eLearnInfoSec
11.6K subscribers
1:36:52
Splunk Ransomware Investigation Part 1 -
eLearnInfoSec
1K views • 10 months ago
6:42
New SOC Analyst Interview Questions and Answers course Discount only for 5 Days
eLearnInfoSec
2.8K views • 2 years ago
21:40
What are various fields in Incident Ticket (ServiceNow)?
eLearnInfoSec
2.7K views • 2 years ago
17:44
What are different SOC deployment Models?
eLearnInfoSec
1.6K views • 2 years ago
30:38
what are your Roles and Responsibilities as a SOC analyst?
eLearnInfoSec
9.1K views • 2 years ago
26:24
How a SOC Team Managed?
eLearnInfoSec
1K views • 2 years ago
39:54
What are Various Security Devices used in Your Organization?
eLearnInfoSec
2K views • 2 years ago
11:20
What is SOC ?
eLearnInfoSec
2.5K views • 2 years ago
16:30
Log4j (Remote Code ExecutionVulnerability ) - CVE-44228
eLearnInfoSec
1.2K views • 2 years ago
0:29
SOC Training on Udemy
eLearnInfoSec
1.3K views • 2 years ago
0:10
Udemy
eLearnInfoSec
12K views • 2 years ago
1:59:31
Introduction to Security, CIA, Encryption and Hashing
eLearnInfoSec
711 views • 2 years ago
1:38:52
Understanding Windows Active Directory
eLearnInfoSec
735 views • 2 years ago
1:03:16
Introduction to Windows - Types of Wiondows OS and Permissions
eLearnInfoSec
245 views • 2 years ago
1:17:27
IP address and NAT
eLearnInfoSec
1K views • 3 years ago
1:17:27
Networking Devices Part 1
eLearnInfoSec
761 views • 3 years ago
1:10:29
OSI vs TCP/IP Model
eLearnInfoSec
685 views • 3 years ago
1:28:44
Networking - OSI Reference Model
eLearnInfoSec
1K views • 3 years ago
1:10:34
Introduction to Cyber Security Analyst Course
eLearnInfoSec
2.9K views • 3 years ago
2:20:56
SIEM Architecture
eLearnInfoSec
3.8K views • 3 years ago
1:38:11
SOC Process part 2
eLearnInfoSec
1.3K views • 3 years ago
1:14:48
SOC Process part 1
eLearnInfoSec
1.7K views • 3 years ago
2:20:11
OWASP Top 10
eLearnInfoSec
1K views • 3 years ago
59:42
Understanding Service Ports part 2
eLearnInfoSec
745 views • 3 years ago
43:38
Malware and its Types
eLearnInfoSec
1K views • 3 years ago
52:52
DNS Tunneling Attack
eLearnInfoSec
1.5K views • 3 years ago
52:43
Phishing and Spoofing Attacks
eLearnInfoSec
996 views • 3 years ago
1:14:34
Brute Force Attack and Types
eLearnInfoSec
973 views • 3 years ago
1:02:54
Cyber Kill chain OR Phases of Attack
eLearnInfoSec
1K views • 3 years ago
1:18:34
DearCry Incident Analysis
eLearnInfoSec
734 views • 3 years ago
Load More