Vigyata.AI
Is this your channel?

All Videos

79 videos from KamilSec

AI Meets Cybersecurity: Automating Vulnerability Analysis with Microsoft Copilot (Hands-on)11:16

AI Meets Cybersecurity: Automating Vulnerability Analysis with Microsoft Copilot (Hands-on)

333 views

AI Automation for Business Professionals16:31

AI Automation for Business Professionals

118 views

Conducting Nessus Vulnerability Scan Results Analysis in 5 Minutes Using Pivot Table (Hands-on)12:25

Conducting Nessus Vulnerability Scan Results Analysis in 5 Minutes Using Pivot Table (Hands-on)

436 views

Governance Risk and Compliance (GRC)5:47

Governance Risk and Compliance (GRC)

498 views

Overview of the FedRAMP 800-53 Rev 5 New Test Case15:26

Overview of the FedRAMP 800-53 Rev 5 New Test Case

822 views

Episode 9: Configuration Management Plan (CM-9 Explained) | KamilSec8:36

Episode 9: Configuration Management Plan (CM-9 Explained) | KamilSec

787 views

Episode 8: System Component Inventory (CM-8 Explained) | KamilSec14:21

Episode 8: System Component Inventory (CM-8 Explained) | KamilSec

579 views

Episode 7 Least Functionality (CM-7): KamilSec19:36

Episode 7 Least Functionality (CM-7): KamilSec

970 views

Episode 6 Configuration Settings (CM-6)11:32

Episode 6 Configuration Settings (CM-6)

1.0K views

Episode 5 Access Restriction For Change (CM-5)8:23

Episode 5 Access Restriction For Change (CM-5)

442 views

Episode 4 Impact Analyses (CM-4)9:24

Episode 4 Impact Analyses (CM-4)

439 views

Episode 3 Configuration Change Control (CM-3)10:15

Episode 3 Configuration Change Control (CM-3)

450 views

Episode 2 BASELINE CONFIGURATION (CM-2)13:47

Episode 2 BASELINE CONFIGURATION (CM-2)

3.0K views

Episode 1 CONFIGURATION MGMT POLICY AND PROCEDURE (CM-1)14:18

Episode 1 CONFIGURATION MGMT POLICY AND PROCEDURE (CM-1)

2.0K views

TIPS on Conducting NIST 800-53 Rev4 to Rev5 Control GAP Analysis25:12

TIPS on Conducting NIST 800-53 Rev4 to Rev5 Control GAP Analysis

4.3K views

Episode 19_PUBLICLY ACCESSIBLE CONTENT_ (AC-22)9:46

Episode 19_PUBLICLY ACCESSIBLE CONTENT_ (AC-22)

1.4K views

Episode 18_INFORMATION SHARING_ (AC-21)8:00

Episode 18_INFORMATION SHARING_ (AC-21)

721 views

Excerpt from the IMO Tech's RMF Training During Week 123:16

Excerpt from the IMO Tech's RMF Training During Week 1

2.4K views

Episode 17_USE OF EXTERNAL SYSTEMS_ (AC-20)10:30

Episode 17_USE OF EXTERNAL SYSTEMS_ (AC-20)

811 views

Episode 16_ACCESS CONTROL FOR MOBILE DEVICES_ (AC-19)11:38

Episode 16_ACCESS CONTROL FOR MOBILE DEVICES_ (AC-19)

706 views

Episode 15_WIRELESS ACCESS_ (AC-18)6:31

Episode 15_WIRELESS ACCESS_ (AC-18)

1.6K views

Episode 14_REMOTE ACCESS_ (AC-17)9:08

Episode 14_REMOTE ACCESS_ (AC-17)

1.4K views

Episode 13_Permitted Actions Without Identification and Authentications_ (AC-14)7:48

Episode 13_Permitted Actions Without Identification and Authentications_ (AC-14)

1.0K views

Episode 12_Session Termination_ (AC-12)7:34

Episode 12_Session Termination_ (AC-12)

1.3K views

Episode 11_Device Lock Control_ (AC-11)7:40

Episode 11_Device Lock Control_ (AC-11)

1.3K views

Episode 10_Concurrent Session Control_ (AC-10)7:07

Episode 10_Concurrent Session Control_ (AC-10)

1.4K views

Episode 9_Previous Logon Notification_ (AC-9)8:17

Episode 9_Previous Logon Notification_ (AC-9)

