InfoSec Guardians
InfoSec Guardians
  • Видео 52
  • Просмотров 60 369
🌐 OSI Model Explained: 7 Layers, Attack Types, Firewalls & TCP/IP Layers
In this comprehensive video, we break down the OSI Model and explore its 7 layers-Physical, Data Link, Network, Transport, Session, Presentation, and Application. But that’s not all! We also dive into:
Common Attack Types: Learn how different types of attacks target specific OSI layers.
Firewall Functions: Discover how firewalls interact with the OSI layers to protect your network.
TCP/IP Layers: Understand the relationship between the OSI Model and the TCP/IP protocol suite.
What you’ll learn:
Detailed explanation of each OSI layer and its role
How attacks exploit vulnerabilities at each layer
How firewalls safeguard against threats and manage network traffic
The connection between OSI and TCP/I...
Просмотров: 390

Видео

⚠️ Top Malware Threats You Need to Know
Просмотров 675Месяц назад
In this video, we cover common malware types, how they work, and tips to protect yourself. Stay ahead of cyber threats! In the Video 00:02 - Intro 00:40 - What is Malware 01:25 - Virus 02:12 - Worm 02:52 - Trojan 03:34 - Malware 04:15 - Ransomware 04:57 - Adware 05:35 - Spyware 06:13 - RootKit 06:48 - BotNet 07:47 - Comparison Table 🌐 Follow us on Twitter: InfoScGuardian 📷 Follow us...
Mastering ISC2 CC Domain 4: Network Security - Concepts & Practice Questions
Просмотров 1,5 тыс.Месяц назад
In this video, we dive into Domain 4 of the ISC2 Certified in Cybersecurity exam, focusing on Secure Network Architecture concepts. CC Domain 1 - ruclips.net/video/6mG7q0jIW3w/видео.html CC Domain 2 - ruclips.net/video/p7XJZITLlQY/видео.html CC Domain 3 - ruclips.net/video/dO-4QSs2Hrs/видео.html 🌐 Follow us on Twitter: InfoScGuardian 📷 Follow us on Instagram: infosecgu...
Mastering ISC2 CC Domain 3: Access Control (DAC, MAC, RBAC)- Concepts & Practice Questions
Просмотров 1,3 тыс.2 месяца назад
In this video, we dive into Domain 3 of the ISC2 Certified in Cybersecurity exam, focusing on Access Control Concepts (DAC, MAC, RBAC) concepts. CC Domain 1 - ruclips.net/video/6mG7q0jIW3w/видео.html CC Domain 2 - ruclips.net/video/p7XJZITLlQY/видео.html 🌐 Follow us on Twitter: InfoScGuardian 📷 Follow us on Instagram: infosecguardians👍 Like us on Facebook: facebook.com...
CISSP HARD Questions - Part 1: Domain 1, 2, & 3.
Просмотров 2,2 тыс.2 месяца назад
Welcome to Part 1 of our CISSP Exam Practice Questions series! In this video, we tackle three essential domains to help you prepare for the CISSP certification: Domain 1: Security and Risk Management - Understand the foundational concepts of security policies, risk management, and compliance. Domain 2: Asset Security - Learn about protecting information and assets, data classification, and priv...
CISM Practice Questions: Domain 1
Просмотров 6595 месяцев назад
Welcome to our CISM Domain 1 practice questions video! Test your understanding of the process of auditing information systems with our challenging questions. Each question is followed by a detailed explanation to help you grasp the concepts. Like, share, and subscribe for more CISM exam tips and practice questions! @InfoSecGuardians 🌐 Follow us on Twitter: InfoScGuardian 📷 Follow us...
Mastering ISC2 CC Domain 2: BC, DR & IR - Concepts & Practice Questions
Просмотров 3,2 тыс.5 месяцев назад
In this video, we dive into Domain 2 of the ISC2 Certified in Cybersecurity exam, focusing on Business Continuity (BC), Disaster Recovery (DR), and Incident Response concepts. CC Domain 1 - ruclips.net/video/6mG7q0jIW3w/видео.html 🌐 Follow us on Twitter: InfoScGuardian 📷 Follow us on Instagram: infosecguardians👍 Like us on Facebook: groups/623146913044461 ...
Mastering ISC2 CC Domain 1: Security Principles - Concepts & Practice Questions
Просмотров 6 тыс.5 месяцев назад
In this video, we explore ISC2 CC Domain 1, covering key cybersecurity principles. From risk management to security controls, we break down complex topics for easy understanding. 🌐 Follow us on Twitter: InfoScGuardian 📷 Follow us on Instagram: infosecguardians 👍 Like us on Facebook: groups/623146913044461 🌐 Linkedin: www.linkedin.com/company/infosecguardia...
Mastering CISA Domain 1: Scenario-Based Questions for Auditors - Part 1/3
Просмотров 3235 месяцев назад
