I have had interview prep with him its life changing trust me
@santoshpk879 сағат бұрын
Hi, I have 15 years of experience in Non IT sector with no knowledge on IT or any related. I would want to chnage the career path now and Have knowledge on ISO. Id it better to go for it after so kuch in NOn IT, if yes then will be considered as fresher post completion of training and is certification is needed ir mandatory. And what are the opportunities post certificated? Thank you
@LearnITSecuritywithLuvJohar8 сағат бұрын
please whatsapp me on +91 971 860 3114
@nanapoku5259Күн бұрын
How does one join your training? What areas do you offer training on? Do you have courses on udemy or something?
@LearnITSecuritywithLuvJohar21 сағат бұрын
please whatsapp me on +91 971 860 3114
@nanapoku525921 сағат бұрын
@@LearnITSecuritywithLuvJohar Okay I will
@BipsonMukhiyaКүн бұрын
what are the exam of federal agencies ?
@LearnITSecuritywithLuvJoharКүн бұрын
you mean exam or example?
@BipsonMukhiyaКүн бұрын
@@LearnITSecuritywithLuvJohar i want to know the examples and the meaning of federal agencies and what are the organizations which belongs to it.
@LearnITSecuritywithLuvJohar21 сағат бұрын
Federal agencies are specialized government organizations created by legislation or executive orders to manage specific functions within the federal government. They enforce laws, manage resources, and provide services to the public. These agencies are often part of the executive branch of the federal government and have various levels of authority and responsibility. Here are some examples of federal agencies, along with their meanings and the organizations that fall under them: Examples of Federal Agencies Federal Bureau of Investigation (FBI) Meaning: A federal agency responsible for investigating and enforcing federal laws, particularly those related to counterterrorism, counterintelligence, cybercrime, organized crime, and civil rights. Organizations Under It: The FBI operates independently but collaborates with other federal, state, and local law enforcement agencies. Environmental Protection Agency (EPA) Meaning: A federal agency focused on protecting human health and the environment by enforcing regulations based on laws passed by Congress. Organizations Under It: Various regional offices and specialized divisions such as the Office of Air and Radiation, the Office of Water, and the Office of Chemical Safety and Pollution Prevention. National Aeronautics and Space Administration (NASA) Meaning: An independent federal agency responsible for the civilian space program as well as aeronautics and aerospace research. Organizations Under It: Various research centers and facilities, including the Johnson Space Center, the Kennedy Space Center, and the Jet Propulsion Laboratory. Central Intelligence Agency (CIA) Meaning: An independent federal agency responsible for gathering, processing, and analyzing national security information from around the world. Organizations Under It: Directorates such as the Directorate of Analysis, the Directorate of Operations, and the Directorate of Science and Technology. Department of Health and Human Services (HHS) Meaning: A federal department responsible for protecting the health of all Americans and providing essential human services. Organizations Under It: Centers for Disease Control and Prevention (CDC), Food and Drug Administration (FDA), National Institutes of Health (NIH), and the Centers for Medicare & Medicaid Services (CMS). Federal Departments and Their Agencies Department of Defense (DoD) Meaning: A federal department charged with coordinating and supervising all agencies and functions of the government directly related to national security and the military. Organizations Under It: Army, Navy, Air Force, Marine Corps, National Security Agency (NSA), Defense Intelligence Agency (DIA), and others. Department of Justice (DOJ) Meaning: A federal department responsible for the enforcement of the law and administration of justice. Organizations Under It: FBI, Drug Enforcement Administration (DEA), Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), and the U.S. Marshals Service. Department of Homeland Security (DHS) Meaning: A federal department created to secure the nation from the many threats we face, with a wide-ranging scope including anti-terrorism, border security, and cybersecurity. Organizations Under It: U.S. Customs and Border Protection (CBP), Federal Emergency Management Agency (FEMA), Transportation Security Administration (TSA), and U.S. Citizenship and Immigration Services (USCIS). Department of the Treasury Meaning: A federal department responsible for managing federal finances, collecting taxes, and producing currency. Organizations Under It: Internal Revenue Service (IRS), U.S. Mint, Bureau of Engraving and Printing, and the Financial Crimes Enforcement Network (FinCEN). Department of Education Meaning: A federal department focused on establishing policy for, administering, and coordinating most federal assistance to education. Organizations Under It: Office of Elementary and Secondary Education, Office of Federal Student Aid, and the Institute of Education Sciences. Federal agencies and departments work together to manage the functions and services of the federal government, ensuring that laws and regulations are implemented and enforced across various sectors.
