Vigyata.AI
Is this your channel?
Official KamilSec branded designs and apparel
KamilsecKamilsecOfficial KamilSec branded designs and apparel

Official KamilSec branded designs and apparel

I mentioned my KamilSec merch for anyone who wants a simple way to support the channel while repping the brand. If you’re following my RMF/GRC walkthroughs and the control series, the support helps me keep pushing out more hands-on content.

Pros

  • +Supports the channel and future GRC training content
  • +Official KamilSec branded designs

Cons

  • -Not a training resource—just support/merch

Featured in 73 videos

AI Meets Cybersecurity: Automating Vulnerability Analysis with Microsoft Copilot (Hands-on)

AI Meets Cybersecurity: Automating Vulnerability Analysis with Microsoft Copilot (Hands-on)

333 views · 2025-12-18 04:15:46

Conducting Nessus Vulnerability Scan Results Analysis in 5 Minutes Using Pivot Table (Hands-on)

Conducting Nessus Vulnerability Scan Results Analysis in 5 Minutes Using Pivot Table (Hands-on)

436 views · 2025-09-03 01:09:34

Episode 7 Least Functionality (CM-7): KamilSec

Episode 7 Least Functionality (CM-7): KamilSec

970 views · 2024-07-06 14:15:01

Episode 6 Configuration Settings (CM-6)

Episode 6 Configuration Settings (CM-6)

1K views · 2024-06-29 14:15:02

Episode 5 Access Restriction For Change (CM-5)

Episode 5 Access Restriction For Change (CM-5)

442 views · 2024-06-22 14:15:00

Episode 4 Impact Analyses (CM-4)

Episode 4 Impact Analyses (CM-4)

439 views · 2024-06-15 14:15:04

Episode 3 Configuration Change Control (CM-3)

Episode 3 Configuration Change Control (CM-3)

450 views · 2024-06-14 23:00:33

Episode 2 BASELINE CONFIGURATION (CM-2)

Episode 2 BASELINE CONFIGURATION (CM-2)

3K views · 2023-11-29 00:15:00

Episode 1 CONFIGURATION MGMT POLICY AND PROCEDURE (CM-1)

Episode 1 CONFIGURATION MGMT POLICY AND PROCEDURE (CM-1)

2K views · 2023-11-21 01:00:19

TIPS on Conducting NIST 800-53 Rev4 to Rev5 Control GAP Analysis

TIPS on Conducting NIST 800-53 Rev4 to Rev5 Control GAP Analysis

4K views · 2023-09-21 00:00:24

Episode 19_PUBLICLY ACCESSIBLE CONTENT_ (AC-22)

Episode 19_PUBLICLY ACCESSIBLE CONTENT_ (AC-22)

1K views · 2023-07-29 13:15:02

Episode 18_INFORMATION SHARING_ (AC-21)

Episode 18_INFORMATION SHARING_ (AC-21)

721 views · 2023-07-26 01:00:06

Excerpt from the IMO Tech's RMF Training During Week 1

Excerpt from the IMO Tech's RMF Training During Week 1

2K views · 2023-06-13 02:35:19

Episode 17_USE OF EXTERNAL SYSTEMS_ (AC-20)

Episode 17_USE OF EXTERNAL SYSTEMS_ (AC-20)

811 views · 2023-05-25 14:48:02

Episode 16_ACCESS CONTROL FOR MOBILE DEVICES_ (AC-19)

Episode 16_ACCESS CONTROL FOR MOBILE DEVICES_ (AC-19)

706 views · 2023-05-17 23:31:11

Episode 15_WIRELESS ACCESS_ (AC-18)

Episode 15_WIRELESS ACCESS_ (AC-18)

2K views · 2023-04-04 00:30:25

Episode 14_REMOTE ACCESS_ (AC-17)

Episode 14_REMOTE ACCESS_ (AC-17)

1K views · 2023-01-31 00:00:23

Episode 13_Permitted Actions Without Identification and Authentications_ (AC-14)

Episode 13_Permitted Actions Without Identification and Authentications_ (AC-14)

1K views · 2022-12-13 01:46:29

Episode 12_Session Termination_ (AC-12)

Episode 12_Session Termination_ (AC-12)

1K views · 2022-11-25 23:45:03

Episode 11_Device Lock Control_ (AC-11)

Episode 11_Device Lock Control_ (AC-11)

1K views · 2022-11-04 00:29:02

Episode 10_Concurrent Session Control_ (AC-10)

Episode 10_Concurrent Session Control_ (AC-10)

1K views · 2022-10-08 00:00:24

Episode 9_Previous Logon Notification_ (AC-9)

Episode 9_Previous Logon Notification_ (AC-9)

1K views · 2022-10-01 00:00:11

Episode 8_SYSTEM USE NOTIFICATION_ (AC-8)

Episode 8_SYSTEM USE NOTIFICATION_ (AC-8)

2K views · 2022-09-17 00:15:01

Episode 7_UNSUCCESSFUL LOGON ATTEMPTS_ (AC-7)

