Gateway ⛩ to become Skilled-Cybersecurity Professional 🕴🕴🕴 https://luminisindia.com/goehm--🎯🎯Tips on how to stay safe on Social Media:🎯🎯✅ Install a good antivirus software in your laptop and phone.✅ Turn off your location. Some sites even keep track of you activities in offline world, but turning off location will at least do the least possible loss.✅ Don’t forget to setup Security Answers.✅ Never leave your account logged in. You are in a way inviting cyber criminals to hack your account or act as an impostor.✅ Always Check and Analyze your post before posting. Just ask yourself "Does the world need to know this?" Try not to put too much revealing photos online. For example, I have once seen a person posting his daughter's photo online where the school name was clearly visible on the bus. I have also seen a picture of someone in café, whose credit card was lying on the café-table and all numbers were visible after magnifying. Don't share the Birthday celebrations photos of your kids too. Thus, giving personal and private information to everyone. Try to blur such minor but important details before posting a photo.✅ Always try to create strong password for a site and Keep those passwords in a good password manager. Try to change it in regular interval of time. Never ever set same passwords for multiple sites.✅ Take one more step immediately and set up Multi-Factor Authentication for all social media platforms you are on. In fact, MFA is a best approach wherever you can use.✅ Don't use anyone else's mobile, computer and laptop to access your social media accounts.✅ Don't use Free Wi-Fi to access to access the social media.✅ Use a VPN service always if you need to access the social media on a network which you don't own or manage.--_Do you want to become a Skilled-Cybersecurity Professional 🕴🕴🕴.Here is the gateway ⛩ https://luminisindia.com/goehm How to perform a 🔥🔥PENTESTING🔥🔥???🎯🎯 A Pentesting Mini Project🎯🎯https://www.youtube.com/watch?v=84gNIEmCEAA If you find the video content informative, please Like thevideo and 📣📣📣 share with your friends.Help your friends to understand cybersecurity. Also let me know of ✍✍✍what do you think of this video.Thanks, Meena R.Your 'Cyber Warrior' Friend_YOU CAN FOLLOW ME AT: Facebook Page : https://www.facebook.com/cybersec.prism Instagram: https://www.instagram.com/meena.cyber.warrior/Linkedin Profile: https://www.linkedin.com/in/meena1/About ME: https://www.youtube.com/watch?v=T66K3K5Y2tIYouTube Channel: https://www.youtube.com/@cybersecurityforever8214Hear My Podcast: https://anchor.fm/meena-rLinkedin Page : Cybersecurity Prism https://www.linkedin.com/company/10117131/Facebook Group : Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever/**Here are more resources:**-Cybersecurity HIGHLY informative articles for cybersecurityenthusiastic 🚀🚀🚀 (cyber-warrior)_https://luminisindia.com/cybersecurity-prism_You can also watch 👀 all the videos ofCybersecurity Series there:_Facebook Page : 👉👉👉 Cybersecurity Prismhttps://www.facebook.com/cybersec.prism/YouTube : https://www.youtube.com/@cybersecurityforever8214_Gateway ⛩ to Cybersecurity--https://luminisindia.com/goehm_The new Cyber Warrior's Command Guide For Ethical Hackers tohelp you learn faster..._✅ Grab a FREE Command Guide here:https://luminisindia.com/getcgeh_Are you willing to learn Networking now?Would you like to watch some videos of Networking, CCNARouting & Switching, etc?_https://luminisindia.com/networking-free_❓ Do you want to have thecomplete set of my CCNA Security powerpoint PRESENTATIONS ❓--https://luminisindia.com/free-ccna-security-presentations_
--------
11:28
--------
11:28
Day-386: What is Server-Side Request Forgery (SSRF)?
