DEV Community

Shivam Chamoli profile picture

Shivam Chamoli

InfosecTrain was incepted in 2016 by a group of eager and experienced individuals with over 15 years of industry experience. https://www.infosectrain.com/courses/certified-ethical-hacker-ceh-training/

Location New Delhi Joined Joined on  Personal website https://www.infosectrain.com/ twitter website
What is Cloud Gaming?

What is Cloud Gaming?

Comments
3 min read
Top Data Anonymization Techniques

Top Data Anonymization Techniques

Comments
3 min read
What is a Managed Security Service Provider (MSSP)?

What is a Managed Security Service Provider (MSSP)?

Comments
2 min read
What is Application Security?

What is Application Security?

Comments
2 min read
Ten Must-Have Endpoint Security Tools for 2025

Ten Must-Have Endpoint Security Tools for 2025

Comments
2 min read
Importance of Regular Network Vulnerability Assessments

Importance of Regular Network Vulnerability Assessments

Comments
2 min read
Insights-as-a-Service

Insights-as-a-Service

Comments
3 min read
What is Microsoft Power BI Tool?

What is Microsoft Power BI Tool?

Comments
3 min read
What is Terraform?

What is Terraform?

Comments
3 min read
How to Choose the Right Cloud Certification?

How to Choose the Right Cloud Certification?

48
Comments
3 min read
What is Software Defined Networking (SDN)?

What is Software Defined Networking (SDN)?

Comments
3 min read
What is Data as a Service? (DaaS)

What is Data as a Service? (DaaS)

Comments
2 min read
Types of SSL Certificates

Types of SSL Certificates

Comments
3 min read
What Cookies are Important for Privacy?

What Cookies are Important for Privacy?

Comments
3 min read
What is the Principle of Least Privilege?

What is the Principle of Least Privilege?

Comments
2 min read
Benefits of SSCP Certification

Benefits of SSCP Certification

Comments
2 min read
What is the Shared Responsibility Model?

What is the Shared Responsibility Model?

Comments
2 min read
CISA Exam Preparation Strategy 2024

CISA Exam Preparation Strategy 2024

Comments
3 min read
Top Skills to Future-Proof Your Career in 2024

Top Skills to Future-Proof Your Career in 2024

Comments
3 min read
Security+ Exam Requirements

Security+ Exam Requirements

Comments
3 min read
What is Cloud Security Posture Management (CSPM)?

What is Cloud Security Posture Management (CSPM)?

Comments
2 min read
What is SOC as a Service (SOCaaS)?

What is SOC as a Service (SOCaaS)?

Comments
3 min read
Top 5 Best CRISC Study Resources

Top 5 Best CRISC Study Resources

Comments
3 min read
Security Automation Tools

Security Automation Tools

1
Comments
2 min read
Role of Ethical Hackers in Incident Response

Role of Ethical Hackers in Incident Response

Comments
3 min read
What are the Benefits of Threat Modeling?

What are the Benefits of Threat Modeling?

Comments
2 min read
Best Practices for Implementing Microsoft Sentinel

Best Practices for Implementing Microsoft Sentinel

Comments
3 min read
Use Cases and Key Capabilities of Microsoft Sentinel

Use Cases and Key Capabilities of Microsoft Sentinel

Comments
3 min read
Top 5 Pillars of Cloud Security

Top 5 Pillars of Cloud Security

Comments 1
2 min read
What is Azure Data Factory (ADF) Integration Runtime?

What is Azure Data Factory (ADF) Integration Runtime?

1
Comments
2 min read
CCSP Exam Requirements

CCSP Exam Requirements

Comments
4 min read
What next after CISM?

What next after CISM?

Comments
3 min read
What is CISM?

What is CISM?

1
Comments
3 min read
What is Privileged Access Management (PAM)?

What is Privileged Access Management (PAM)?

Comments
2 min read
Trust and Transparency in Cloud Computing

Trust and Transparency in Cloud Computing

Comments
2 min read
Top 10 Methods for Securing Mobile Devices and Applications

Top 10 Methods for Securing Mobile Devices and Applications

Comments
3 min read
Shoulder Surfing: Definition and Prevention Strategies

Shoulder Surfing: Definition and Prevention Strategies

Comments
3 min read
What is Infrastructure as Code (IaC)?

What is Infrastructure as Code (IaC)?

Comments
2 min read
What is Mobile Device Management (MDM)?

What is Mobile Device Management (MDM)?

Comments
3 min read
CCISO vs. CISSP: Which one to choose?

CCISO vs. CISSP: Which one to choose?

Comments
3 min read
Tips to Maintain Strong Cloud Security

Tips to Maintain Strong Cloud Security

Comments
2 min read
Azure Certification Paths: Explore Your Options

Azure Certification Paths: Explore Your Options

1
Comments
3 min read
What is SQL Injection?

What is SQL Injection?

Comments
3 min read
What is the Cloud Controls Matrix (CCM)?

What is the Cloud Controls Matrix (CCM)?

Comments
2 min read
Penetration Testing Tools

Penetration Testing Tools

Comments
3 min read
What is Rainbow Table Attack?

What is Rainbow Table Attack?

Comments
2 min read
Top 5 Ways to Combat Rising OAuth SaaS Attacks

Top 5 Ways to Combat Rising OAuth SaaS Attacks

Comments
2 min read
Top 10 Cybersecurity Technologies

Top 10 Cybersecurity Technologies

Comments
3 min read
How to Migrate On-Premises Virtual Machines to AWS?

How to Migrate On-Premises Virtual Machines to AWS?

Comments
3 min read
What is VPC Flow Logs in AWS?

What is VPC Flow Logs in AWS?

Comments
3 min read
What is Internet Control Message Protocol (ICMP)?

What is Internet Control Message Protocol (ICMP)?

Comments
3 min read
Future Scope of Cybersecurity in 2024

Future Scope of Cybersecurity in 2024

Comments
3 min read
What is ISO 31000?

What is ISO 31000?

Comments
2 min read
Data Link Layer of OSI Model

Data Link Layer of OSI Model

Comments
3 min read
AWS Config vs. AWS CloudTrail

AWS Config vs. AWS CloudTrail

Comments
3 min read
On-Premise vs Cloud Computing

On-Premise vs Cloud Computing

Comments
3 min read
What are the Challenges of Cloud Forensics?

What are the Challenges of Cloud Forensics?

Comments
3 min read
Compliance and Regulatory Updates for 2024

Compliance and Regulatory Updates for 2024

Comments
3 min read
What is RSA Archer Questionnaire?

What is RSA Archer Questionnaire?

Comments
3 min read
Dark Web and Its Impact on Data Privacy

Dark Web and Its Impact on Data Privacy

Comments
3 min read
loading...