Discover
Prabh Nair
Prabh Nair
Author: Prabh Nair
Subscribed: 8Played: 115Subscribe
Share
© Prabh Nair
Description
Dive deep into the world of information security with Prabh Nair, a seasoned expert with a knack for distilling complex topics into easily digestible insights. Each episode, spanning just 15 minutes, is designed to provide listeners with a concise and clear understanding of the ever-evolving landscape of infosec. Whether you're a professional looking to stay updated, a student eager to learn, or just curious about the digital realm, Prabh's enlightening discussions promise to keep you informed and engaged. Tune in for your regular dose of cybersecurity wisdom, all in a quarter of an hou
95 Episodes
Reverse
In this Podcast, I have covered step by step process of how to become a SOC expert
IT Audit Simplified: Insights from Rahul Sir – A Comprehensive Podcast on IT and Cybersecurity Audits"Get ready to dive into the world of IT Audits with this insightful podcast featuring Rahul Sir, an expert with vast experience in IT auditing, security auditing, and cybersecurity assessments. This session is packed with actionable knowledge and practical advice, perfect for beginners and seasoned professionals alike.#audit #cybersecurity #infosec
IT Audit Simplified: Insights from Rahul Sir – A Comprehensive Podcast on IT and Cybersecurity Audits"Get ready to dive into the world of IT Audits with this insightful podcast featuring Rahul Sir, an expert with vast experience in IT auditing, security auditing, and cybersecurity assessments. This session is packed with actionable knowledge and practical advice, perfect for beginners and seasoned professionals alike.#itaudit #cybersecurity #infosecaudit
Are you aiming for a coveted role in Governance, Risk, and Compliance (GRC) at a Big 4 firm? Even if you don't have direct experience, you can still impress interviewers and land your dream job. In this episode, we'll delve into practical strategies to highlight your transferable skills, academic projects, certifications, and understanding of GRC concepts.
Key Takeaways:
Identify Relevant Transferable Skills: Discover how to connect your past experiences to GRC roles.
Leverage Academic Projects: Learn how to showcase your knowledge and problem-solving abilities through academic work.
Articulate Your GRC Passion: Learn how to effectively communicate your interest and enthusiasm for GRC.
Prepare Strong Questions: Discover how to ask insightful questions that demonstrate your knowledge and engagement.
#grc #cybersecurity
Are you aiming to land a coveted role in Governance, Risk, and Compliance (GRC) at one of the Big 4 firms? Look no further! In this insightful podcast, I will GRC shares invaluable tips and tricks to help you ace your interview and secure your dream job.
Key Topics Covered:
Understanding the Big 4 GRC landscape
Common interview questions and how to answer them effectively
Technical and behavioral skills to highlight
Case study preparation and problem-solving techniques
Networking strategies to build valuable connections
#GRC #CYBERSECURITY
Are you aiming for a coveted role in a Security Operations Center (SSOC)? This podcast is your one-stop solution to ace the interview process.
Key Topics:
Common SSOC Interview Questions: Discover the most frequently asked questions and learn how to answer them confidently.
Interview Preparation Strategies: Get expert tips on how to prepare for your SSOC interview, including resume building, research, and practice.
Behavioral Interview Techniques: Understand the importance of behavioral questions and how to effectively showcase your skills and experiences.
Interview Tips: Learn essential tips for making a positive impression during the interview, such as body language, communication, and closing the interview.
CISSP 2024 Domain 1: Your Last-Minute Study Pointer
Are you preparing for the CISSP 2024 exam and need last-minute study pointers for Domain 1? This podcast provides key insights and essential knowledge to help you ace your exam. From understanding security and risk management concepts to mastering the latest security frameworks, we cover it all.Key Takeaways:
Comprehensive Review: Get a detailed overview of Domain 1, including security governance, risk management, and compliance.
Critical Concepts: Learn the most important concepts and key terms you need to know for the exam.
Study Tips: Discover effective study strategies and last-minute pointers to boost your confidence.
Listen Now and ensure you're fully prepared for the CISSP 2024 Domain 1 exam. Perfect for security professionals looking to advance their careers and stay updated with the latest security practices.