Episode 7_UNSUCCESSFUL LOGON ATTEMPTS_ (AC-7)

2K views · 2022-09-10 00:15:02

Episode 6_LEAST PRIVILEGE_ (AC-6)

Episode 6_LEAST PRIVILEGE_ (AC-6)

2K views · 2022-09-03 01:00:01

Episode 5_SEPARATION OF DUTIES_ (AC-5)

Episode 5_SEPARATION OF DUTIES_ (AC-5)

2K views · 2022-08-27 02:00:13

Episode 4_INFORMATION FLOW ENFORCEMENT (AC-4)

Episode 4_INFORMATION FLOW ENFORCEMENT (AC-4)

3K views · 2022-08-13 13:15:01

Episode 3_ACCESS ENFORCEMENT (AC-3)

Episode 3_ACCESS ENFORCEMENT (AC-3)

3K views · 2022-08-06 13:15:01

Episode 2_ACCOUNT MANAGEMENT (AC-2)

Episode 2_ACCOUNT MANAGEMENT (AC-2)

4K views · 2022-07-30 13:30:17

Episode 1 ACCESS CONTROL POLICY AND PROCEDURE (AC-1)

Episode 1 ACCESS CONTROL POLICY AND PROCEDURE (AC-1)

8K views · 2022-07-23 13:30:25

Information System Contingency Planning (ISCP) Overview (SP 800-34 Rev 1)

Information System Contingency Planning (ISCP) Overview (SP 800-34 Rev 1)

6K views · 2022-07-16 13:15:02

IT and Computer Incident Response Process Overview (NIST SP 800-61 Rev 2)

IT and Computer Incident Response Process Overview (NIST SP 800-61 Rev 2)

9K views · 2022-06-25 14:19:50

Roles and Responsibilities for Key Participants in Risk Management Framework (RMF)

Roles and Responsibilities for Key Participants in Risk Management Framework (RMF)

4K views · 2022-04-30 13:15:00

RMF and SDLC Considerations in Organizations

RMF and SDLC Considerations in Organizations

5K views · 2022-04-09 13:15:01

RMF POA&M Creation and Management (Hands-On Approach)

RMF POA&M Creation and Management (Hands-On Approach)

33K views · 2022-02-12 14:15:09

Conducting Nessus Vulnerability Scan Results Analysis Using Excel Spreadsheet (Hands-on)

Conducting Nessus Vulnerability Scan Results Analysis Using Excel Spreadsheet (Hands-on)

40K views · 2022-01-29 14:00:33

TIPS FOR DEVELOPING AND REVIEWING SECURITY ASSESSMENT PLAN (SAP)

TIPS FOR DEVELOPING AND REVIEWING SECURITY ASSESSMENT PLAN (SAP)

11K views · 2022-01-22 13:53:38

Some Important Tips For Reviewing and Updating System Security Plan (SSP)

Some Important Tips For Reviewing and Updating System Security Plan (SSP)

11K views · 2021-11-13 14:15:24

Distinction Between Information Security and Cybersecurity

Distinction Between Information Security and Cybersecurity

4K views · 2021-10-09 14:15:03

The Core Daily, Weekly, Monthly and Annual Responsibilities of an ISSO

The Core Daily, Weekly, Monthly and Annual Responsibilities of an ISSO

12K views · 2021-10-02 13:15:00

Security Control Assessment (SCA) Process Overview

Security Control Assessment (SCA) Process Overview

33K views · 2021-08-28 13:15:00

Hands-On Security Control Testing (AC-11) Using FedRAMP Test Case Template (Determine-if Levels)

Hands-On Security Control Testing (AC-11) Using FedRAMP Test Case Template (Determine-if Levels)

16K views · 2021-07-25 13:15:01

Relationship Between Information System PTA, PIA and System of Records Notice (SORN) - SP 800-122.

Relationship Between Information System PTA, PIA and System of Records Notice (SORN) - SP 800-122.

8K views · 2021-07-10 13:45:03

IT Security Documentations/Governance and IT Security Policy Templates

IT Security Documentations/Governance and IT Security Policy Templates

5K views · 2021-06-26 13:45:02

Self Security Control Assessments (NIST SP 800-171 Rev2) Vs CMMC - The C3PAOs Requirements

Self Security Control Assessments (NIST SP 800-171 Rev2) Vs CMMC - The C3PAOs Requirements

7K views · 2021-06-12 14:15:00

RMF Continuous Control Monitoring Step Overview

RMF Continuous Control Monitoring Step Overview

8K views · 2021-05-29 14:15:01

RMF Authorization Step

RMF Authorization Step

5K views · 2021-05-15 13:15:01

FISMA Law, A&A Process and RMF Process Overview and Summary

FISMA Law, A&A Process and RMF Process Overview and Summary

14K views · 2021-05-01 14:15:00

RMF Control Selection Process And How To Write Security Control Implementation Statements (Hands-On)

RMF Control Selection Process And How To Write Security Control Implementation Statements (Hands-On)