@utkarshbansal2452 күн бұрын
Please make more videos in Hindi
@LearnITSecuritywithLuvJohar2 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@siddiquigulamgaus82523 күн бұрын
Thanks.
@LearnITSecuritywithLuvJohar3 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@RajuBuchala-fv9yc4 күн бұрын
Hi, Nice information given. Thanks. also I am planning to move to TPRM role, could you please help me with the things/areas to learn for TPRM Role ?
@LearnITSecuritywithLuvJohar3 күн бұрын
please whatsapp me on +91 971 860 3114
@evt826 күн бұрын
Thanks for useful video
@LearnITSecuritywithLuvJohar5 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@boddetisirisha90048 күн бұрын
Hi sir.. U have explained about confidentiality nd availability from CIA Traid but what about integrity
@LearnITSecuritywithLuvJohar7 күн бұрын
you should join my classes for ISO 27001 complete implementation course, please whatsapp me on +91 971 860 3114
@unoiamash12 күн бұрын
Nice information even after 3 years
@LearnITSecuritywithLuvJohar12 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@hanumandlasagar508213 күн бұрын
Hi sir can i have your contact
@LearnITSecuritywithLuvJohar13 күн бұрын
sure whatsapp +91 971 860 3114
@danvanthinidanu619613 күн бұрын
May i know the scope for freshers in Cyber Audit comes from arts background
@LearnITSecuritywithLuvJohar13 күн бұрын
sure whatsapp +91 971 860 3114
@yogeesh88415 күн бұрын
Hi Sir, I have total 2 years 7 months of experience in IT. One year I worked as a SOC Analyst and left it because of pressure. Now I want to change my domain and shift to Cybersecurity auditor and compliance/GRC....Can you please tell me how is the scope, work life balance etc., If I choose this GRC, will I be in the right path ? I am interested in this audit...Just want to know your advice Sir ... kindly please please need your advice....
@LearnITSecuritywithLuvJohar15 күн бұрын
please whatsapp on +91 971 860 3114
@maheshpunde385316 күн бұрын
Hey, this is a very important series indeed. Thanks for that. I have a question, I have an experience of around 15 yrs. In manual and automation software testing. Should I opt for this career as an ISO auditor or implementor? How about salary and perks?
@LearnITSecuritywithLuvJohar15 күн бұрын
please get in touch with me on whatsapp. +91 971 860 3114
@shru124416 күн бұрын
Nice
@LearnITSecuritywithLuvJohar15 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@HanaSec17 күн бұрын
Sir...What is difference between IPE and IUC? could you pls explain with example?
@LearnITSecuritywithLuvJohar16 күн бұрын
Sure, I can explain the difference between Integrated Platform Environment (IPE) and Integrated User Configuration (IUC) with examples. Integrated Platform Environment (IPE) IPE refers to a unified computing environment where different software and tools are integrated to provide a cohesive and efficient platform for development, testing, deployment, and management of applications. IPE typically includes various components such as operating systems, development frameworks, middleware, databases, and other tools that work together seamlessly. Example: Imagine a cloud-based development platform like Microsoft Azure or AWS. These platforms offer a comprehensive suite of tools and services that allow developers to build, deploy, and manage applications in an integrated environment. For instance, Azure provides services like Azure DevOps for CI/CD, Azure SQL Database for database management, and Azure Functions for serverless computing, all within a unified platform. This integration helps streamline the development process and improves productivity. Integrated User Configuration (IUC) IUC, on the other hand, focuses on the personalization and configuration settings that are tailored to individual users within a system. It encompasses the settings, preferences, and customizations that make the user experience unique and optimized for each user. IUC ensures that users have a personalized and consistent experience across different devices and sessions. Example: Consider the user settings on a Windows operating system. Each user can configure their desktop environment, including wallpaper, screen resolution, installed applications, and system preferences. When a user logs into their account on any Windows machine within an organization, these personalized settings are applied automatically, providing a consistent user experience. This personalized configuration can also extend to software applications, where users can set their preferences for the user interface, default behaviors, and other settings. Summary of Differences: Scope: IPE focuses on the integration of various software and tools within a computing environment, while IUC focuses on user-specific settings and preferences. Purpose: IPE aims to provide a cohesive and efficient development and deployment platform, whereas IUC aims to personalize and optimize the user experience. Components: IPE involves multiple integrated tools and services (e.g., development frameworks, databases), while IUC involves user-specific configurations (e.g., UI preferences, application settings).