#cissp #cybersecurity #infosec
Learn how to pull, parse and pivot Windows Event Logs like a pro SOC analyst. Urvesh shows GUI, CLI and bootable-USB methods so you never miss evidence—even when Windows is broken. Perfect for blue-teamers, incident responders and anyone chasing their first cybersecurity roleTAKEAWAYSIdentify suspicious Event IDs (4624, 4625, 4688) in secondsBuild repeatable triage flow for ransomware, brute-force, insider threatsMap findings to MITRE ATT&CK for reports that impress hiring managers.00:00 – 02:50 – Introduction02:50 – 03:48 - Learn SIEM tools (like Vasu, Splunk)03:48 – 07:22 - Begin with Basics07:22 – 08:20 - Windows Logs08:20 – 01:23:05 - Window Logs09:47 – What is Log10:35 – Purpose12:47 – Log Analysis14:00 - Event Viewer (First Step)16:04 – Why Command Prompt 17:50 – 3 Segments 18:16 – Custom View19:01 – Log Categorization24:13 – Powershell26:39 – Top 10 Interview question 32:19 – Common Event IDs38:54 – XML views 44:00 – Warnings, Error44:11 – Fundamental IDs49:21 – Administrative Events 50:59 – Create Custom view53:20 – No SIEM tools 54:29 – traditional Event ID’s55:32 – Sysmon (System Monitor)59:19 – Enable Sysmon01:07:44 – Sysmon IDs01:15:05 – Is programming knowledge required01:16:51 – Books 01:23:05 – Hypothesis 01:24:55 – Interviewer thought 01:32:01 – Virus total 01:33:36 – Scenario 2 (PowerShell command)01:35:38 – Future broadcast (How to map one practical with minor attack)01:36:31 - schtasksSOC Playlisthttps://www.youtube.com/watch?v=zCLlrFZU0M8&list=PL0hT6hgexlYxd24Jb8OE7vZoas-iTcHAcCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/InfoseclearningMy Instagramhttps://www.instagram.com/prabhnair/My Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE#socanalyst #infosec #loginvestigation #SOC #LogAnalysis #WindowsEventLogs #Cybersecurity #IncidentResponse
CISO Data Handling During Recovery
Network Security Foundation Master Class: learn core networking types, media and devices every blue-team analyst must know. We break down PAN-LAN-WAN, analog vs digital transmission, wired vs wireless links, plus hub-switch-router-firewall roles. Finish with real-world media-selection metrics (bandwidth, latency, jitter) so you can spot risks and harden any network.WHAT YOU’LL LEARNScope-based network types: PAN, LAN, WLAN, CAN, MAN, WAN, GAN and SANAnalog vs digital transmission—why noise and modulation matter for securityWired vs wireless media: coax, twisted pair, fiber, radio, microwave, infraredKey devices and their weak spots: hub, switch, router, modem, firewallPerformance metrics that expose risk: bandwidth, throughput, latency, jitter, BDPHow Zero-Trust principles map onto modern multi-site SD-WAN designsNetwork Security https://www.youtube.com/watch?v=Y3ozkAFuiHc&list=PL0hT6hgexlYzX6AWwcyDbAZQUKYJL2Mdt&pp=gAQBSOC Playlisthttps://www.youtube.com/watch?v=zCLlrFZU0M8&list=PL0hT6hgexlYxd24Jb8OE7vZoas-iTcHAcCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/InfoseclearningMy Instagramhttps://www.instagram.com/prabhnair/My Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE#networksecurity #computernetworking #infosec #socanalyst #computernetworking #itnetworking
In this podcast, cybersecurity mentor Prabh Nair sits down with Urvesh, a skilled cybersecurity professional, to break down everything you need to know to land a SOC Analyst job — from foundational skills to automation, interview strategies, resume tips, and mindset shifts.https://www.linkedin.com/in/urvesh-thakkar/?originalSubdomain=inWhether you’re a beginner in cybersecurity or preparing for your first SOC role, this episode offers practical advice, real-world insights, and a step-by-step roadmap to kickstart your career.