Пікірлер
@SharonCooper-n7z
@SharonCooper-n7z 5 сағат бұрын
I have had interview prep with him its life changing trust me
@santoshpk87
@santoshpk87 9 сағат бұрын
Hi, I have 15 years of experience in Non IT sector with no knowledge on IT or any related. I would want to chnage the career path now and Have knowledge on ISO. Id it better to go for it after so kuch in NOn IT, if yes then will be considered as fresher post completion of training and is certification is needed ir mandatory. And what are the opportunities post certificated? Thank you
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 сағат бұрын
please whatsapp me on +91 971 860 3114
@nanapoku5259
@nanapoku5259 Күн бұрын
How does one join your training? What areas do you offer training on? Do you have courses on udemy or something?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 21 сағат бұрын
please whatsapp me on +91 971 860 3114
@nanapoku5259
@nanapoku5259 21 сағат бұрын
@@LearnITSecuritywithLuvJohar Okay I will
@BipsonMukhiya
@BipsonMukhiya Күн бұрын
what are the exam of federal agencies ?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Күн бұрын
you mean exam or example?
@BipsonMukhiya
@BipsonMukhiya Күн бұрын
@@LearnITSecuritywithLuvJohar i want to know the examples and the meaning of federal agencies and what are the organizations which belongs to it.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 21 сағат бұрын
Federal agencies are specialized government organizations created by legislation or executive orders to manage specific functions within the federal government. They enforce laws, manage resources, and provide services to the public. These agencies are often part of the executive branch of the federal government and have various levels of authority and responsibility. Here are some examples of federal agencies, along with their meanings and the organizations that fall under them: Examples of Federal Agencies Federal Bureau of Investigation (FBI) Meaning: A federal agency responsible for investigating and enforcing federal laws, particularly those related to counterterrorism, counterintelligence, cybercrime, organized crime, and civil rights. Organizations Under It: The FBI operates independently but collaborates with other federal, state, and local law enforcement agencies. Environmental Protection Agency (EPA) Meaning: A federal agency focused on protecting human health and the environment by enforcing regulations based on laws passed by Congress. Organizations Under It: Various regional offices and specialized divisions such as the Office of Air and Radiation, the Office of Water, and the Office of Chemical Safety and Pollution Prevention. National Aeronautics and Space Administration (NASA) Meaning: An independent federal agency responsible for the civilian space program as well as aeronautics and aerospace research. Organizations Under It: Various research centers and facilities, including the Johnson Space Center, the Kennedy Space Center, and the Jet Propulsion Laboratory. Central Intelligence Agency (CIA) Meaning: An independent federal agency responsible for gathering, processing, and analyzing national security information from around the world. Organizations Under It: Directorates such as the Directorate of Analysis, the Directorate of Operations, and the Directorate of Science and Technology. Department of Health and Human Services (HHS) Meaning: A federal department responsible for protecting the health of all Americans and providing essential human services. Organizations Under It: Centers for Disease Control and Prevention (CDC), Food and Drug Administration (FDA), National Institutes of Health (NIH), and the Centers for Medicare & Medicaid Services (CMS). Federal Departments and Their Agencies Department of Defense (DoD) Meaning: A federal department charged with coordinating and supervising all agencies and functions of the government directly related to national security and the military. Organizations Under It: Army, Navy, Air Force, Marine Corps, National Security Agency (NSA), Defense Intelligence Agency (DIA), and others. Department of Justice (DOJ) Meaning: A federal department responsible for the enforcement of the law and administration of justice. Organizations Under It: FBI, Drug Enforcement Administration (DEA), Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), and the U.S. Marshals Service. Department of Homeland Security (DHS) Meaning: A federal department created to secure the nation from the many threats we face, with a wide-ranging scope including anti-terrorism, border security, and cybersecurity. Organizations Under It: U.S. Customs and Border Protection (CBP), Federal Emergency Management Agency (FEMA), Transportation Security Administration (TSA), and U.S. Citizenship and Immigration Services (USCIS). Department of the Treasury Meaning: A federal department responsible for managing federal finances, collecting taxes, and producing currency. Organizations Under It: Internal Revenue Service (IRS), U.S. Mint, Bureau of Engraving and Printing, and the Financial Crimes Enforcement Network (FinCEN). Department of Education Meaning: A federal department focused on establishing policy for, administering, and coordinating most federal assistance to education. Organizations Under It: Office of Elementary and Secondary Education, Office of Federal Student Aid, and the Institute of Education Sciences. Federal agencies and departments work together to manage the functions and services of the federal government, ensuring that laws and regulations are implemented and enforced across various sectors.