Explore challenging scenarios in CISA Domain 1, testing your audit planning and execution skills. Prepare for the CISA exam and real-world auditing challenges with expert insights. #CISA #cisapracticequestions #practice #CISADomain1 #Cybersecurity #InfoSec #Certification #ExamPrep #audit 🌐 Follow us on Twitter: InfoScGuardian 📷 Follow us on Instagram: infosecguardians ...
RAPID FIRE QUESTIONS - SECURITY MODELS
Просмотров 1486 месяцев назад
Are you ready to test your understanding of security models? In this rapid-fire question session, we'll challenge your knowledge of various security models, including Bell-LaPadula, Biba, Clark-Wilson, Brewer-Nash (Chinese Wall), and more! Answer as many questions as you can correctly and see how well you know these essential concepts in cybersecurity. Whether you're preparing for a certificati...
Rapid Fire Questions - Cryptography
Просмотров 1686 месяцев назад
Are you preparing for the CISSP/ CCSP or CISM exam? Test your knowledge with these 40 tough questions focused on CRYPTOGRAPHY. Each question is designed to challenge your understanding of security models, cryptography, key management, digital signatures, and more.
Mastering DLP Interview Prep: Skills, Scenarios, and Solutions
Просмотров 3,6 тыс.6 месяцев назад
In this video, we dive deep into Data Loss Prevention (DLP) interview preparation, covering the fundamentals of DLP, key skills needed for DLP roles, different types of DLP solutions, their strengths and weaknesses, and scenario-based interview questions. Whether you're preparing for a cybersecurity interview or simply looking to enhance your knowledge of DLP, this video has something for you. ...
SOC Tools - SIEM EDR XDR MDR and SOAR Explained
Просмотров 4,3 тыс.7 месяцев назад
Learn the differences between SIEM, EDR, XDR, MDR, and SOAR in cybersecurity. Discover how each tool works with examples to enhance your security knowledge. CISSP Flash Cards - ruclips.net/p/PLEnO1vtFgq4aeRw5Uw3tLmtMdZHEMpcBE CISSP Practice Questions Playlist - youtu.be/playlist?list=PLEnO1vtFgq4ZgooAJuD5iKDLGw9IzFSXQ&si=1ClI4hnOdrVZcyhX Domain 1 - ruclips.net/video/BXWUuOQyjqc/видео.html Domai...
CISSP 2024 Practice Questions (Scenario-Based) - Domain 7: Security Operations #CISSP
Просмотров 3,4 тыс.7 месяцев назад
CISSP Domain - 7 covers 13% of the CISSP exam and covers security operations. The day-to-day security tasks are not limited to an information security professional monitoring security incidents in a dark SOC computer lab. Instead, security operations is a broad categorization of information security tasks that ranges from how an organization handles security investigations to applying resource ...
CISSP 2023 Practice Questions (Scenario-Based) - Domain 6: Security Assessment & Testing #CISSP
Просмотров 2,2 тыс.11 месяцев назад
CISSP 2023 Practice Questions (Scenario-Based) - Domain 6: Security Assessment & Testing #CISSP
CISSP 2023 Practice Questions (Scenario-Based) - Domain 5 : Identity and Access Management #CISSP
Просмотров 4 тыс.11 месяцев назад
CISSP 2023 Practice Questions (Scenario-Based) - Domain 5 : Identity and Access Management #CISSP
CISSP 2023 Practice Questions (Scenario-Based) - Domain 4 : Communication and Network Security
Просмотров 6 тыс.Год назад
CISSP 2023 Practice Questions (Scenario-Based) - Domain 4 : Communication and Network Security
CISSP 2023 Practice Questions (Scenario-Based) - Domain 3: Security Architecture & Engineering
Просмотров 3,9 тыс.Год назад
CISSP 2023 Practice Questions (Scenario-Based) - Domain 3: Security Architecture & Engineering
CISSP 2023 Practice Questions (Scenario-Based) - Domain 2: Asset Security
Просмотров 2,9 тыс.Год назад
CISSP 2023 Practice Questions (Scenario-Based) - Domain 2: Asset Security
CRISC 2023 PRACTICE QUESTIONS - DOMAIN 2 : IT Risk Assessment
Просмотров 544Год назад
CRISC 2023 PRACTICE QUESTIONS - DOMAIN 2 : IT Risk Assessment
CISSP 2023 Practice Questions (Scenario-Based) - Domain 1: Security & Risk Management
Просмотров 4,9 тыс.Год назад
CISSP 2023 Practice Questions (Scenario-Based) - Domain 1: Security & Risk Management
Mastering Cryptanalysis: Unlocking the Secrets of Cryptographic Systems -Domain 3 CISSP & CISM, CISA
Просмотров 518Год назад
Mastering Cryptanalysis: Unlocking the Secrets of Cryptographic Systems -Domain 3 CISSP & CISM, CISA

