- Видео 208
- Просмотров 461 072
GISPP ACADEMY
Саудовская Аравия
Добавлен 10 фев 2019
This is GISPP Official Learning Channel for recordings of our online Presentations and Technical Sessions .GISPP was initiated by a group of Pakistani Information Security professionals living and working in Saudi Arabia. We are actively present on Telegram ,Facebook, LinkedIn ,Instagram and Whatsapp. GISPP is actively participating in different productive activities for capacity building of our youth and IT Professionals .In order to know more about us and stay updated , please like,subscribe and follow our social media channels .
Facebook Page: gispp.org/
Twitter: GisppOfficial
If you are a Pakistani and working in Information security field anywhere in the world ,you are welcome to join GISPP by requesting via our Facebook page or by visiting our website .
Facebook Page: gispp.org/
Twitter: GisppOfficial
If you are a Pakistani and working in Information security field anywhere in the world ,you are welcome to join GISPP by requesting via our Facebook page or by visiting our website .
AI Ethical dilemmas | AI Ethics | What are AI Ethics
The speaker discusses artificial intelligence (AI) and its dilemmas in this session. He also discusses fairness, ethics, and ethical principles. The session also focuses on the problems with AI and their effects. The speaker also discusses the life cycle of an AI system and its reliability. A serious concern is also brought up about how employees of a company that uses AI for their daily tasks may be exposing company data to the internet. GRC is also discussed as a way to address issues that arise from employees of a company abusing AI.
Video has been divided into chapters for your convenience .
00:00 - 02:00 Sneak peek into the video
02:01 - 06:44 Introduction of the Speaker and Agenda
06:4...
Video has been divided into chapters for your convenience .
00:00 - 02:00 Sneak peek into the video
02:01 - 06:44 Introduction of the Speaker and Agenda
06:4...
Просмотров: 99
Видео
GDPR In Urdu | GDPR Urdu Video Lecture 7 | Understanding GDPR Law | Learn GDPR in Urdu
Просмотров 7614 дней назад
This is 7th Lecture of our GDPR in Urdu Series . In this session , the Speaker has explained different Articles of GDPR Law . In this session ,we have covered article 71 - article 85. Rest will be covered in future session which will be the last session . Video has been divided into chapters for your convenience . 00:00 - 01:59 Sneak Peek into the video 02:00 - 04:35 Speaker Introduction, Recap...
GDPR In Urdu | GDPR Urdu Video Lecture 6 | Understanding GDPR Law | Learn GDPR in Urdu
Просмотров 8021 день назад
This is 6th Lecture of our GDPR in Urdu Series . In this session , the Speaker has explained different Articles of GDPR Law . In this session ,we have covered article 62 - article 70. Rest will be covered in future sessions . Video has been divided into chapters for your convenience . 00:00 - 02:00 Sneak Peek into the video 02:01 - 05:15 Speaker Introduction, Recap and Upcoming Sessions Announc...
GDPR In Urdu | GDPR Urdu Video Lecture 5 | Understanding GDPR Law | Learn GDPR in Urdu
Просмотров 5121 день назад
This is 5th Lecture of our GDPR in Urdu Series . In this session , the Speaker has explained different Articles of GDPR Law . In this session ,we have covered article 56 - article 61. Rest will be covered in future sessions . Video has been divided into chapters for your convenience . 00:00 - 02:00 Sneak Peek into the video 02:01 - 05:15 Speaker Introduction, Recap and Upcoming Sessions Announc...
CISM Exam Overview | What is CISM | CISM Exam Preparation
Просмотров 22128 дней назад
In this Session the Speaker provides a brief overview about CISM Exam Overview .This is one of the most popular certification of ISACA .ISACA stands for the Information Systems Audit and Control Association .Some of their popular certification programs are CISA (Certified Information Systems Auditor ) ,CRISC (Certified in Risk and Information Systems Control) and CISM (Certified Information Sec...
What is ISACA certification | ISACA Certifications Overview | ISACA Certificates
Просмотров 39528 дней назад
In this Session the Speaker provides a brief overview about ISACA Certificates and Certification Programs . ISACA Stands for the Information Systems Audit and Control Association .Some of their popular certification programs are CISA (Certified Information Systems Auditor ) ,CRISC (Certified in Risk and Information Systems Control) and CISM (Certified Information Security Manager). They also pr...
