber Security Studies & Research
Video Tutorial to Install Ubuntu and Kali Linux on VM Ware
24:05
Center for Cyber Security Studies & Research
UNDERSTANDING AWS CLOUD AND LINUX
1:37:41
Center for Cyber Security Studies & Research
Orientation Session of Interns at CFCS2R
25:16
Center for Cyber Security Studies & Research
Unraveling Digital Forensics: Part 1
1:05:57
Center for Cyber Security Studies & Research
Mastering Web Security with Burp Suite | Comprehensive Tutorial
1:38:48
Center for Cyber Security Studies & Research
Mastering Subnetting for Network Security | A Comprehensive Tutorial
1:40:58
Center for Cyber Security Studies & Research
The Ultimate Beginner's Guide to Understanding Networking Basics Part 1
1:54:11
Center for Cyber Security Studies & Research
Deep dive into Broken Access control A01:2021 and Cryptographic Failures A02:2021
1:20:40
Center for Cyber Security Studies & Research
Mastering OSINT: A Comprehensive Guide for Effective Intelligence Gathering- Part 2
1:31:18
Center for Cyber Security Studies & Research
Mastering OSINT: A Comprehensive Guide for Effective Intelligence Gathering- Part 3
19:54
Center for Cyber Security Studies & Research
Emerging Security Threats & Safety Mitigations
55:49
Center for Cyber Security Studies & Research
Mastering OSINT: A Comprehensive Guide for Effective Intelligence Gathering- Part 1
1:38:10
Center for Cyber Security Studies & Research
Securing the Grid: Cyber Security in the Power Sector | #CyberSecurity #PowerSector #GridProtection
44:56
Center for Cyber Security Studies & Research
Mastering Malware: Understanding Types and Techniques for Analysis
48:26
Center for Cyber Security Studies & Research
🔒 Secure Your Digital Life 🌐 | Protecting Your Online World
1:18:58
Center for Cyber Security Studies & Research
Understanding Cybersecurity Policies: A Deep Dive
1:43:10
Center for Cyber Security Studies & Research
Mastering Cybersecurity: RISK Assessment & Risk Management Explained
3:26:42
Center for Cyber Security Studies & Research
NIST Cyber Security Framework Explained: Understanding Core, Tiers & Profiles
2:22:20
Center for Cyber Security Studies & Research
Demystifying Firewall, IPS, and IDS: Your Complete Guide to Network Security #cybersecurity #snort
3:14:51
Center for Cyber Security Studies & Research
MITRE ATT&CK Framework in Hindi.... #cybersecurity #mitre #threathunting
53:59
Center for Cyber Security Studies & Research
Cyber Security Risk , CIA Triad, Risk Assessment , Q&A by Prashant Saxena
2:25:30
Center for Cyber Security Studies & Research
Understanding MITRE Attack Framework #mitre #IOC #cybersecurity #threathunting
52:30
Center for Cyber Security Studies & Research
Basic Introduction to Cyber Security and General Concepts
1:29:24