@VandanaShikarpur18 күн бұрын
Great content but the background music is too annoying. Please remove the music if possible.
@LearnITSecuritywithLuvJohar16 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@user-hx8qp1fd1b19 күн бұрын
Thank you for this video
@LearnITSecuritywithLuvJohar18 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@pratikshapawar627919 күн бұрын
please provide more details on GRC compliance
@LearnITSecuritywithLuvJohar18 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@drcharuoberoisharma172219 күн бұрын
Wao very informative ..keep updating us ..God bless you 🎉
@LearnITSecuritywithLuvJohar19 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@rajanchowdhary19 күн бұрын
Please make more videos
@LearnITSecuritywithLuvJohar19 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@sudheerkumarbattu490521 күн бұрын
Can you just answer whats the exact difference of using a proofpoint casb + dlp and symantec dlp and also microsoft purview dlp?
@LearnITSecuritywithLuvJohar21 күн бұрын
Certainly! Here's a comparison of Proofpoint CASB + DLP, Symantec DLP, and Microsoft Purview DLP, focusing on their key differences: Proofpoint CASB + DLP Proofpoint CASB (Cloud Access Security Broker): Cloud Security: Monitors and controls the use of cloud applications, providing visibility into cloud activity and enforcing security policies. Threat Protection: Identifies and mitigates threats within cloud environments, such as malware and compromised accounts. Compliance: Ensures compliance with industry standards by enforcing policies and providing audit trails. Proofpoint DLP (Data Loss Prevention): Content Inspection: Analyzes content to prevent sensitive data from leaving the organization. Policy Enforcement: Applies policies to control data movement based on content and context. Integration: Seamless integration with Proofpoint’s email and cloud security solutions. Symantec DLP Symantec DLP (Data Loss Prevention): Comprehensive Coverage: Protects sensitive data across endpoints, networks, storage, and cloud. Advanced Detection: Uses machine learning and data fingerprinting to accurately identify sensitive data. Incident Response: Provides detailed incident analysis and automated response capabilities. Unified Management: Centralized policy management and reporting for all data protection activities. Integration: Integrates with various Symantec security solutions, including endpoint protection and encryption. Microsoft Purview DLP Microsoft Purview DLP (Data Loss Prevention): Microsoft Ecosystem Integration: Deep integration with Microsoft 365 services (e.g., Exchange, SharePoint, OneDrive, Teams). Unified Management: Single pane of glass for managing data protection policies across Microsoft services. Real-time Alerts and Reporting: Real-time monitoring, alerting, and detailed reporting. Built-in AI and Machine Learning: Utilizes Microsoft’s AI capabilities to enhance data protection and policy enforcement. Compliance and Regulations: Supports compliance with various industry standards and regulations. Data Sensitivity Labels: Leverages sensitivity labels to classify and protect data based on predefined or custom policies. Key Differences Integration and Ecosystem: Proofpoint: Best suited for organizations heavily using Proofpoint’s suite for email and cloud security. Symantec: Provides broad protection across various platforms and integrates well with other Symantec solutions. Microsoft Purview: Ideal for organizations deeply invested in Microsoft 365, offering seamless integration with Microsoft services. Detection and Enforcement: Proofpoint: Emphasizes threat protection in cloud environments and integrates with their existing email and cloud security solutions. Symantec: Strong in advanced detection techniques such as data fingerprinting and machine learning. Microsoft Purview: Leverages Microsoft’s AI and machine learning capabilities for enhanced data classification and protection. Deployment and Management: Proofpoint: Offers both cloud and on-premises deployment options, managed through Proofpoint’s interface. Symantec: Typically requires more complex deployment, but offers comprehensive management through a centralized console. Microsoft Purview: Managed within the Microsoft 365 Compliance Center, providing a unified management experience for Microsoft users. Compliance and Reporting: Proofpoint: Provides detailed compliance and audit trails, particularly within cloud environments. Symantec: Known for robust incident response and detailed reporting capabilities. Microsoft Purview: Offers real-time monitoring and compliance reporting, with a focus on integration within Microsoft 365.