Qatar Cybersecurity Landscape | Jobs in Qatar | Business in Qatar
Просмотров 480Месяц назад
This session explores Qatar's cybersecurity landscape in depth. It provides essential insights into current threats, regulations, and opportunities within Qatar's vibrant digital sphere. During this session, the speaker discussed Qatar's professional and business environment, highlighting how various key players operate within the local market. The intended audience for this session includes cy...
GDPR In Urdu | GDPR Urdu Video Lecture 4 | Understanding GDPR Law | Learn GDPR in Urdu
Просмотров 117Месяц назад
This is 4th Lecture of our GDPR in Urdu Series . In this session , the Speaker has explained different Articles of GDPR Law . In this session ,we have covered article 46 - article 55. Rest will be covered in future sessions . Video has been divided into chapters for your convenience . 00:00 - 01:27 Sneak Peek into the video 01:28 - 04:29 Speaker Introduction, Recap and Upcoming Sessions Announc...
GDPR In Urdu | GDPR Urdu Video Lectures 3 | Understanding GDPR Law | Learn GDPR in Urdu
Просмотров 78Месяц назад
This is 3rd Lecture of our GDPR in Urdu Series . In this session , the Speaker has explained different Articles of GDPR Law . In this session ,we have covered article 35 - article 45. Rest will be covered in future sessions . Video has been divided into chapters for your convenience . 00:00 - 02:07 Sneak Peek into the video 02:08 - 04:47 Speaker Introduction, Recap and Upcoming Sessions Announc...
GDPR In Urdu | GDPR Urdu Video Lectures Part 2 | Understanding GDPR Law | Learn GDPR in Urdu
Просмотров 188Месяц назад
This is Second Lecture of our GDPR in Urdu Series . In this session , the Speaker talks about different Articles of GDPR Law . Due to the high number of articles ,we have only covered 34 articles in this lecture . Rest will be covered in future sessions . Video has been divided into chapters for your convenience . 00:00 - 03:01 Sneak Peek into the video 03:02 - 06:33 Speaker Introduction, Recap...
GDPR In Urdu | GDPR Urdu Video Lectures Part 1 | GDPR Seekhein Urdu mein | Learn GDPR in Urdu
Просмотров 503Месяц назад
This is first Lecture of our GDPR in Urdu Series . In this session , the Speaker talks about European Data Protection ,its History, Key Institutions and Key Terminologies used in GDPR .If you want to learn GDPR than this session is a must in order to build a good foundation and to familiarize yourself with GDPR related terms . Video is divided into chapters for your convenience . 00:00 - 02:57 ...
NCA ECC 2024 | NCA ECC Overview | NCA ECC Comparison
Просмотров 344Месяц назад
This Session provides you a brief Overview of NCC ECC Framework where ECC Stands for Essential Cybersecurity Controls and NCA is Saudi Arabia's National Cybersecurity Authority. The Presenter compares the latest ECC-2:2024 version to the Older ECC-1:2018 Version . Knowledge of this document is very important if someone is planning to land a job in Saudi Arabia Market .Language of session is Urd...
What is SAMA CSF | SAMA CSF Overview | What is SAMA Cyber Security Framework
Просмотров 425Месяц назад
This Session is an overview of SAMA Cybersecurity Framework .Video has been divided into chapters for your convenience . 00:00 - 03:00 Sneak peek into the video 03:01 - 04:33 Session Agenda (What will be covered) 04:34 - 05:14 What is SAMA and what is its Role and Purpose 05:15 - 07:59 What is SAMA CSF (Cyber Security Framework),Its Scope and history 08:00 - 08:36 SAMA Framework Superseded Circ...
US Immigration Visa information | Visa Options for US Immigration | Immigration Visas for USA
Просмотров 388Месяц назад
This session provides an overview of Immigration Options for USA that are most commonly used . Session has been done by an inforamtion security professional who has shared the information from his personal experience. Video has been diveded into chapters . 00:00 - 03:00 - Sneak peek into the video 03:01 - 07:47 - Session Agenda and Intro 07:48 - 09:25 - Types of Immigrant Visas 09:26 - 22:57 - ...
