Information Security Controls

Поделиться
HTML-код
  • Опубликовано: 7 фев 2025

Комментарии • 44

  • @SandeepKumar-f4q2b
    @SandeepKumar-f4q2b 11 месяцев назад +1

    I learn more from your videos. The way you explain everything is so fine, there’s no need to watch another video.

  • @Abu_Maher
    @Abu_Maher 3 месяца назад +1

    Your are an excellent educator..God bless you.

  • @shubhangipatil5890
    @shubhangipatil5890 2 года назад +3

    I am so glad I came across your videos while searching for the CISM Prep videos. I love the slides, excellent graphic that explains the concepts in a simplified manner. I plan to watch all your videos. Thanks for taking time to post these.

    • @PrabhNair1
      @PrabhNair1  2 года назад

      ruclips.net/video/tkt2vOv6DAA/видео.html

  • @sammytexsdedon1748
    @sammytexsdedon1748 Год назад +2

    This is the best am happy and I have learn alot thanks God bless you

  • @MukeshYadav-uk5tc
    @MukeshYadav-uk5tc Год назад +1

    After watching your videos.. I gain confidence on myself to face the exam.. :) excellent explanation

  • @networkershub3289
    @networkershub3289 9 месяцев назад +1

    Lol I was watching his video with so much attention i could hear the Dogs Bark in the background. Lovely content.

  • @SatenderSingh_08
    @SatenderSingh_08 Месяц назад +1

    Please like, subscribe, and share this video to help spread the knowledge. It motivates the creator to provide even more amazing content. Looking forward to more videos like this.
    Thank you!

  • @gautamedu
    @gautamedu Год назад +1

    One of the best sessions from you Prabh.

  • @tobiasrekker5376
    @tobiasrekker5376 Год назад +1

    Great work

  • @niteshtomer898
    @niteshtomer898 2 года назад +1

    Thank you prabh sir for this important and valuable information 🙏

  • @sumithooda121
    @sumithooda121 Год назад +1

    Amazing explanation 😊

  • @navneetsaurav3427
    @navneetsaurav3427 7 месяцев назад +1

    Very good video

  • @bijalbhavsar691
    @bijalbhavsar691 Год назад +1

    Excellent!

  • @mounikagadde3395
    @mounikagadde3395 Год назад +1

    can you explain about manage access, IT operation and change management

  • @germainkone9029
    @germainkone9029 6 месяцев назад +1

    Can we make data while in use ? How are going to use it when masked ?

    • @sagarp288
      @sagarp288 4 месяца назад

      Masking, pseudonymisation are some examples of control when data in use.

  • @lovelyengland5259
    @lovelyengland5259 2 года назад +1

    Great video

    • @PrabhNair1
      @PrabhNair1  2 года назад

      You Welcome :) thanks for watching my video

  • @TSundar-q5n
    @TSundar-q5n 7 месяцев назад +1

    need a step by step video ISO Lead auditor course

  • @harpreetthekedar1786
    @harpreetthekedar1786 Год назад +1

    his training is just like, reading one book....

    • @PrabhNair1
      @PrabhNair1  Год назад +1

      Hi Harpreet thanks for feedback we will definitely improve my session

  • @shounakneel
    @shounakneel 2 года назад

    Excellent explanation

    • @PrabhNair1
      @PrabhNair1  2 года назад

      You Welcome :) thanks for watching my video

  • @kirankumar-db9pi
    @kirankumar-db9pi 2 года назад +1

    Thank you...I am little confused here, I feel like user management control falls in both Physical and Technical control category... please correct my understanding. Thanks in Advance..

    • @PrabhNair1
      @PrabhNair1  2 года назад

      Yes but user management primary is an process

  • @dhinassa57
    @dhinassa57 2 года назад +1

    Nice!

    • @PrabhNair1
      @PrabhNair1  2 года назад

      You Welcome :) thanks for watching my video

  • @Saher2ijaz
    @Saher2ijaz 2 года назад

    Very nice and easy

    • @PrabhNair1
      @PrabhNair1  2 года назад

      You Welcome :) thanks for watching my video

  • @Techfortress-616
    @Techfortress-616 2 года назад

    Excellent

    • @PrabhNair1
      @PrabhNair1  2 года назад +1

      You Welcome :) thanks for watching my video

    • @Techfortress-616
      @Techfortress-616 2 года назад

      @@PrabhNair1 please continue this journey.

  • @birendrasingh5010
    @birendrasingh5010 2 года назад

    how to implement encryption control?

  • @tabrezqudsi1735
    @tabrezqudsi1735 2 года назад +1

    Now I realise why udaya from welcome movie use to say "Control Uday Control" ... Mentos dimag ki batti jalade ..lol

  • @lovelyengland5259
    @lovelyengland5259 2 года назад

    Please make video on pki

    • @PrabhNair1
      @PrabhNair1  2 года назад

      sure You Welcome :) thanks for watching my video

    • @joemorgan2253
      @joemorgan2253 2 года назад

      @@PrabhNair1 Looking forward to the PKI one, as with all of them. Thank you for your efforts.

  • @dhinassa57
    @dhinassa57 2 года назад +1

    Do more videos

  • @jesh220
    @jesh220 2 года назад +1

    Hi bro gr8 kt from you need your individual attention to me. let me know how do I connect with you further

    • @PrabhNair1
      @PrabhNair1  2 года назад

      you can write to prabh@infosectrain.com

  • @saiduzzamanmajumder4116
    @saiduzzamanmajumder4116 2 года назад

    Excellent