Комментарии

  • @lipeng21cn
    @lipeng21cn День назад

    This is not for CISSP , it's for kindergarten

  • @anupanu-yc5kq
    @anupanu-yc5kq 4 дня назад

    Qun 4, I can not agree with the answer,,, Network traffic analysis can help identify whether the employee transferred sensitive data to external parties. While important for tracking exfiltration, this step would be more effective after securing the digital evidence from the employee’s work computer. It is typically used to complement forensic analysis on the employee's machine but does not replace the need to preserve physical evidence. The most critical step in any digital forensic investigation is to ensure that the integrity of the evidence is maintained. Using a write blocker to create a forensic image of the employee’s computer ensures that the original data remains unchanged during the investigation. This allows the security team to perform subsequent analysis on the forensic image, preserving the chain of custody and ensuring the evidence can be used in court if necessary. If the data is gone, no point of jumping into NW traffic analysis as 1st step, It can be done later after securing the evidence.

  • @anupanu-yc5kq
    @anupanu-yc5kq 4 дня назад

    Can not agree with Qn4 answer,, It should be B , A firewall rule audit involves reviewing the rules configured in the firewall to ensure they are properly set up to block unauthorized traffic. While this is valuable for ensuring policy compliance, it doesn’t provide a complete picture of how the firewall performs under attack scenarios or whether its rules are effective in practice. Where as apenetration test simulates real-world attacks to determine how well the firewall can block unauthorized traffic and identify any vulnerabilities that attackers could exploit. It involves actively attempting to bypass the firewall's defenses and provides insights into its overall effectiveness in a controlled, ethical manner. This test is comprehensive because it not only checks for configuration issues but also tests the firewall’s ability to stop unauthorized access.

  • @anupanu-yc5kq
    @anupanu-yc5kq 4 дня назад

    Qun 8 , "SAML assertions are sent to the Service Provider (SP) during the initial user login" .. This statement is correct but incomplete. SAML assertions contain information about the user’s identity, authentication, and attributes. These assertions are sent to the Service Provider (SP) by the Identity Provider (IdP) after the user authenticates with the IdP. This process allows the SP to grant the user access to its resources based on the received assertion

  • @anupanu-yc5kq
    @anupanu-yc5kq 5 дней назад

    Can not agree with Q3 answer, you can not kick someone out & that is not your responsibility. it should be option C, When dealing with a data breach involving sensitive customer information, the first priority should be to understand the full scope of the breach by conducting an internal investigation. This helps determine the extent of the leak, the specific data involved, and the employee's actions. Based on the investigation findings, the organization can take appropriate steps to mitigate damage and ensure future breaches don’t occur. Notifying affected customers is critical in maintaining transparency and complying with regulatory requirements (e.g., GDPR, CCPA) to ensure the organization’s legal obligations are met.

  • @anupanu-yc5kq
    @anupanu-yc5kq 5 дней назад

    Not agreeing with Q3 answer.. A CDN can significantly enhance the network’s resilience to DDoS attacks by distributing traffic across multiple servers, making it harder for attackers to overwhelm a single point of failure. CDNs are designed to handle large amounts of traffic and have built-in capabilities to absorb traffic spikes, including those caused by DDoS attacks. This reduces the burden on the company’s core infrastructure, IDPS can play a role in detecting abnormal traffic patterns and blocking known attack vectors. However, IDPS alone may not be able to handle the volume and scale of DDoS traffic, especially if the attack overwhelms the network at a volume larger than the IDPS can process.

  • @nanajus1
    @nanajus1 8 дней назад

    I just passed my exam. The videos are helpful

  • @BAEESCOPE2010
    @BAEESCOPE2010 12 дней назад

    These lectures are fantastic. Thank you very much.