OT Security Workshop | OT Security Lab | OT Security Practice Lab
Просмотров 4512 месяца назад
OT Security Workshop | OT Security Lab | OT Security Practice Lab
OT Risk Assessment | OT Security Risk Assessment | Operational Technology Risk Assessment
Просмотров 3372 месяца назад
OT Risk Assessment | OT Security Risk Assessment | Operational Technology Risk Assessment
Job Hunting in Middle East | Job Hunting in Saudi Arabia | Job Hunting Tips and Tricks
Просмотров 1,6 тыс.2 месяца назад
Job Hunting in Middle East | Job Hunting in Saudi Arabia | Job Hunting Tips and Tricks
AI Adoption Framework | What is Artificial Intelligence | What is AI | AI Adoption Strategies
Просмотров 3022 месяца назад
AI Adoption Framework | What is Artificial Intelligence | What is AI | AI Adoption Strategies
What is OT Security Part 6 | Industrial Control Systems Basics | Industrial Control Systems Concepts
Просмотров 1462 месяца назад
What is OT Security Part 6 | Industrial Control Systems Basics | Industrial Control Systems Concepts
What is OT Security Part 5 | Industrial Control Systems Basics | Industrial Control Systems Concepts
Просмотров 1882 месяца назад
What is OT Security Part 5 | Industrial Control Systems Basics | Industrial Control Systems Concepts
What is OT Security Part 4 | Industrial Control Systems Basics | Industrial Control Systems Concepts
Просмотров 2432 месяца назад
What is OT Security Part 4 | Industrial Control Systems Basics | Industrial Control Systems Concepts
What is OT Security Part 3 | Industrial Control Systems Basics | Industrial Control Systems Concepts
Просмотров 2672 месяца назад
What is OT Security Part 3 | Industrial Control Systems Basics | Industrial Control Systems Concepts
What is OT Security Part 2 | Industrial Control Systems Basics | Industrial Control Systems Concepts
Просмотров 3922 месяца назад
What is OT Security Part 2 | Industrial Control Systems Basics | Industrial Control Systems Concepts
What is OT Security Part 1| Industrial Control Systems Basics | Industrial Control Systems Concepts
Просмотров 1,2 тыс.3 месяца назад
What is OT Security Part 1| Industrial Control Systems Basics | Industrial Control Systems Concepts
What is Quantum Technology | What is Quantum Computing
Просмотров 3283 месяца назад
What is Quantum Technology | What is Quantum Computing
What is SOC2 | SOC2 Compliance and Certification
Просмотров 7363 месяца назад
What is SOC2 | SOC2 Compliance and Certification
AMSI bypass for beginners | AMSI bypass statically via debugger
Просмотров 3189 месяцев назад
AMSI bypass for beginners | AMSI bypass statically via debugger
GISPP Members Annual Forum 2023 Media Coverage
Просмотров 69Год назад
GISPP Members Annual Forum 2023 Media Coverage
IT Professionals Networking Event | Professional Diaspora Networking Dinner
Просмотров 212Год назад
IT Professionals Networking Event | Professional Diaspora Networking Dinner
What is OWASP Top 10 | How to Prevent against OWASP Top 10 Risks | Strengthening Web Applications
Просмотров 1,3 тыс.Год назад
What is OWASP Top 10 | How to Prevent against OWASP Top 10 Risks | Strengthening Web Applications
Superb 🎉
Good
Love the way you are guiding us
Thanks for your valuable feedback.
Amazing insights indeed
Excellent Explanation .....First one to comment :)
Thanks for your valuable feedback
Amazing efforts indeed by the speaker
Very helpful Could you please create a detailed video on NIA and QCSF if possible?
someone trying to take control of my screen. Intruder tried to hack your session 😅
Good session, I have a question: Is SAMA is exclusive from PCI-DSS? I mean If a company is fully compliant by SAMA then is there no need for PCI-DSS in KSA?
It does not work that way. PCI DSS is an international standard for protecting credit cards data so it is applicable if a company deals with credit cards.
Loved this...Thanks a lot
Are you going to teach complete course ?
We are considering this but it depends on trainer's availability.
Start online course with real labs and internship. Only videos is not sufficient.
Labs are not required for ISACA Certifications.
Do prefer proceeding for CRSIC after CISSP?
It really depends on your career goals and interests. CRISC is more about Risk management and it certainly adds value to your profile.
Thoroughly enjoyed this insightful discussion....
Thanks for your Contribution
Thank you for sharing the insights, it is helpful!
Glad it was helpful!
Very informative video
Very informative sessions, much appreciated.