@utkarshbansal245
@utkarshbansal245 2 күн бұрын
Please make more videos in Hindi
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@siddiquigulamgaus8252
@siddiquigulamgaus8252 3 күн бұрын
Thanks.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 3 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@RajuBuchala-fv9yc
@RajuBuchala-fv9yc 4 күн бұрын
Hi, Nice information given. Thanks. also I am planning to move to TPRM role, could you please help me with the things/areas to learn for TPRM Role ?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 3 күн бұрын
please whatsapp me on +91 971 860 3114
@evt82
@evt82 6 күн бұрын
Thanks for useful video
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 5 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@boddetisirisha9004
@boddetisirisha9004 8 күн бұрын
Hi sir.. U have explained about confidentiality nd availability from CIA Traid but what about integrity
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 7 күн бұрын
you should join my classes for ISO 27001 complete implementation course, please whatsapp me on +91 971 860 3114
@unoiamash
@unoiamash 12 күн бұрын
Nice information even after 3 years
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 12 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@hanumandlasagar5082
@hanumandlasagar5082 13 күн бұрын
Hi sir can i have your contact
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 13 күн бұрын
sure whatsapp +91 971 860 3114
@danvanthinidanu6196
@danvanthinidanu6196 13 күн бұрын
May i know the scope for freshers in Cyber Audit comes from arts background
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 13 күн бұрын
sure whatsapp +91 971 860 3114
@yogeesh884
@yogeesh884 15 күн бұрын
Hi Sir, I have total 2 years 7 months of experience in IT. One year I worked as a SOC Analyst and left it because of pressure. Now I want to change my domain and shift to Cybersecurity auditor and compliance/GRC....Can you please tell me how is the scope, work life balance etc., If I choose this GRC, will I be in the right path ? I am interested in this audit...Just want to know your advice Sir ... kindly please please need your advice....
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 15 күн бұрын
please whatsapp on +91 971 860 3114
@maheshpunde3853
@maheshpunde3853 16 күн бұрын
Hey, this is a very important series indeed. Thanks for that. I have a question, I have an experience of around 15 yrs. In manual and automation software testing. Should I opt for this career as an ISO auditor or implementor? How about salary and perks?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 15 күн бұрын
please get in touch with me on whatsapp. +91 971 860 3114
@shru1244
@shru1244 16 күн бұрын
Nice
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 15 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@HanaSec
@HanaSec 17 күн бұрын
Sir...What is difference between IPE and IUC? could you pls explain with example?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 16 күн бұрын
Sure, I can explain the difference between Integrated Platform Environment (IPE) and Integrated User Configuration (IUC) with examples. Integrated Platform Environment (IPE) IPE refers to a unified computing environment where different software and tools are integrated to provide a cohesive and efficient platform for development, testing, deployment, and management of applications. IPE typically includes various components such as operating systems, development frameworks, middleware, databases, and other tools that work together seamlessly. Example: Imagine a cloud-based development platform like Microsoft Azure or AWS. These platforms offer a comprehensive suite of tools and services that allow developers to build, deploy, and manage applications in an integrated environment. For instance, Azure provides services like Azure DevOps for CI/CD, Azure SQL Database for database management, and Azure Functions for serverless computing, all within a unified platform. This integration helps streamline the development process and improves productivity. Integrated User Configuration (IUC) IUC, on the other hand, focuses on the personalization and configuration settings that are tailored to individual users within a system. It encompasses the settings, preferences, and customizations that make the user experience unique and optimized for each user. IUC ensures that users have a personalized and consistent experience across different devices and sessions. Example: Consider the user settings on a Windows operating system. Each user can configure their desktop environment, including wallpaper, screen resolution, installed applications, and system preferences. When a user logs into their account on any Windows machine within an organization, these personalized settings are applied automatically, providing a consistent user experience. This personalized configuration can also extend to software applications, where users can set their preferences for the user interface, default behaviors, and other settings. Summary of Differences: Scope: IPE focuses on the integration of various software and tools within a computing environment, while IUC focuses on user-specific settings and preferences. Purpose: IPE aims to provide a cohesive and efficient development and deployment platform, whereas IUC aims to personalize and optimize the user experience. Components: IPE involves multiple integrated tools and services (e.g., development frameworks, databases), while IUC involves user-specific configurations (e.g., UI preferences, application settings).
