Vigyata.AI
Is this your channel?
Me a Coffee
BuymeacoffeeBuymeacoffeeMe a Coffee

Me a Coffee

Buy Me a Coffee is there for anyone who appreciates the hands-on walkthroughs and wants to support directly. It helps me keep building practical RMF/GRC lessons and demos.

Pros

  • +Simple way to support the channel
  • +Direct support for ongoing content creation

Cons

  • -Optional donation, no included training materials

Featured in 30 videos

AI Meets Cybersecurity: Automating Vulnerability Analysis with Microsoft Copilot (Hands-on)

AI Meets Cybersecurity: Automating Vulnerability Analysis with Microsoft Copilot (Hands-on)

333 views · 2025-12-18 04:15:46

Conducting Nessus Vulnerability Scan Results Analysis in 5 Minutes Using Pivot Table (Hands-on)

Conducting Nessus Vulnerability Scan Results Analysis in 5 Minutes Using Pivot Table (Hands-on)

436 views · 2025-09-03 01:09:34

Episode 9: Configuration Management Plan (CM-9 Explained) | KamilSec

Episode 9: Configuration Management Plan (CM-9 Explained) | KamilSec

787 views · 2024-07-27 13:15:02

Episode 8: System Component Inventory (CM-8 Explained) | KamilSec

Episode 8: System Component Inventory (CM-8 Explained) | KamilSec

579 views · 2024-07-13 13:15:03

Episode 7 Least Functionality (CM-7): KamilSec

Episode 7 Least Functionality (CM-7): KamilSec

970 views · 2024-07-06 14:15:01

Episode 6 Configuration Settings (CM-6)

Episode 6 Configuration Settings (CM-6)

1K views · 2024-06-29 14:15:02

Episode 5 Access Restriction For Change (CM-5)

Episode 5 Access Restriction For Change (CM-5)

442 views · 2024-06-22 14:15:00

TIPS on Conducting NIST 800-53 Rev4 to Rev5 Control GAP Analysis

TIPS on Conducting NIST 800-53 Rev4 to Rev5 Control GAP Analysis

4K views · 2023-09-21 00:00:24

Excerpt from the IMO Tech's RMF Training During Week 1

Excerpt from the IMO Tech's RMF Training During Week 1

2K views · 2023-06-13 02:35:19

Information System Contingency Planning (ISCP) Overview (SP 800-34 Rev 1)

Information System Contingency Planning (ISCP) Overview (SP 800-34 Rev 1)

6K views · 2022-07-16 13:15:02

IT and Computer Incident Response Process Overview (NIST SP 800-61 Rev 2)

IT and Computer Incident Response Process Overview (NIST SP 800-61 Rev 2)

9K views · 2022-06-25 14:19:50

RMF and SDLC Considerations in Organizations

RMF and SDLC Considerations in Organizations

5K views · 2022-04-09 13:15:01

RMF POA&M Creation and Management (Hands-On Approach)

RMF POA&M Creation and Management (Hands-On Approach)

33K views · 2022-02-12 14:15:09

Conducting Nessus Vulnerability Scan Results Analysis Using Excel Spreadsheet (Hands-on)

Conducting Nessus Vulnerability Scan Results Analysis Using Excel Spreadsheet (Hands-on)

40K views · 2022-01-29 14:00:33

TIPS FOR DEVELOPING AND REVIEWING SECURITY ASSESSMENT PLAN (SAP)

TIPS FOR DEVELOPING AND REVIEWING SECURITY ASSESSMENT PLAN (SAP)

11K views · 2022-01-22 13:53:38

Some Important Tips For Reviewing and Updating System Security Plan (SSP)

Some Important Tips For Reviewing and Updating System Security Plan (SSP)

11K views · 2021-11-13 14:15:24

The Core Daily, Weekly, Monthly and Annual Responsibilities of an ISSO

The Core Daily, Weekly, Monthly and Annual Responsibilities of an ISSO

12K views · 2021-10-02 13:15:00

Security Control Assessment (SCA) Process Overview

Security Control Assessment (SCA) Process Overview

33K views · 2021-08-28 13:15:00

Hands-On Security Control Testing (AC-11) Using FedRAMP Test Case Template (Determine-if Levels)

Hands-On Security Control Testing (AC-11) Using FedRAMP Test Case Template (Determine-if Levels)

16K views · 2021-07-25 13:15:01

Relationship Between Information System PTA, PIA and System of Records Notice (SORN) - SP 800-122.

Relationship Between Information System PTA, PIA and System of Records Notice (SORN) - SP 800-122.

8K views · 2021-07-10 13:45:03

Self Security Control Assessments (NIST SP 800-171 Rev2) Vs CMMC - The C3PAOs Requirements

Self Security Control Assessments (NIST SP 800-171 Rev2) Vs CMMC - The C3PAOs Requirements

7K views · 2021-06-12 14:15:00

RMF Continuous Control Monitoring Step Overview

RMF Continuous Control Monitoring Step Overview

8K views · 2021-05-29 14:15:01

RMF Authorization Step

RMF Authorization Step

5K views · 2021-05-15 13:15:01

FISMA Law, A&A Process and RMF Process Overview and Summary

FISMA Law, A&A Process and RMF Process Overview and Summary

14K views · 2021-05-01 14:15:00

RMF Control Selection Process And How To Write Security Control Implementation Statements (Hands-On)

RMF Control Selection Process And How To Write Security Control Implementation Statements (Hands-On)

45K views · 2021-04-17 14:09:01

Relationship Between Risk Analysis, Risk Assessment, And Risk Management (SP 800-30)

Relationship Between Risk Analysis, Risk Assessment, And Risk Management (SP 800-30)

21K views · 2021-04-03 14:15:04

Relationship Between Vulnerability, Threat, Control And Risk As They Relate to Cybersecurity

Relationship Between Vulnerability, Threat, Control And Risk As They Relate to Cybersecurity

11K views · 2021-03-20 14:00:23

Protect Yourself From Phishing Attacks: Learn Email Header and Suspecious Link (Malware) Analysis.

Protect Yourself From Phishing Attacks: Learn Email Header and Suspecious Link (Malware) Analysis.

14K views · 2021-01-16 19:31:24

RMF Security Control Testing Hands On (Using SP 800-53 and 800-53A)

RMF Security Control Testing Hands On (Using SP 800-53 and 800-53A)

33K views · 2020-12-26 16:00:01

NIST RMF System Categorization Step Hands On (Using SP 800-60 Vol II)

NIST RMF System Categorization Step Hands On (Using SP 800-60 Vol II)

65K views · 2020-12-26 15:00:30

Me a Coffee

BuymeacoffeeAvailable on Buymeacoffee

Buy on Buymeacoffee

External purchase

Highlights

  • +Simple way to support the channel
  • +Direct support for ongoing content creation

Recommended by

KamilSec