1.0K views

Episode 8_SYSTEM USE NOTIFICATION_ (AC-8)9:39

Episode 8_SYSTEM USE NOTIFICATION_ (AC-8)

1.7K views

Episode 7_UNSUCCESSFUL LOGON ATTEMPTS_ (AC-7)8:55

Episode 7_UNSUCCESSFUL LOGON ATTEMPTS_ (AC-7)

2.1K views

Episode 6_LEAST PRIVILEGE_ (AC-6)10:11

Episode 6_LEAST PRIVILEGE_ (AC-6)

2.1K views

Episode 5_SEPARATION OF DUTIES_ (AC-5)11:47

Episode 5_SEPARATION OF DUTIES_ (AC-5)

2.0K views

Episode 4_INFORMATION FLOW ENFORCEMENT (AC-4)16:01

Episode 4_INFORMATION FLOW ENFORCEMENT (AC-4)

3.1K views

Episode 3_ACCESS ENFORCEMENT (AC-3)7:55

Episode 3_ACCESS ENFORCEMENT (AC-3)

2.9K views

Episode 2_ACCOUNT MANAGEMENT (AC-2)16:24

Episode 2_ACCOUNT MANAGEMENT (AC-2)

4.5K views

Episode 1 ACCESS CONTROL POLICY AND PROCEDURE (AC-1)10:42

Episode 1 ACCESS CONTROL POLICY AND PROCEDURE (AC-1)

7.9K views

Information System Contingency Planning (ISCP) Overview (SP 800-34 Rev 1)21:07

Information System Contingency Planning (ISCP) Overview (SP 800-34 Rev 1)

6.3K views

IT and Computer Incident Response Process Overview (NIST SP 800-61 Rev 2)36:28

IT and Computer Incident Response Process Overview (NIST SP 800-61 Rev 2)

8.8K views

Roles and Responsibilities for Key Participants in Risk Management Framework (RMF)10:39

Roles and Responsibilities for Key Participants in Risk Management Framework (RMF)

3.6K views

RMF and SDLC Considerations in Organizations10:18

RMF and SDLC Considerations in Organizations

5.1K views

RMF POA&M Creation and Management (Hands-On Approach)54:43

RMF POA&M Creation and Management (Hands-On Approach)

32.6K views

Conducting Nessus Vulnerability Scan Results Analysis Using Excel Spreadsheet (Hands-on)30:50

Conducting Nessus Vulnerability Scan Results Analysis Using Excel Spreadsheet (Hands-on)

40.5K views

TIPS FOR DEVELOPING AND REVIEWING SECURITY ASSESSMENT PLAN (SAP)27:10

TIPS FOR DEVELOPING AND REVIEWING SECURITY ASSESSMENT PLAN (SAP)

11.4K views

Some Important Tips For Reviewing and Updating System Security Plan (SSP)19:12

Some Important Tips For Reviewing and Updating System Security Plan (SSP)

10.6K views

Distinction Between Information Security and Cybersecurity6:37

Distinction Between Information Security and Cybersecurity

3.5K views

The Core Daily, Weekly, Monthly and Annual Responsibilities of an ISSO16:29

The Core Daily, Weekly, Monthly and Annual Responsibilities of an ISSO

11.7K views

Security Control Assessment (SCA) Process Overview24:12

Security Control Assessment (SCA) Process Overview

32.8K views

Hands-On Security Control Testing (AC-11) Using FedRAMP Test Case Template (Determine-if Levels)36:48

Hands-On Security Control Testing (AC-11) Using FedRAMP Test Case Template (Determine-if Levels)

15.9K views

Relationship Between Information System PTA, PIA and System of Records Notice (SORN) - SP 800-122.25:58

Relationship Between Information System PTA, PIA and System of Records Notice (SORN) - SP 800-122.

7.9K views

IT Security Documentations/Governance and IT Security Policy Templates10:08

IT Security Documentations/Governance and IT Security Policy Templates

4.5K views

Self Security Control Assessments (NIST SP 800-171 Rev2) Vs CMMC - The C3PAOs Requirements15:41

Self Security Control Assessments (NIST SP 800-171 Rev2) Vs CMMC - The C3PAOs Requirements

6.8K views

RMF Continuous Control Monitoring Step Overview8:25

RMF Continuous Control Monitoring Step Overview

7.9K views

RMF Authorization Step10:10

RMF Authorization Step

5.4K views

FISMA Law, A&A Process and RMF Process Overview and Summary15:13

FISMA Law, A&A Process and RMF Process Overview and Summary

14.1K views

RMF Control Selection Process And How To Write Security Control Implementation Statements (Hands-On)43:27