@VandanaShikarpur
@VandanaShikarpur 18 күн бұрын
Great content but the background music is too annoying. Please remove the music if possible.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 16 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@user-hx8qp1fd1b
@user-hx8qp1fd1b 19 күн бұрын
Thank you for this video
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 18 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@pratikshapawar6279
@pratikshapawar6279 19 күн бұрын
please provide more details on GRC compliance
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 18 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@drcharuoberoisharma1722
@drcharuoberoisharma1722 19 күн бұрын
Wao very informative ..keep updating us ..God bless you 🎉
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 19 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@rajanchowdhary
@rajanchowdhary 19 күн бұрын
Please make more videos
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 19 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@sudheerkumarbattu4905
@sudheerkumarbattu4905 21 күн бұрын
Can you just answer whats the exact difference of using a proofpoint casb + dlp and symantec dlp and also microsoft purview dlp?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 21 күн бұрын
Certainly! Here's a comparison of Proofpoint CASB + DLP, Symantec DLP, and Microsoft Purview DLP, focusing on their key differences: Proofpoint CASB + DLP Proofpoint CASB (Cloud Access Security Broker): Cloud Security: Monitors and controls the use of cloud applications, providing visibility into cloud activity and enforcing security policies. Threat Protection: Identifies and mitigates threats within cloud environments, such as malware and compromised accounts. Compliance: Ensures compliance with industry standards by enforcing policies and providing audit trails. Proofpoint DLP (Data Loss Prevention): Content Inspection: Analyzes content to prevent sensitive data from leaving the organization. Policy Enforcement: Applies policies to control data movement based on content and context. Integration: Seamless integration with Proofpoint’s email and cloud security solutions. Symantec DLP Symantec DLP (Data Loss Prevention): Comprehensive Coverage: Protects sensitive data across endpoints, networks, storage, and cloud. Advanced Detection: Uses machine learning and data fingerprinting to accurately identify sensitive data. Incident Response: Provides detailed incident analysis and automated response capabilities. Unified Management: Centralized policy management and reporting for all data protection activities. Integration: Integrates with various Symantec security solutions, including endpoint protection and encryption. Microsoft Purview DLP Microsoft Purview DLP (Data Loss Prevention): Microsoft Ecosystem Integration: Deep integration with Microsoft 365 services (e.g., Exchange, SharePoint, OneDrive, Teams). Unified Management: Single pane of glass for managing data protection policies across Microsoft services. Real-time Alerts and Reporting: Real-time monitoring, alerting, and detailed reporting. Built-in AI and Machine Learning: Utilizes Microsoft’s AI capabilities to enhance data protection and policy enforcement. Compliance and Regulations: Supports compliance with various industry standards and regulations. Data Sensitivity Labels: Leverages sensitivity labels to classify and protect data based on predefined or custom policies. Key Differences Integration and Ecosystem: Proofpoint: Best suited for organizations heavily using Proofpoint’s suite for email and cloud security. Symantec: Provides broad protection across various platforms and integrates well with other Symantec solutions. Microsoft Purview: Ideal for organizations deeply invested in Microsoft 365, offering seamless integration with Microsoft services. Detection and Enforcement: Proofpoint: Emphasizes threat protection in cloud environments and integrates with their existing email and cloud security solutions. Symantec: Strong in advanced detection techniques such as data fingerprinting and machine learning. Microsoft Purview: Leverages Microsoft’s AI and machine learning capabilities for enhanced data classification and protection. Deployment and Management: Proofpoint: Offers both cloud and on-premises deployment options, managed through Proofpoint’s interface. Symantec: Typically requires more complex deployment, but offers comprehensive management through a centralized console. Microsoft Purview: Managed within the Microsoft 365 Compliance Center, providing a unified management experience for Microsoft users. Compliance and Reporting: Proofpoint: Provides detailed compliance and audit trails, particularly within cloud environments. Symantec: Known for robust incident response and detailed reporting capabilities. Microsoft Purview: Offers real-time monitoring and compliance reporting, with a focus on integration within Microsoft 365.