🔍 What You’ll Learn:✔️ Bug bounty vs SOC: What worked and what didn’t✔️ Free ways to learn cybersecurity (and what to avoid paying for)✔️ How to build your home lab for SOC/SIEM practice✔️ Real tips for building a job-winning cybersecurity resume✔️ How to prep for SOC Analyst interviews (mindset + skills)✔️ Why fundamentals beat certifications — every time✔️ How to automate phishing detection with Python and scripts✔️ The exact number of hours to invest to reach SOC readiness✔️ Strategies to stand out on LinkedIn + direct outreach tactics💼 Best For:SOC Analyst Aspirants (L1, L2, L3)Cybersecurity BeginnersFreshers with no IT backgroundBCA/BTech/BA grads starting in InfosecAnyone looking to transition into Blue Team rolesCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvSOC Playlisthttps://youtube.com/playlist?list=PL0hT6hgexlYxd24Jb8OE7vZoas-iTcHAc&si=xA1CmEPZ_eb93OcWStudy with MeTelegram Grouphttps://t.me/InfoseclearningMy Instagramhttps://www.instagram.com/prabhnair/My Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE#SOCAnalyst #CyberSecurityCareers #SOCMasterClass #CyberSecurityForBeginners #ThreatDetection #SIEM #SOCTraining #NetworkingBasics #CyberDefense #CyberSecurityTips #socjobs #socanalyst
This video is your complete “SOC Analyst Roadmap” for 2025. I break down every skill, tool, and mindset you need – in the exact order that hiring managers expect. No fluff, no random tutorials, just a proven learning sequence that gets interviews.00:00 – 00:53 – Introduction00:53 – 01:43 - Sequence01:43 – 02:07 - Reading of Logs02:07 – 02:16 - Identify the common attacks02:16 – 02:35 - SIEM 02:35 – 03:45 - Computer Fundamentals03:35 – 04:10 – DATA04:10 – 04:33 - Operating Systems04:33 – 05:08 - Basic Linux Commands05:08 – 06:10 - IP Address (Identifying common attacks)06:10 – 06:49 - Internet protocols06:49 – 07:21 - Tools07:21 - 09:35 - Network Devices (Packet Movements)09:35 – 10:45 - Secure Internet Traffic 10:45 – 14:18 - Cyber Security14:18 – 16:40 - SOC structure and roles16:40 – 17:36 – Logs17:36 – 21:33 - (Reading Logs)21:33 – 24:27 - Packet Investigation24:27 – 27:13 - Common Attacks27:13 – 31:10 - SIEMWHY WATCH THIS SOC LEARNING GUIDE?Clear structure – Networking ➜ Cybersecurity basics ➜ SOC workflow ➜ Log analysis ➜ Wireshark ➜ Attack footprints ➜ Free SIEM labs.Beginner-friendly – Perfect if you keep asking “How do I start in cybersecurity?”Real SOC stories – Learn from my first panic-filled log incident and how it shaped my Blue Team career.Actionable resources – Download links for cheat sheets, practice labs, and sample logsDFIRhttps://github.com/Azr43lKn1ght/DFIR-LABSWHAT YOU’LL MASTERNetworking Fundamentals: IP addresses, ports, protocols, traceroute – the bedrock of incident detection.Cybersecurity Foundations: CIA triad, threat-vulnerability-risk logic, real-world attack impact.SOC Structure & Roles: L1 vs L2 vs L3 responsibilities, escalation flow, ticket lifecycle.Log Analysis: Windows Event ID 4625, Linux auth.log, firewall deny entries – find Indicators of Compromise fast.Wireshark Deep Dive: Follow TCP streams, spot DNS tunneling, detect C2 beaconing.Common Attack Patterns: Phishing, brute-force, malware, lateral movement – mapped to MITRE ATT&CK.Hands-On SIEM: Splunk Free & Wazuh – ingest sample logs, run correlation searches, build your first alert.#socanalyst #SOCTraining #CyberSecurityCareers #BlueTeam #LogAnalysis #Wireshark #SIEM #Splunk #Wazuh #NetworkingBasics #MITREATTACK #SOCRoadmap #InfosecJobsSOC Playlisthttps://www.youtube.com/watch?v=zCLlrFZU0M8&list=PL0hT6hgexlYxd24Jb8OE7vZoas-iTcHAcCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/InfoseclearningMy Instagramhttps://www.instagram.com/prabhnair/My Spotifyhttps://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE
Metrics Program CISO Build (What you cannot measure, you cannot run)
Welcome! In this episode we break down SECURITY ARCHITECTURE from the ground up—perfect for SMEs, CISOs, cloud engineers, security architects, and anyone planning an AI digital-transformation in 2025.Welcome to an in-depth master-class on security architecture for the modern enterprise—with extra focus on small and medium-sized organisations taking their first big steps into cloud, AI, and digital transformation. In this episode you’ll hear how seasoned architects turn high-level security strategy into day-to-day guardrails that developers, DevOps teams, and the business can actually follow.Linkedin Profilehttps://www.linkedin.com/in/maddy-r-13899712/What you’ll learn1. How to adopt greenfield approach to building security architecture?2. How to balance business risk, costs, constraints while delivering security program architecture?3. How to meet stakeholder expectations?4. How to deliver and support security architecture throughout enterprise journey?If you’re ready to turn strategy into secure, scalable architecture—and do it without breaking the bank—hit play, take notes, and apply tomorrow. Don’t forget to like, subscribe, and drop your toughest “security architecture” question in the comments. We respond to every one.CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/Infoseclearning#securityarchitecture #infosec #cybersecurity #architect #architecture #sabsa #securitybreach
Podcast 2 CISO Building KPI vs KRI 5mins Podcast
Podcast 1 Two CISOs: Operator vs Strategist
Unlock the secrets of SOC from a top Detection Engineer! Learn about threat detection and detection engineering for beginners in the real world.Join Prabh Nair for a no-fluff conversation with Adhokshaj Mishra, Staff Detection Engineer , as we crack open the daily reality of SOC threat detection and the art of detection engineering. From scrappy beginnings as a self-taught malware hobbyist to leading enterprise-scale detection logic, Adhok shares how deep technical chops, relentless curiosity and the right tools turn raw telemetry into life-saving alerts. We dissect the Log4j crisis response, false-positive tuning, SQL-powered data hunts, eBPF probes, OSQuery workflows and the tightrope walk between detection depth and system performance. Whether you’re planning a SOC career, refining your threat detection stack or curious about detection engineering fundamentals, this podcast delivers field-tested insights you won’t find in certification manuals. Stay to the end for book, tool and learning-path recommendations—and don’t forget to hit the comments with your top takeaways and future topic requests.CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/Infoseclearning#detectionengeering #soc #cybersecuritycompany #cybersecurity #cybersecuritycareers #infosec #socThreatDetectionPodcast#detectionEngineeringMasterclass#howToBecomeADetectionEngineer#realWorldSOCWorkflows#log4jDetectionCaseStudy#eBPFandOSQueryForSecurity#falsePositiveTuningTips#threatHuntingWithSQL#detectionEngineerCareerPath#malwareAnalysisFundamentals#socAnalystInterviewPrep#telemetryDataAnalysis#mitreATTACKDetectionMapping#edrvsmdrExplained#securityOperationsCenterInsights#buildingReliableDetectionRules#practicalCybersecurityPodcast#industrialScaleAlertingTactics#zeroToAlertHeroGuide#proToolsForThreatDetection#soc#threatDetection#detectionEngineering#detectionEngineer#socPodcast#log4j#eBPF#osquery#mdr#edr#malwareAnalysis#threatHunting#falsePositives#siem#alertTuning#sqlSecurity#mitreATTACK#telemetry#cybersecurityCareer#socAnalyst#securityOperationsCenter#prabhNair#adhokMishra#detectionRules#securityPodcast#cyberTools#redTeamDefense#realtimeAlerts#industrialSecurity#advancedSOC
Deploying AI responsibly isn’t about sprinkling policies on top of models—it’s a step-by-step AI Management System (AIMS) that anchors every idea, dataset and model to governance, controls and evidence. In this first-of-its-kind practical walk-through, I show you how to stand up an AIMS that meets the brand-new ISO 42001 standard and the EU AI Act—from executive mandate to post-market monitoring.We start with the basics—what an AIMS is and why ISO 42001 treats it like ISO 27001 for AI. Then we map each clause to EU AI Act risk tiers, so you know exactly which models need bias tests, human oversight or a full Technical File.Next, I unpack my 11-week roadmap: Due-diligence inventory, governance committee, razor-sharp policies, data-lineage gates, model-risk scoring, CI/CD compliance tests, runtime drift alerts and audit prep. You’ll see real artefacts—Asset Register, RACI matrix, Risk Assessment, Model Card—and watch them plug into automation so auditors get proof, not promises.Finally, we jump into post-market monitoring—capturing accuracy, drift and fairness gaps in production and feeding them back into continuous improvement loops required by Article 61 of the EU AI Act.Whether you’re a CISO, ML lead or startup founder, this master class hands you the templates, playbooks and metrics to certify faster, avoid fines and build AI users can trust.What is AI Governance Foundationhttps://youtu.be/LgFBi5XD-OwCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/Infoseclearning#AIGovernance#ISO42001#EUAIACT#AIManagementSystem#ResponsibleAI#AICompliance#AIRegulation#AIMS#ModelRiskManagement
Learn to dissect malware like a pro — even if you’re just starting out.In this step-by-step session, cyber-consultant Harpreet S. Arora shows how to combine static analysis, dynamic sandboxing, and AI-powered behavior tools to catch zero-day ransomware before it detonates.Linkedin Inhttps://www.linkedin.com/in/harpreet-s-arora/ What You’ll LearnMalware Types 101 — viruses, worms, Trojans, ransomware-as-a-serviceStatic analysis demo with HashMyFiles, HxD, Floss, and SHA-256 hashesDynamic analysis demo using Process Monitor & System Informer inside a safe sandboxZero-day workflow — why VirusTotal alone isn’t enoughTop 3 SOC logging sources for early malware detectionCareer path tips — moving from network troubleshooting → SOC → malware analystBeginner toolkit & book list to practice at homeTools & Links MentionedHashMyFiles — quick hash checkerHxD — hex editor for static inspectionFloss (FireEye) — extract obfuscated stringsVirusTotal — multi-engine malware scanProcess Monitor (ProcMon) — real-time system tracingSystem Informer — advanced task & memory viewerWireshark — packet capture and network forensics Recommended ReadingPractical Malware Analysis — Sikorski & HonigThe Art of Memory Forensics — Case & WaltersMalware Analyst’s Cookbook — Ligh et al.CISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/Infoseclearning#MalwareAnalysis #StaticAnalysis #DynamicAnalysis #Ransomware #ZeroDay #CyberSecurity #SOC #IncidentResponse #MalwareAnalysisTools #CyberSecurityCareer
Build a security culture that ships safer systems without drama. In this podcast, Prabh and Sarang go deep on practical red teaming, how to work with blue teams, and how to avoid production landmines. We break down stealthy operations in live environments, legacy network scanning best practices, purple team exercises that actually improve detections, and the career path for aspiring red teamers who are starting with a small budget. You will learn how to document findings in plain English, pick representative samples instead of blasting whole networks, and present impact to leadership with context that earns trust.What we coverSecurity culture that reduces blame and builds collaborationRed vs blue to purple teaming that improves detections fastDaily life of a red teamer, ops tempo, and realistic reportingLegacy network scanning without outages, VLAN sampling, /24 tipsFoundational knowledge first: network architecture, ACL mapping, CVSSStealth in production vs aggressive testing in QAFree platforms to grow skills: Hack The Box, TryHackMeInterview strategies, hands-on challenges, and showcasing projectsBudget-friendly certs: CRT or CRTP as OSCP alternativesUsing LinkedIn for research, portfolios, and recruiter outreach Key takeawaysRed team vs blue team vs purple teaming: collaboration that actually worksFree hands‑on labs: Hack The Box, TryHackMe, VulnHubSafe network‑scanning best practices for legacy Cisco gear (avoid the /16 disaster)How to document findings in plain language that wins management supportBuilding a strong foundation in network architecture and core cybersecurity conceptsCrafting LinkedIn posts and portfolios that attract penetration testing recruitersAffordable certs that matter: CRT / CRTP vs OSCPLive interview tips: custom Hack The Box labs with no public write‑upsCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/Infoseclearning#RedTeam #CyberSecurity #HackTheBox #PurpleTeam #PenTesting #TryHackMe #OTSecurity #readteaming