RMF Control Selection Process And How To Write Security Control Implementation Statements (Hands-On)

45.3K views

Relationship Between Risk Analysis, Risk Assessment, And Risk Management (SP 800-30)15:31

Relationship Between Risk Analysis, Risk Assessment, And Risk Management (SP 800-30)

20.6K views

Relationship Between Vulnerability, Threat, Control And Risk As They Relate to Cybersecurity10:55

Relationship Between Vulnerability, Threat, Control And Risk As They Relate to Cybersecurity

11.2K views

How To Password Protect Files and Folder Before E-Mailing For Confidentiality5:00

How To Password Protect Files and Folder Before E-Mailing For Confidentiality

7.9K views

RMF Control Testing Of Identification and Authentication | Authenticator Feedback (IA-6)27:59

RMF Control Testing Of Identification and Authentication | Authenticator Feedback (IA-6)

6.8K views

Overview Of The Significant Changes in NIST SP 800-53 Rev 5 and Review of SP 800-53B24:33

Overview Of The Significant Changes in NIST SP 800-53 Rev 5 and Review of SP 800-53B

14.7K views

Encrypting Your E-Mails Using PGP Mailvelope For Confidentiality27:28

Encrypting Your E-Mails Using PGP Mailvelope For Confidentiality

16.0K views

How To Improve Your Computer Speed and Performance13:53

How To Improve Your Computer Speed and Performance

527 views

Protect Yourself From Phishing Attacks: Learn Email Header and Suspecious Link (Malware) Analysis.25:47

Protect Yourself From Phishing Attacks: Learn Email Header and Suspecious Link (Malware) Analysis.

14.0K views

Phishing: How Easy It Is For Hackers To Spoof Your E-Mail Address.11:47

Phishing: How Easy It Is For Hackers To Spoof Your E-Mail Address.

3.2K views

RMF Security Control Testing Hands On (Using SP 800-53 and 800-53A)82:47

RMF Security Control Testing Hands On (Using SP 800-53 and 800-53A)

33.2K views

NIST RMF System Categorization Step Hands On (Using SP 800-60 Vol II)71:53

NIST RMF System Categorization Step Hands On (Using SP 800-60 Vol II)

64.8K views

Searching The Web Like A Pro (Google Dorks)17:04

Searching The Web Like A Pro (Google Dorks)

6.9K views

Basic Wireshark Skills for Beginners30:34

Basic Wireshark Skills for Beginners

1.4K views

NMAP Skills for Ethical Hacking and Pentesting Beginners35:01

NMAP Skills for Ethical Hacking and Pentesting Beginners

939 views

Using Netstat Utility to locate suspecious hack on Windows Machine and how to delete the backddoor16:14

Using Netstat Utility to locate suspecious hack on Windows Machine and how to delete the backddoor

13.1K views

Protecting Your Browsers Against Security and Privacy Vulnerabilities10:15

Protecting Your Browsers Against Security and Privacy Vulnerabilities

448 views

How To Effectively Manage And Protect Your Passwords (KeePass)17:45

How To Effectively Manage And Protect Your Passwords (KeePass)

532 views

Demonstrating Difference Between HTTP and HTTPS Protocols Using Wireshark11:18

Demonstrating Difference Between HTTP and HTTPS Protocols Using Wireshark

3.0K views

Downloading and Installing Free Nessus Vuln Scanner on Windows (Nessus Home Essential)15:36

Downloading and Installing Free Nessus Vuln Scanner on Windows (Nessus Home Essential)

20.7K views

Downloading and Installing the latest and greatest Kali Linux 2020.1(Offensive Security ready image)5:57

Downloading and Installing the latest and greatest Kali Linux 2020.1(Offensive Security ready image)

2.7K views

Using Macchanger to change Network Interface MAC Address9:41

Using Macchanger to change Network Interface MAC Address

1.5K views

Downloading and Installing VirtualBox and Activating NatNetwork6:40

Downloading and Installing VirtualBox and Activating NatNetwork

431 views

Changing Network Interface MAC address manually on Kali Linux4:28

Changing Network Interface MAC address manually on Kali Linux

1.1K views

FedRAMP Process Overview52:14

FedRAMP Process Overview

22.4K views

Nessus Scan Essentials And Scan Analysis (Hands-On)120:07

Nessus Scan Essentials And Scan Analysis (Hands-On)

33.8K views