@sudheerkumarbattu4905
@sudheerkumarbattu4905 21 күн бұрын
@@LearnITSecuritywithLuvJohar Thank you.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 19 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@sudheerkumarbattu4905
@sudheerkumarbattu4905 7 күн бұрын
@@LearnITSecuritywithLuvJohar yup
@ankitaSingh-jc7eg
@ankitaSingh-jc7eg 23 күн бұрын
Sir, it's a part of a process or if not then when we do gap assessment part?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 22 күн бұрын
An ISO 27001 gap analysis provides a high-level overview of what needs to be done to achieve certification and enables you to assess and compare your organisation's existing information security arrangements against the requirements of ISO 27001.
@AshishJha31
@AshishJha31 23 күн бұрын
Do you have any website, where i can find all your training, i am aspiring CISSP
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 23 күн бұрын
sure you can whatsapp me on 971 860 3114
@ankitaSingh-jc7eg
@ankitaSingh-jc7eg 24 күн бұрын
Thankyou soo much sir🎉
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 23 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@lamentations5v4
@lamentations5v4 24 күн бұрын
thanks for this video. keep rocking!!!
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 23 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@advocatekhairulhasan7211
@advocatekhairulhasan7211 25 күн бұрын
Informative video. Thanks a lot.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 24 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@chrismorganofficial
@chrismorganofficial 27 күн бұрын
Lovely information
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 26 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@amoprince4353
@amoprince4353 Ай бұрын
This is very helpful. Thank you, Luv.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 29 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@niting786
@niting786 Ай бұрын
does a testing environment to be created by auditee to perform these testing scenarioes ? or these can be conducted in live environment ?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
of course test environments are needed
@deepikagoel1884
@deepikagoel1884 Ай бұрын
There is system gap where we can’t get the user access modification date. It is being replaced by last modified date. We are struggling to get the list of users whose access has been modified during period. We requested for user access logs to get the understanding of any user access modification during the year. Logs were provided for last 3 months. How can we ensure the completeness of the user access modification list?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
ChatGPT If you're unable to directly obtain the user access modification date and have to rely on last modified date, there are a few strategies you can employ to ensure the completeness of the user access modification list: Request Historical Data: First, request historical user access logs covering a longer period, ideally for the entire year if possible. Explain the necessity of having a comprehensive understanding of user access modifications for your analysis. Cross-Reference with Other Sources: Check if there are any other systems or sources within your organization that might have records or logs of user access modifications. Sometimes, access changes might be logged in multiple places for auditing or security purposes. Compare with User Activity: While last modified date might not directly indicate access modification, it could still correlate with user activity. Cross-reference the last modified dates with any other user activity logs or systems to identify potential instances where access modifications might have occurred. Interview Key Personnel: Reach out to relevant personnel within your organization who might have knowledge or insights into user access modifications. This could include system administrators, IT support staff, or department heads who oversee access permissions. Analyze Patterns and Anomalies: Even with limited data, you can analyze patterns and anomalies in the provided logs to identify potential instances of user access modifications. Look for unusual spikes or patterns in access changes that might indicate modification activities. Implement Ongoing Monitoring: Going forward, implement a system or process for ongoing monitoring of user access modifications. This could involve setting up alerts for access changes or regularly reviewing access logs to ensure that no modifications are missed in the future.