45K views · 2021-04-17 14:09:01

Relationship Between Risk Analysis, Risk Assessment, And Risk Management (SP 800-30)

Relationship Between Risk Analysis, Risk Assessment, And Risk Management (SP 800-30)

21K views · 2021-04-03 14:15:04

Relationship Between Vulnerability, Threat, Control And Risk As They Relate to Cybersecurity

Relationship Between Vulnerability, Threat, Control And Risk As They Relate to Cybersecurity

11K views · 2021-03-20 14:00:23

How To Password Protect Files and Folder Before E-Mailing For Confidentiality

How To Password Protect Files and Folder Before E-Mailing For Confidentiality

8K views · 2021-03-13 15:00:12

RMF Control Testing Of Identification and Authentication | Authenticator Feedback (IA-6)

RMF Control Testing Of Identification and Authentication | Authenticator Feedback (IA-6)

7K views · 2021-03-06 15:00:17

Overview Of The Significant Changes in NIST SP 800-53 Rev 5 and Review of SP 800-53B

Overview Of The Significant Changes in NIST SP 800-53 Rev 5 and Review of SP 800-53B

15K views · 2021-02-20 14:52:23

Encrypting Your E-Mails Using PGP Mailvelope For Confidentiality

Encrypting Your E-Mails Using PGP Mailvelope For Confidentiality

16K views · 2021-02-13 15:27:20

How To Improve Your Computer Speed and Performance

How To Improve Your Computer Speed and Performance

527 views · 2021-01-30 17:21:26

Protect Yourself From Phishing Attacks: Learn Email Header and Suspecious Link (Malware) Analysis.

Protect Yourself From Phishing Attacks: Learn Email Header and Suspecious Link (Malware) Analysis.

14K views · 2021-01-16 19:31:24

Phishing: How Easy It Is For Hackers To Spoof Your E-Mail Address.

Phishing: How Easy It Is For Hackers To Spoof Your E-Mail Address.

3K views · 2021-01-09 18:55:05

RMF Security Control Testing Hands On (Using SP 800-53 and 800-53A)

RMF Security Control Testing Hands On (Using SP 800-53 and 800-53A)

33K views · 2020-12-26 16:00:01

NIST RMF System Categorization Step Hands On (Using SP 800-60 Vol II)

NIST RMF System Categorization Step Hands On (Using SP 800-60 Vol II)

65K views · 2020-12-26 15:00:30

Searching The Web Like A Pro (Google Dorks)

Searching The Web Like A Pro (Google Dorks)

7K views · 2020-12-12 17:18:43

Basic Wireshark Skills for Beginners

Basic Wireshark Skills for Beginners

1K views · 2020-11-28 15:30:00

NMAP Skills for Ethical Hacking and Pentesting Beginners

NMAP Skills for Ethical Hacking and Pentesting Beginners

939 views · 2020-11-14 16:10:32

Using Netstat Utility to locate suspecious hack on Windows Machine and how to delete the backddoor

Using Netstat Utility to locate suspecious hack on Windows Machine and how to delete the backddoor

13K views · 2020-11-07 18:00:04

Protecting Your Browsers Against Security and Privacy Vulnerabilities

Protecting Your Browsers Against Security and Privacy Vulnerabilities

448 views · 2020-10-31 14:00:09

How To Effectively Manage And Protect Your Passwords (KeePass)

How To Effectively Manage And Protect Your Passwords (KeePass)

532 views · 2020-10-24 17:00:10

Demonstrating Difference Between HTTP and HTTPS Protocols Using Wireshark

Demonstrating Difference Between HTTP and HTTPS Protocols Using Wireshark

3K views · 2020-10-16 16:03:49

Downloading and Installing Free Nessus Vuln Scanner on Windows (Nessus Home Essential)

Downloading and Installing Free Nessus Vuln Scanner on Windows (Nessus Home Essential)

21K views · 2020-05-17 19:21:17

Downloading and Installing the latest and greatest Kali Linux 2020.1(Offensive Security ready image)

Downloading and Installing the latest and greatest Kali Linux 2020.1(Offensive Security ready image)

3K views · 2020-01-31 20:32:45

Using Macchanger to change Network Interface MAC Address

Using Macchanger to change Network Interface MAC Address

1K views · 2020-01-24 19:44:02

Downloading and Installing VirtualBox and Activating NatNetwork

Downloading and Installing VirtualBox and Activating NatNetwork

431 views · 2020-01-24 19:41:34

FedRAMP Process Overview

FedRAMP Process Overview

22K views · 2019-11-01 20:52:33

Nessus Scan Essentials And Scan Analysis (Hands-On)

Nessus Scan Essentials And Scan Analysis (Hands-On)

34K views · 2019-11-01 20:51:39

Official KamilSec branded designs and apparel

KamilsecAvailable on Kamilsec

Buy on Kamilsec

External purchase

Highlights

  • +Supports the channel and future GRC training content
  • +Official KamilSec branded designs

Recommended by

KamilSec