Today I will discuss:1. What are common SSRF attacks?Gateway ⛩ to become Skilled-Cybersecurity Professional 🕴🕴🕴 https://luminisindia.com/goehm--📌📌Server-side request forgery (also known as SSRF) 📌📌is a web security vulnerability that allows an attacker to induce the server-side application to make HTTP requests to an arbitrary domain of the attacker's choosing.👉 A successful SSRF attack can often result in unauthorized actions or access to data within the organization, either in the vulnerable application itself or on other back-end systems that the application can communicate with.👉 In some situations, the SSRF vulnerability might allow an attacker to perform arbitrary command execution.👉 An SSRF exploit that causes connections to external third-party systems might result in malicious onward attacks that appear to originate from-- the legitimate organization hosting the vulnerable application (just imagine that you are having Amazon Web Service, AWS for your operations or security), which may lead to potential legal liabilities and reputational damage to that organization. 👉 In this example, you would think that AWS has launched an attack on your company. As a result AWS, may have to face legal liabilities and it may damage their reputation as well.🛡️🛡️How to stay safe on Social Media?🛡️🛡️🏆🏆What are common SSRF attacks?🏆🏆SSRF attacks often exploit trust-relationships to escalate an attack from the vulnerable application and perform unauthorized actions. These trust relationships might exist in relation to the server itself, or in relation to other back-end systems within the same organization.✅ SSRF attacks against the server itself.✅ SSRF attacks against other back-end systems.--_Do you want to become a Skilled-Cybersecurity Professional 🕴🕴🕴.Here is the gateway ⛩ https://luminisindia.com/goehm How to perform a 🔥🔥PENTESTING🔥🔥???🎯🎯 A Pentesting Mini Project🎯🎯https://www.youtube.com/watch?v=84gNIEmCEAA If you find the video content informative, please Like thevideo and 📣📣📣 share with your friends.Help your friends to understand cybersecurity. Also let me know of ✍✍✍what do you think of this video.Thanks, Meena R.Your 'Cyber Warrior' Friend_YOU CAN FOLLOW ME AT: Facebook Page : https://www.facebook.com/cybersec.prism Instagram: https://www.instagram.com/meena.cyber.warrior/Linkedin Profile: https://www.linkedin.com/in/meena1/About ME: https://www.youtube.com/watch?v=T66K3K5Y2tIYouTube Channel: https://www.youtube.com/@cybersecurityforever8214Hear My Podcast: https://anchor.fm/meena-rLinkedin Page : Cybersecurity Prism https://www.linkedin.com/company/10117131/Facebook Group : Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever/**Here are more resources:**-Cybersecurity HIGHLY informative articles for cybersecurityenthusiastic 🚀🚀🚀 (cyber-warrior)_https://luminisindia.com/cybersecurity-prism_You can also watch 👀 all the videos ofCybersecurity Series there:_Facebook Page : 👉👉👉 Cybersecurity Prismhttps://www.facebook.com/cybersec.prism/YouTube : https://www.youtube.com/@cybersecurityforever8214_Gateway ⛩ to Cybersecurity--https://luminisindia.com/goehm_The new Cyber Warrior's Command Guide For Ethical Hackers tohelp you learn faster..._✅ Grab a FREE Command Guide here:https://luminisindia.com/getcgeh_Are you willing to learn Networking now?Would you like to watch some videos of Networking, CCNARouting & Switching, etc?_https://luminisindia.com/networking-free_❓ Do you want to have thecomplete set of my CCNA Security powerpoint PRESENTATIONS ❓--https://luminisindia.com/free-ccna-security-presentations_
--------
3:23
--------
3:23
Day-385: You and Me are being TRACKED….
Gateway ⛩ to become Skilled-Cybersecurity Professional 🕴🕴🕴 https://luminisindia.com/goehm--🚨 🚨A surprising amount of surveillance happens to us automatically, even if we do our best to opt out. It happens because we interact with others, and they’re being monitored.🚀 Even if I never post or friend anyone on Facebook—I have a professional page, but not a personal account—Facebook tracks me. It maintains a profile of non-Facebook users in its database. It tracks me whenever I visit a page with a Facebook “Like” button.🚀 It can probably make good guesses about who my friends are based on tagged photos, and it may well have the profile linked to other information it has purchased from various data brokers. My friends, and those sites with the Like buttons, allow Facebook to surveil me through them.I try not to use Google search. But Google still collects a lot of information about the websites I visit, because so many of them use Google Analytics to track their visitors.🚀 Again, those sites let Google track me through them. I use various blockers in my browser so Google can’t track me very well, but it’s working on technologies that will circumvent my privacy practices.🚀 No doubt, tracking companies can join up the dots we leave behind, creating stable identifiers that can connect the data-trails from purchases, apps, devices, and clicks, creating a fantastically detailed picture of our lives built up our of these fragmentary details.--_Do you want to become a Skilled-Cybersecurity Professional 🕴🕴🕴.Here is the gateway ⛩ https://luminisindia.com/goehm How to perform a 🔥🔥PENTESTING🔥🔥???