@SM-xj3hr
@SM-xj3hr Ай бұрын
First of all Thank you so much for your contain and your effort. i have some doubt. For example: - We have only one external firewall, that firewall also have some critical level vulnerability. How do I determine which number to assign? - The data center is running on a single power backup. - The infrastructure is not implemented with the organization's password policy (non-compliance). in that situation 1st, i have to "Risk level" with - Vulnerability (here we need VAPT report?), Impact, Likelihood, Risk Level based on the Asset criticality. here My Question is : During the evaluation if i found more dependencies; like backend server, network, applications in this case how can i set the Asset priority and risk level with dependencies ! should i mention all dependencies? if yes then which should come first which come 2nd how to decide that ? is it based on the again Risk level or Criticality level for the system or service? 2nd, as you describe, I have to evaluate the Acceptable, Moderate & Unacceptable Risks by some number (Impact x Likelihood = Risk) here My Question is : how can i identify which risk number represent for which asset and which risk!! (for example as mentioned "Severe - 5" and Very "Likely - 5" with the Risk number 25!!). I confused about the 'Risk Evaluation'. 🙏 kindly help me to clear the doubt. Again, Thank you so much 🙏
@sumukhakashyap-is1zp
@sumukhakashyap-is1zp Ай бұрын
Great video ,music was a bad idea
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@sumukhakashyap-is1zp
@sumukhakashyap-is1zp Ай бұрын
@@LearnITSecuritywithLuvJohar already did 😊
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
thanks
@sunnygupta6197
@sunnygupta6197 Ай бұрын
Hi ... I am looking for Information security training... Let me know how I can contact u
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
whatsapp at +91 971 860 3114
@nanapoku5259
@nanapoku5259 Ай бұрын
Great introduction to GRC there. Are you going to be bringing more on GRC in your subsequent videos? Also, are there going to be practical projects/labs on GRC?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@welovebrandstore5910
@welovebrandstore5910 Ай бұрын
I am a project manager looking to get into iso security.. can you suggest a roadmap or certificate i got go for to have a career in it? Or is there a way to connect with you?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
whatsapp at +91 971 860 3114
@parandamayadav
@parandamayadav Ай бұрын
Thank you so much for explaining in detailed about ITGC's
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@tewodrosbelay-td5xj
@tewodrosbelay-td5xj Ай бұрын
Would you please help me, to share me ISG framework
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@JaikumarGupta-ys5gm
@JaikumarGupta-ys5gm Ай бұрын
Would you please help me with the proper link of previous video as mention above ? Also, could you please help me for GRC which is 1st video to watch & proer sequence sequence.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@VenkatM-fr1hw
@VenkatM-fr1hw Ай бұрын
Thank you so much sir
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@halvadandu
@halvadandu Ай бұрын
Awesome video Sir
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@DilKiDastaanYT
@DilKiDastaanYT Ай бұрын
Hi Luv. Can you pls add me to the group or share the link to the whatsapp group, the link was reset so I am unable to join. Thanks.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
t.me/LuvJoharFreeTechnologyTrainings
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
this is telegram link
@662adnan
@662adnan Ай бұрын
Can you please share me notes if you have
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@praveentiwari-qh8gz
@praveentiwari-qh8gz Ай бұрын
Thankyou Sir, helps a lot, would request if we get GRC videos in sequence or no. wise which will help us as an beginner
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@akankshathakran9765
@akankshathakran9765 Ай бұрын
Can you make this slide deck to be easy for download,if possible? Or can provide link from where can be downloaded
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@aditimukherjee3105
@aditimukherjee3105 Ай бұрын
Really like ur videos . But just a feedback. Could you go a little slow please. Its very difficult to catch up and understand at a first go.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@MahmoudAziz
@MahmoudAziz Ай бұрын
Great job guys, thank you!
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel