9:33
GDPR Article 3 Territorial scope | Article 3 EU GDPR | Territorial scope
37 views • 3 weeks ago
16:53
Cyber Security Risk Management Series Part 1 (in HINDI)
167 views • 3 weeks ago
7:09
GDPR Article 2 - Material scope and applicability of GDPR | Article 2 Material scope
38 views • 3 weeks ago
8:28
How to Develop and Implement a Record Retention Policy
66 views • 1 month ago
12:43
Cybersecurity Governance Frameworks | Implementing information security governance framework
108 views • 1 month ago
7:57
Cyber Security Audit | What is Internal Audit Charter | Information Security Audit
104 views • 1 month ago
11:03
Article 1 EU GDPR Subject matter and objectives | Article 1 GDPR
29 views • 1 month ago
5:52
The Core Requirements of ISO/IEC 27001:2022 Clauses 4 to10 | ISO 27001 Mandatory Clauses explained
143 views • 1 month ago
10:38
Security Audit Planning - Why is it Important and How To Develop a Risk-based Audit Plan
140 views • 1 month ago
10:50
Important GRC Concept - What Is Information Security Governance? Cybersecurity Governance Explained
187 views • 1 month ago
19:24
What is HIPAA Compliance, Health Insurance Portability and Accountability Act explained (HINDI)
389 views • 1 month ago
7:57
GRC Big career in 2024 - Why is GRC the next big thing and different career options in GRC (HINDI)
383 views • 1 month ago
7:37
What is Transport Layer Security (TLS)? What happens in a TLS handshake?
104 views • 1 month ago
9:09
How To Set Up PKI [Choosing a Hash and Key Size] | Choosing Safe Key Sizes & Hashing Algorithms
46 views • 1 month ago
16:03
Understanding Digital Signatures - What is a Digital Signature? How Digital Signatures Work?
67 views • 1 month ago
24:58
Symmetric Encryption vs Asymmetric Encryption: How it Works and Why it’s Used
94 views • 2 months ago
8:00
CyberSecurity Interview FAQ's | Principles of cryptography explained for freshers
81 views • 2 months ago
4:39
What is Cryptography? Definition, Importance, Types
71 views • 2 months ago
7:35
Authentication vs Authorization, What's the Difference? Cybersecurity interview training freshers
161 views • 2 months ago
7:26
Organization for Economic Cooperation and Development - The OECD Privacy Framework explained
61 views • 2 months ago
12:46
Cybersecurity risk identification process, asset, threat, vulnerability, internal & external threats
257 views • 2 months ago
14:18
Managing information technology risks - Different types of IT risks explained
127 views • 3 months ago
12:24
IT Risk Management Definition, Types, Process, Frameworks | IT Risk Management Lifecycle explained
356 views • 3 months ago
4:48
Understanding interfaces and dependencies in ISMS Scope Implementation
76 views • 3 months ago
3:10
Data Center Physical Security Checklist
117 views • 3 months ago
5:23
Open Source Grc Tools Compliance Professionals Should Know
595 views • 3 months ago
8:16
Business Risks Related to IT Information Technology Function Understanding Cybersecurity IT risks
98 views • 3 months ago
4:26
Major categories of cybersecurity risks | Enterprise Risk and IT Risks explained in detail
81 views • 3 months ago
13:32
Practical CyberSecurity Solutions | Cybersecurity Case Study Series Part 2
102 views • 3 months ago
12:00
Steps to handle a personal data breach according to GDPR | GDPR interview questions
74 views • 3 months ago
Load More