🎯🎯 A Pentesting Mini Project🎯🎯https://www.youtube.com/watch?v=84gNIEmCEAA If you find the video content informative, please Like thevideo and 📣📣📣 share with your friends.Help your friends to understand cybersecurity. Also let me know of ✍✍✍what do you think of this video.Thanks, Meena R.Your 'Cyber Warrior' Friend_YOU CAN FOLLOW ME AT: Facebook Page : https://www.facebook.com/cybersec.prism Instagram: https://www.instagram.com/meena.cyber.warrior/Linkedin Profile: https://www.linkedin.com/in/meena1/About ME: https://www.youtube.com/watch?v=T66K3K5Y2tIYouTube Channel: https://www.youtube.com/@cybersecurityforever8214Hear My Podcast: https://anchor.fm/meena-rLinkedin Page : Cybersecurity Prism https://www.linkedin.com/company/10117131/Facebook Group : Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever/**Here are more resources:**-Cybersecurity HIGHLY informative articles for cybersecurityenthusiastic 🚀🚀🚀 (cyber-warrior)_https://luminisindia.com/cybersecurity-prism_You can also watch 👀 all the videos ofCybersecurity Series there:_Facebook Page : 👉👉👉 Cybersecurity Prismhttps://www.facebook.com/cybersec.prism/YouTube : https://www.youtube.com/@cybersecurityforever8214_Gateway ⛩ to Cybersecurity--https://luminisindia.com/goehm_The new Cyber Warrior's Command Guide For Ethical Hackers tohelp you learn faster..._✅ Grab a FREE Command Guide here:https://luminisindia.com/getcgeh_Are you willing to learn Networking now?Would you like to watch some videos of Networking, CCNARouting & Switching, etc?_https://luminisindia.com/networking-free_❓ Do you want to have thecomplete set of my CCNA Security powerpoint PRESENTATIONS ❓--https://luminisindia.com/free-ccna-security-presentations_
--------
4:30
--------
4:30
Day-384: How to Manage the Penetration Testing?
Today I will discuss:1. What is Penetration Testing? 2. What are the benefits of Pentesting?3. What are the steps for Pentesting?How to perform a 🔥🔥PENTESTING🔥🔥??? 🎯🎯 A Pentesting Mini Project🎯🎯 • How to perform a 🔥🔥PENTESTING🔥🔥??? 🎯🎯... Gateway ⛩ to become Skilled-Cybersecurity Professional 🕴🕴🕴 https://luminisindia.com/goehm--We all know what is Penetration Testing. Right?In this video, I am trying to present you an holistic view of real-life IT penetration testing.If you want to gain assurance in your organisation’s vulnerability assessment and management processes through a realistic simulation of a hacker attack, then IT penetration testing is a MUST. There is no doubt about that.🔹 When you do that you get a number of benefits immediately:🔹 You get a good Vulnerability Assessment within your IT network🔹 Potential attacker’s entry points become transparent to you.🔹 Your risk posture improves as most of exploitable vulnerabilities are identified.🔹 Red/Blue Team gets practical exercise to test detection capabilities in real-time.🔹 Security level of the investigated systems become measurable.🔹 Compliance requirements (e.g. national regulations, GDPR, TISAX) for mandatory pentesting is fulfilled, if it done by third-party/consultants' pentesters.🔹 You also receive a number of important recommendations regarding the improvements to be made to your information security and respective guidelinesIn the hindsight, the pentesting is nothing but the real-life simulation of damages which might be carried out malicious threat actors.--_Do you want to become a Skilled-Cybersecurity Professional 🕴🕴🕴.Here is the gateway ⛩ https://luminisindia.com/goehm How to perform a 🔥🔥PENTESTING🔥🔥???🎯🎯 A Pentesting Mini Project🎯🎯https://www.youtube.com/watch?v=84gNIEmCEAA If you find the video content informative, please Like thevideo and 📣📣📣 share with your friends.Help your friends to understand cybersecurity. Also let me know of ✍✍✍what do you think of this video.Thanks, Meena R.Your 'Cyber Warrior' Friend_YOU CAN FOLLOW ME AT: Facebook Page : https://www.facebook.com/cybersec.prism Instagram: https://www.instagram.com/meena.cyber.warrior/Linkedin Profile: https://www.linkedin.com/in/meena1/About ME: https://www.youtube.com/watch?v=T66K3K5Y2tIYouTube Channel: https://www.youtube.com/@cybersecurityforever8214Hear My Podcast: https://anchor.fm/meena-rLinkedin Page : Cybersecurity Prism https://www.linkedin.com/company/10117131/Facebook Group : Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever/**Here are more resources:**-Cybersecurity HIGHLY informative articles for cybersecurityenthusiastic 🚀🚀🚀 (cyber-warrior)_https://luminisindia.com/cybersecurity-prism_You can also watch 👀 all the videos ofCybersecurity Series there:_Facebook Page : 👉👉👉 Cybersecurity Prismhttps://www.facebook.com/cybersec.prism/YouTube : https://www.youtube.com/@cybersecurityforever8214_Gateway ⛩ to Cybersecurity--https://luminisindia.com/goehm_The new Cyber Warrior's Command Guide For Ethical Hackers tohelp you learn faster..._✅ Grab a FREE Command Guide here:https://luminisindia.com/getcgeh_Are you willing to learn Networking now?Would you like to watch some videos of Networking, CCNARouting & Switching, etc?_https://luminisindia.com/networking-free_❓ Do you want to have thecomplete set of my CCNA Security powerpoint PRESENTATIONS ❓--https://luminisindia.com/free-ccna-security-presentations_
--------
9:29
--------
9:29
Day-383: What Is IPSec?