@sudheerkumarbattu490521 күн бұрын
@@LearnITSecuritywithLuvJohar Thank you.
@LearnITSecuritywithLuvJohar19 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@sudheerkumarbattu49057 күн бұрын
@@LearnITSecuritywithLuvJohar yup
@ankitaSingh-jc7eg23 күн бұрын
Sir, it's a part of a process or if not then when we do gap assessment part?
@LearnITSecuritywithLuvJohar22 күн бұрын
An ISO 27001 gap analysis provides a high-level overview of what needs to be done to achieve certification and enables you to assess and compare your organisation's existing information security arrangements against the requirements of ISO 27001.
@AshishJha3123 күн бұрын
Do you have any website, where i can find all your training, i am aspiring CISSP
@LearnITSecuritywithLuvJohar23 күн бұрын
sure you can whatsapp me on 971 860 3114
@ankitaSingh-jc7eg24 күн бұрын
Thankyou soo much sir🎉
@LearnITSecuritywithLuvJohar23 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@lamentations5v424 күн бұрын
thanks for this video. keep rocking!!!
@LearnITSecuritywithLuvJohar23 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@advocatekhairulhasan721125 күн бұрын
Informative video. Thanks a lot.
@LearnITSecuritywithLuvJohar24 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@chrismorganofficial27 күн бұрын
Lovely information
@LearnITSecuritywithLuvJohar26 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@amoprince4353Ай бұрын
This is very helpful. Thank you, Luv.
@LearnITSecuritywithLuvJohar29 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@niting786Ай бұрын
does a testing environment to be created by auditee to perform these testing scenarioes ? or these can be conducted in live environment ?
@LearnITSecuritywithLuvJoharАй бұрын
of course test environments are needed
@deepikagoel1884Ай бұрын
There is system gap where we can’t get the user access modification date. It is being replaced by last modified date. We are struggling to get the list of users whose access has been modified during period. We requested for user access logs to get the understanding of any user access modification during the year. Logs were provided for last 3 months. How can we ensure the completeness of the user access modification list?
@LearnITSecuritywithLuvJoharАй бұрын
ChatGPT If you're unable to directly obtain the user access modification date and have to rely on last modified date, there are a few strategies you can employ to ensure the completeness of the user access modification list: Request Historical Data: First, request historical user access logs covering a longer period, ideally for the entire year if possible. Explain the necessity of having a comprehensive understanding of user access modifications for your analysis. Cross-Reference with Other Sources: Check if there are any other systems or sources within your organization that might have records or logs of user access modifications. Sometimes, access changes might be logged in multiple places for auditing or security purposes. Compare with User Activity: While last modified date might not directly indicate access modification, it could still correlate with user activity. Cross-reference the last modified dates with any other user activity logs or systems to identify potential instances where access modifications might have occurred. Interview Key Personnel: Reach out to relevant personnel within your organization who might have knowledge or insights into user access modifications. This could include system administrators, IT support staff, or department heads who oversee access permissions. Analyze Patterns and Anomalies: Even with limited data, you can analyze patterns and anomalies in the provided logs to identify potential instances of user access modifications. Look for unusual spikes or patterns in access changes that might indicate modification activities. Implement Ongoing Monitoring: Going forward, implement a system or process for ongoing monitoring of user access modifications. This could involve setting up alerts for access changes or regularly reviewing access logs to ensure that no modifications are missed in the future.