  • @abhishek1986nits
    @abhishek1986nits 15 дней назад

    I think that for question 4, Option C is more appropriate. Can anyone comment?

  • @lisankumamoto
    @lisankumamoto 15 дней назад

    Question 44? ruclips.net/user/clipUgkxf4azsK2JjKkjHYDz8aBznLBiNzztcWZv?si=JQPXC4G2iY4097Be

  • @AndyEsun
    @AndyEsun 22 дня назад

    question 3 , something you are and something you have was mixed up, something you have was explained as something you are , i think it was just a slip.

  • @user-de3yo1lt5k
    @user-de3yo1lt5k 24 дня назад

    Are all the questions in final cissp exam, scenario-based like these? Or will be there technical questions too?

    • @InfoSecGuardians
      @InfoSecGuardians 23 дня назад

      There will be very few direct questions as well. But they will less weightage.

  • @alaaelbe7753
    @alaaelbe7753 27 дней назад

    Very impressive presentation

  • @ubi-wan-kenobi
    @ubi-wan-kenobi 27 дней назад

    Your question 7 is quite confusing and counterintuitive seeing as the ans should be D even according to your explanation.

  • @WellsLindsay-e6e
    @WellsLindsay-e6e Месяц назад

    Taylor Barbara Perez Maria Martinez Brian

  • @SpicyPunkRockerOfficial
    @SpicyPunkRockerOfficial Месяц назад

    Hey I got 7/8 not bad 😄

  • @m.salmankhan5274
    @m.salmankhan5274 Месяц назад

    Beautiful graphics and good explanations can you make it cyber security all 5 domain's all questions and answers videoes 5 part details explanation thank you

    • @InfoSecGuardians
      @InfoSecGuardians Месяц назад

      Domain 3 - ruclips.net/video/dO-4QSs2Hrs/видео.html Domain 4 - ruclips.net/video/WfY_HAMSPOQ/видео.html

  • @DerrickJLive
    @DerrickJLive Месяц назад

    Why would you choose an AI voice that has vocal fry at the end of every sentence?

  • @shylajanay
    @shylajanay Месяц назад

    Thank you!

  • @anupanu-yc5kq
    @anupanu-yc5kq Месяц назад

    Question 4 1. Use a write blocker to create a forensic image of the employee's work computer. Explanation: Write Blocker and Forensic Imaging: The first priority in digital forensics is to ensure that the original data is not altered in any way. A write blocker is a tool that prevents any changes to the data on the storage device being investigated. Creating a forensic image (an exact bit-by-bit copy) of the employee's work computer ensures that the investigation can proceed using the copy, while the original remains unaltered and intact for potential legal proceedings. Perform Live Forensic Analysis: This might be necessary in some cases, but it is usually not the first step because it can alter data on the system, which might compromise the integrity of the evidence. Conduct Network Traffic Analysis: While useful for identifying unauthorized data transfers, it should come after preserving the digital evidence. Network traffic analysis might also require real-time monitoring, which is not the initial step in preserving evidence. File Carving Tools: These tools are used to recover deleted files, which could be part of the analysis phase but should occur after the forensic image has been created. Thus, creating a forensic image with a write blocker is the first and most critical step in this type of investigation.

  • @TonyMontana-pe6vf
    @TonyMontana-pe6vf Месяц назад

    An intelligent AI machine speaking.

  • @stringbean3442
    @stringbean3442 Месяц назад

    This seems like more like a english test think im going to study the diary

    • @InfoSecGuardians
      @InfoSecGuardians Месяц назад

      All ISC2 exams are a test of English as well.

    • @stringbean3442
      @stringbean3442 Месяц назад

      @@InfoSecGuardians for sure it seems like properly understanding what is asked is key, here thanx for the detailed break down of the concepts its really hepful.

  • @varma9114
    @varma9114 Месяц назад

    in domain 3 as physical access control you missed the two-person rule, two-person integrity, two-person control. these are main functions. Also, in logical access control you missed the topic about ABAC model. However, the video was good, but i'm expecting domain 4 & domain 5 in upcoming video. thnq @Infosec Guardians

    • @InfoSecGuardians
      @InfoSecGuardians Месяц назад

      Thanks for your review. Two-person control & ABAC are not covered in CC as per the Exam Outline released by ISC2. However, I will make a separate video covering all types of access controls.