Today I will discuss:1. How does IPsec work?2. What Protocols Are Used In IPSec?Gateway ⛩ to become Skilled-Cybersecurity Professional 🕴🕴🕴 https://luminisindia.com/goehm--🔥🔥What Is IPSec?🔥🔥Here IP stands for 'Internet Protocol and 'Sec' for secure. The Internet Protocol is the main routing protocol used on the Internet and it designates where data will go using IP addresses. IPSec is secure because it adds encryption and authentication to this process.IPSec is not a single protocol in itself rather it is a group of protocols which are used together to set up encrypted connections between devices. 🔥🔥What Protocols Are Used In IPSec?🔥🔥In networking, a protocol is a specified way of formatting data so that any networked computer can interpret the data. IPSec is not one protocol, but a suite of protocols.Kindly note that while the Internet Protocol (IP) is not part of the IPSec suite, But IPSec runs directly on top of IP.The following protocols make up the IPSec suite:🎯 Authentication Header (AH):The AH protocol ensures that data packets are from a trusted source and that the data has not been tampered with, like a tamper-proof seal on a consumer product. These headers do not provide any encryption; they do not help conceal the data from attackers.🎯 Encapsulating Security Protocol (ESP):ESP encrypts the IP header and the payload for each packet — unless transport mode is used, in which case it only encrypts the payload. ESP adds its own header and a trailer to each data packet.🎯 Security Association (SA):SA refers to a number of protocols used for negotiating encryption keys and algorithms. One of the most common SA protocols is Internet Key Exchange (IKE).--_Do you want to become a Skilled-Cybersecurity Professional 🕴🕴🕴.Here is the gateway ⛩ https://luminisindia.com/goehm How to perform a 🔥🔥PENTESTING🔥🔥???🎯🎯 A Pentesting Mini Project🎯🎯https://www.youtube.com/watch?v=84gNIEmCEAA If you find the video content informative, please Like thevideo and 📣📣📣 share with your friends.Help your friends to understand cybersecurity. Also let me know of ✍✍✍what do you think of this video.Thanks, Meena R.Your 'Cyber Warrior' Friend_YOU CAN FOLLOW ME AT: Facebook Page : https://www.facebook.com/cybersec.prism Instagram: https://www.instagram.com/meena.cyber.warrior/Linkedin Profile: https://www.linkedin.com/in/meena1/About ME: https://www.youtube.com/watch?v=T66K3K5Y2tIYouTube Channel: https://www.youtube.com/@cybersecurityforever8214Hear My Podcast: https://anchor.fm/meena-rLinkedin Page : Cybersecurity Prism https://www.linkedin.com/company/10117131/Facebook Group : Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever/**Here are more resources:**-Cybersecurity HIGHLY informative articles for cybersecurityenthusiastic 🚀🚀🚀 (cyber-warrior)_https://luminisindia.com/cybersecurity-prism_You can also watch 👀 all the videos ofCybersecurity Series there:_Facebook Page : 👉👉👉 Cybersecurity Prismhttps://www.facebook.com/cybersec.prism/YouTube : https://www.youtube.com/@cybersecurityforever8214_Gateway ⛩ to Cybersecurity--https://luminisindia.com/goehm_The new Cyber Warrior's Command Guide For Ethical Hackers tohelp you learn faster..._✅ Grab a FREE Command Guide here:https://luminisindia.com/getcgeh_Are you willing to learn Networking now?Would you like to watch some videos of Networking, CCNARouting & Switching, etc?_https://luminisindia.com/networking-free_❓ Do you want to have thecomplete set of my CCNA Security powerpoint PRESENTATIONS ❓--https://luminisindia.com/free-ccna-security-presentations_
Welcome to the Cybersecurity FOREVER podcast, covering the 360-degree of cybersecurity!!
This show is for Networking Engineers, Administrators who want to learn nuances of cybersecurity, security implementation overall. Inside each episode, Meena intends to share Cybersecurity Secrets, and practically implementable knowledge for the audience.
Learn from Meena R., the Cybersecurity consultant, Trainer, entrepreneur and the founder of Luminis Consulting Services Pvt Ltd, IN...!!!