Thank you
Very helpful
Glad to hear that
Sir Very helpful training
Glad to hear that
Very informative session Sir
Thanks for your valuable feedback
All nurses getting EB2 visa from Pakistan.
Awesome
Gr8 job
Thanks for your valuable feedback
Appreciate the effort put behind these sessions.
Glad you like them!
It was indeed a very informative session! Mr. Sohail explained it very well and believe me these are the key points that most of us miss or are unaware of.
Thank you for your kind words and support.
Very helpful session. Jazak Allah sir
Thank you for watching!
Appreciate your efforts @Sohail bhai and Shehzad bhai
Appreciate it.
Great, helpful video, thanks.
@@ehsan719 Thanks for the kind words
Great learning about AI concepts
Thanks for your kind words and support
Very interactive and to the point.
@@Mind_Set_Building Thanks for your feedback.
good job done
Thanks for your valuable feedback
Any specific reason in 26:10 for keeping the data historian in IT network?
It's one of the implementation, and I have specified the reason, as historian are now SQL Servers, which can have vulnerability inside them, which may cause threats to OT environment
We can keep data historians in DMZ, in OT network, or in IT network.. depending upon how we evaluate its placement commensurate with risks in our infrastructure
@@amir123able thanks Amir... learning a lot from these videos
That's the idea behind. If you see our channel, we have many videos on different cybersecurity related topics.
ISA-95 architecture: Just out of curiosity why isnt the term PURDUE MODEL being used here?
Purdue model has been referred while explaining ISA 95 architecture, and I would request you to kindly view the complete lectures
@@amir123able thanks Amir...i am on video 2...guess in the later videos it comes in
I strongly suggest you to watch all the videos. It was a 3 hours session so we divided it into 6 parts. You can Look at the chapters to get an idea of what is covered.
Beautiful explanation
Solid start 👍
It is just a preview of what's covered in the session
Please upload videos in urdu language
We aim to make our content accessible to a broader audience. However we try to use very simple English that is easy to understand. You can check our channel for urdu videos as well. ruclips.net/p/PLgwj_y650-7dPGUfJspnLV-Kb6KhaWhHd&si=CzDaG-0kSxMECzsh
Very informative
Thanks for watching!
Nice work as always by GISSP.
Thanks for your support.
Thanks for your efforts but facing an issue if you help , the topic explanation is good but the topics are not aligned with the book, you should have mentioned topics like 5.6-Data Classification and 5.1-security framework, even topics are not in series as mentioned in the book and found some differences in terminology or keyword, the main issue is after watching this, I am unable to identify that how much domain have been covered, may be you have some other plan, but again appreciate your efforts .
It seems you're focused on the book's structure. This video covers key concepts in a way that emphasizes practical application. You can also reach out to the trainer via his LinkedIn profile for more clarification.
Thank you for the informative session Main audience is Pak Community then it should be in Urdu Language.
We appreciate the feedback, however, we try to make our content accessible to a broader audience. Btw some part of the Question Answers Session was in urdu.
This is really makes me curious
Thank you for your support
The presenter is talking amout Risk Assessment, although he dosent explain the process to how to do the Risk Assessment ? Who will be the stake holders you need to take. Hence, I think the preseter do not aware about the complete process of risk assessment of OT.
Risk Assessment is a detailed topic. You can watch this to know more about it. ruclips.net/video/NDUB418wLy0/видео.html
@@GISPPACADEMY Thank you for sharing the Risk Assessment video. However, my question is in scope of the video which is more focused on OT/IoT architecture. In my opinion, the presenter do not respond to a question for Risk Assessment in OT environment. For example, who will do the Risk Assessment ? Do the Risk Assessment team need to take onboard other stake holders or not, etc.
Very informative session
Glad you found it helpful!
why we don't have blackhat in africa(tunisia, algeria...etc)
I think that it is due to security risks. If you want to invite people from all over the world, you want a very secure environment.
nice. hard to come by nice and precise videos on the advanced subject
Love from India dude ❤😂
Please confirm that for certification can we rely only your's video
That will definitely not be enough. You need to read CISA Manual and do practice exams as well.
@@GISPPACADEMY Thank You
1:48. Worst half baked from crowd. Presenter s very patient.
These were zoom sessions which were recorded and uploaded later.
nice job ❤keep it up🎉 dear best citizen of Pakistan