    • @varma9114
      @varma9114 Месяц назад

      @@InfoSecGuardians ok please cover the topics of domain 3,4,5 full of scenario based questions ,that will help to prepare for isc2 cc exam. Thnq👍

  • @dolapoodexy4709
    @dolapoodexy4709 Месяц назад

    Your videos are really helpful 😊

  • @maloseevanschaba7343
    @maloseevanschaba7343 2 месяца назад

    When are you doing domain 4?

    • @InfoSecGuardians
      @InfoSecGuardians 2 месяца назад

      I am on it. Will be done by next Sunday. Domain-4 will be a bit lengthy.

  • @AhsanKhawaja-l4e
    @AhsanKhawaja-l4e 2 месяца назад

    Not accurate

  • @TheShoaibbadshah
    @TheShoaibbadshah 2 месяца назад

    is this your real voice, or you are using AI generated voice, and I appreciate the hard work you put in .

  • @asherkhan7997
    @asherkhan7997 2 месяца назад

    Amazing details in-depth explanation

  • @furkanozdemir1ify
    @furkanozdemir1ify 2 месяца назад

    Best video I found on the web so far. Thanks

  • @LateInCyber0424
    @LateInCyber0424 2 месяца назад

    great vids! hope we can get domain 3 - 5

  • @khanget
    @khanget 2 месяца назад

    Some of the answers are not correct in this video can't agree to the given explanation to the answer.

  • @sumithooda121
    @sumithooda121 2 месяца назад

    Question 44 and 45, answer should be A

    • @JJohnson-im4cc
      @JJohnson-im4cc 4 дня назад

      Totally agree with you. Particularly 44 as the question states that the security gaps have already been identified.

  • @EngAyyad
    @EngAyyad 3 месяца назад

    if i study on this video i will pass the exam?

    • @GamerzFaiths
      @GamerzFaiths 2 месяца назад

      @@EngAyyad I use LinkedIn learning with Mike

    • @InfoSecGuardians
      @InfoSecGuardians 2 месяца назад

      No resource can guarantee a PASS. It will be your own hard work and understanding of the topics. I am only helping to highlight the key points, so that you understand the topic better.

    • @brandogenius
      @brandogenius Месяц назад

      Recommend to buy the resources from isc2 website to insure you pass your exam

  • @backuashan
    @backuashan 3 месяца назад

    The speech synthesizer could be better, this one is distracting

    • @InfoSecGuardians
      @InfoSecGuardians 2 месяца назад

      Sure... Will try the improvements in future videos.

  • @sukhisohal329
    @sukhisohal329 5 месяцев назад

    👌👌

  • @GamerzFaiths
    @GamerzFaiths 5 месяцев назад

    In the authentication portion of the video you have Something you are and something you have mixed up. You explain it right, but the slides are wrong.

  • @sukhisohal329
    @sukhisohal329 5 месяцев назад

    👌👌

  • @VishwanathBhandwale
    @VishwanathBhandwale 5 месяцев назад

    2 question answer should be C

  • @1V401K
    @1V401K 5 месяцев назад

    Siem peppering

  • @1V401K
    @1V401K 5 месяцев назад

    And a peppering in cyber security is a cryptographic tactic

  • @1V401K
    @1V401K 5 месяцев назад

    MD5 message digest algorithm version 5

  • @1V401K
    @1V401K 5 месяцев назад

    Code execution and spatial Theory

  • @1V401K
    @1V401K 5 месяцев назад

    Risk Theory of asset and key concepts how bad bear markets are. They are

  • @1V401K
    @1V401K 5 месяцев назад

    Asset security and domain 8 for hospitals and ODNI for TIPS which is a domain policy Transaction inflation protection service? Think so in asset. Anti fraud

  • @sauravjain1403
    @sauravjain1403 5 месяцев назад

    Great explanation

  • @abodymohumed8925
    @abodymohumed8925 6 месяцев назад

    Thanks so much but we need more and more questions

  • @painkillerO8
    @painkillerO8 6 месяцев назад

    do they have full CISSP training?

  • @wariyo2833
    @wariyo2833 6 месяцев назад

    Please correct question 21 Biba Model for Integrity should be "No write up, and no read down"

  • @wariyo2833
    @wariyo2833 6 месяцев назад

    Please make corrections to question 13. Bell-LaPadula (Confidentiality) should be "No read up, No write down" 👍🏾

  • @JaredEvans
    @JaredEvans 6 месяцев назад

    So many mistakes when highlighting the answer. This needs to be redone.