@SM-xj3hrАй бұрын
First of all Thank you so much for your contain and your effort. i have some doubt. For example: - We have only one external firewall, that firewall also have some critical level vulnerability. How do I determine which number to assign? - The data center is running on a single power backup. - The infrastructure is not implemented with the organization's password policy (non-compliance). in that situation 1st, i have to "Risk level" with - Vulnerability (here we need VAPT report?), Impact, Likelihood, Risk Level based on the Asset criticality. here My Question is : During the evaluation if i found more dependencies; like backend server, network, applications in this case how can i set the Asset priority and risk level with dependencies ! should i mention all dependencies? if yes then which should come first which come 2nd how to decide that ? is it based on the again Risk level or Criticality level for the system or service? 2nd, as you describe, I have to evaluate the Acceptable, Moderate & Unacceptable Risks by some number (Impact x Likelihood = Risk) here My Question is : how can i identify which risk number represent for which asset and which risk!! (for example as mentioned "Severe - 5" and Very "Likely - 5" with the Risk number 25!!). I confused about the 'Risk Evaluation'. 🙏 kindly help me to clear the doubt. Again, Thank you so much 🙏
@sumukhakashyap-is1zpАй бұрын
Great video ,music was a bad idea
@LearnITSecuritywithLuvJoharАй бұрын
Thanks 🤗 please share these videos and help me grow this channel
@sumukhakashyap-is1zpАй бұрын
@@LearnITSecuritywithLuvJohar already did 😊
@LearnITSecuritywithLuvJoharАй бұрын
thanks
@sunnygupta6197Ай бұрын
Hi ... I am looking for Information security training... Let me know how I can contact u
@LearnITSecuritywithLuvJoharАй бұрын
whatsapp at +91 971 860 3114
@nanapoku5259Ай бұрын
Great introduction to GRC there. Are you going to be bringing more on GRC in your subsequent videos? Also, are there going to be practical projects/labs on GRC?
@LearnITSecuritywithLuvJoharАй бұрын
Thanks 🤗 please share these videos and help me grow this channel
@welovebrandstore5910Ай бұрын
I am a project manager looking to get into iso security.. can you suggest a roadmap or certificate i got go for to have a career in it? Or is there a way to connect with you?
@LearnITSecuritywithLuvJoharАй бұрын
whatsapp at +91 971 860 3114
@parandamayadavАй бұрын
Thank you so much for explaining in detailed about ITGC's
@LearnITSecuritywithLuvJoharАй бұрын
Thanks 🤗 please share these videos and help me grow this channel
@tewodrosbelay-td5xjАй бұрын
Would you please help me, to share me ISG framework
@LearnITSecuritywithLuvJoharАй бұрын
Thanks 🤗 please share these videos and help me grow this channel
@JaikumarGupta-ys5gmАй бұрын
Would you please help me with the proper link of previous video as mention above ? Also, could you please help me for GRC which is 1st video to watch & proer sequence sequence.
@LearnITSecuritywithLuvJoharАй бұрын
Thanks 🤗 please share these videos and help me grow this channel
@VenkatM-fr1hwАй бұрын
Thank you so much sir
@LearnITSecuritywithLuvJoharАй бұрын
Thanks 🤗 please share these videos and help me grow this channel
@halvadanduАй бұрын
Awesome video Sir
@LearnITSecuritywithLuvJoharАй бұрын
Thanks 🤗 please share these videos and help me grow this channel
@LearnITSecuritywithLuvJoharАй бұрын
Thanks 🤗 please share these videos and help me grow this channel
@DilKiDastaanYTАй бұрын
Hi Luv. Can you pls add me to the group or share the link to the whatsapp group, the link was reset so I am unable to join. Thanks.
@LearnITSecuritywithLuvJoharАй бұрын
t.me/LuvJoharFreeTechnologyTrainings
@LearnITSecuritywithLuvJoharАй бұрын
this is telegram link
@662adnanАй бұрын
Can you please share me notes if you have
@LearnITSecuritywithLuvJoharАй бұрын
Thanks 🤗 please share these videos and help me grow this channel
@praveentiwari-qh8gzАй бұрын
Thankyou Sir, helps a lot, would request if we get GRC videos in sequence or no. wise which will help us as an beginner
@LearnITSecuritywithLuvJoharАй бұрын
Thanks 🤗 please share these videos and help me grow this channel
@akankshathakran9765Ай бұрын
Can you make this slide deck to be easy for download,if possible? Or can provide link from where can be downloaded
@LearnITSecuritywithLuvJoharАй бұрын
Thanks 🤗 please share these videos and help me grow this channel
@aditimukherjee3105Ай бұрын
Really like ur videos . But just a feedback. Could you go a little slow please. Its very difficult to catch up and understand at a first go.
@LearnITSecuritywithLuvJoharАй бұрын
Thanks 🤗 please share these videos and help me grow this channel
@MahmoudAzizАй бұрын
Great job guys, thank you!
@LearnITSecuritywithLuvJoharАй бұрын
Thanks 🤗 please share these videos and help me grow this channel