215 Folgen

Welcome to the Cybersecurity FOREVER podcast!

This show is for Networking Engineers, Administrators, other IT Professionals who want to learn and remain updated with Ethical Hacking technologies and cybersecurity developments overall.

Learn from Meena R., the Cybersecurity consultant, Trainer and a co-founder of Luminis Consulting Services Pvt Ltd, IN...!!!

Inside each episode, Meena intends to share Ethical Hacking Secrets, Cybersecurity Secrets and practically implementable knowledge for the audience. She has been highly proficient in Networking, particularly with Cisco technologies.

Cybersecurity FOREVE‪R‬ Meena R

    • Technologie

Welcome to the Cybersecurity FOREVER podcast!

This show is for Networking Engineers, Administrators, other IT Professionals who want to learn and remain updated with Ethical Hacking technologies and cybersecurity developments overall.

Learn from Meena R., the Cybersecurity consultant, Trainer and a co-founder of Luminis Consulting Services Pvt Ltd, IN...!!!

Inside each episode, Meena intends to share Ethical Hacking Secrets, Cybersecurity Secrets and practically implementable knowledge for the audience. She has been highly proficient in Networking, particularly with Cisco technologies.

    Day- 215: What Are The Common Attacks On Embedded Systems?

    Day- 215: What Are The Common Attacks On Embedded Systems?

    Today I will discuss:

    1. What is the importance of cybersecurity in embedded systems?

    2. What are the different types of possible attacks on embedded systems?

    3. How can you provide security to embedded systems?



    Watch 👓 this video here:👉  https://www.facebook.com/cybersec.prism/videos/387881579237099

    Please Like the video and 📣📣📣 share with your friends. Also let me know of ✍✍✍ what do you think of this video.



    Thanks,



    Meena

    Your 'Cyber Warrior' Friend
    __________________________________________________

    You can watch 👓👓👓 all the videos of Cybersecurity Series here: 

    Facebook Page : 👉👉👉 Cybersecurity Prism https://www.facebook.com/cybersec.prism

    Please click on the 'Follow' button 💛 on my Facebook page, to receive a Facebook notification when I publish another live video!



    You can connect with me:

    Hear My Podcast: https://anchor.fm/meena-r

    Linkedin Page: Cybersecurity Prism https://www.linkedin.com/company/10117131/

    Facebook Group: Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever

    __________________________________________________

    🙊🙉🙈


    ---

    Send in a voice message: https://anchor.fm/meena-r/message

    • 8 Min.
    Day-214: How Are Hackers Targeting Victims Worldwide?

    Day-214: How Are Hackers Targeting Victims Worldwide?

    Today I will discuss:

    1. What are the new methods of cyber-attacks?

    2. How do hackers use human weakness?

    3. What are the protection methods against these cyber-attacks?



    Watch 👓 this video here:👉 https://www.facebook.com/cybersec.prism/videos/640778339952145

    Please Like the video and 📣📣📣 share with your friends. Also let me know of ✍✍✍ what do you think of this video.



    Thanks,



    Meena

    Your 'Cyber Warrior' Friend
    __________________________________________________

    You can watch 👓👓👓 all the videos of Cybersecurity Series here: 

    Facebook Page : 👉👉👉 Cybersecurity Prism https://www.facebook.com/cybersec.prism

    Please click on the 'Follow' button 💛 on my Facebook page, to receive a Facebook notification when I publish another live video!



    You can connect with me:

    Hear My Podcast: https://anchor.fm/meena-r

    Linkedin Page: Cybersecurity Prism https://www.linkedin.com/company/10117131/

    Facebook Group: Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever

    __________________________________________________

    🙊🙉🙈


    ---

    Send in a voice message: https://anchor.fm/meena-r/message

    • 9 Min.
    Day- 213: What Are The Main Firewall Technologies?

    Day- 213: What Are The Main Firewall Technologies?

    Today I will discuss:

    1. Why do we need different types of Firewall?

    2. How can we choose right kind of firewall?

    3. What are benefits of these different types of firewall?

     

    Watch 👓 this video here:👉 https://www.facebook.com/cybersec.prism/videos/729698661234680

    Please Like the video and 📣📣📣 share with your friends. Also let me know of ✍✍✍ what do you think of this video.



    Thanks,



    Meena

    Your 'Cyber Warrior' Friend
    __________________________________________________

    You can watch 👓👓👓 all the videos of Cybersecurity Series here: 

    Facebook Page : 👉👉👉 Cybersecurity Prism https://www.facebook.com/cybersec.prism

    Please click on the 'Follow' button 💛 on my Facebook page, to receive a Facebook notification when I publish another live video!



    You can connect with me:

    Hear My Podcast: https://anchor.fm/meena-r

    Linkedin Page: Cybersecurity Prism https://www.linkedin.com/company/10117131/

    Facebook Group: Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever

    __________________________________________________

    🙊🙉🙈


    ---

    Send in a voice message: https://anchor.fm/meena-r/message

    • 10 Min.
    Day- 212: What Are The Most Common Sandbox Evasion Techniques?

    Day- 212: What Are The Most Common Sandbox Evasion Techniques?

    Today I will discuss:

    1. Why are cyber-criminals using sandboxing evasion techniques?

    2. How are the malwares able to hide themselves?

    3. What are the most common sandboxing evasion techniques?



    Watch 👓 this video here:👉  https://www.facebook.com/1641415809511832/videos/1258118437887820

    Please Like the video and 📣📣📣 share with your friends. Also let me know of ✍✍✍ what do you think of this video.



    Thanks,



    Meena

    Your 'Cyber Warrior' Friend
    __________________________________________________

    You can watch 👓👓👓 all the videos of Cybersecurity Series here: 

    Facebook Page : 👉👉👉 Cybersecurity Prism https://www.facebook.com/cybersec.prism

    Please click on the 'Follow' button 💛 on my Facebook page, to receive a Facebook notification when I publish another live video!



    You can connect with me:

    Hear My Podcast: https://anchor.fm/meena-r

    Linkedin Page: Cybersecurity Prism https://www.linkedin.com/company/10117131/

    Facebook Group: Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever

    __________________________________________________

    🙊🙉🙈


    ---

    Send in a voice message: https://anchor.fm/meena-r/message

    • 8 Min.
    Day-211: How Can You Perform Denial-of-Service Attack Without Extra Tool?

    Day-211: How Can You Perform Denial-of-Service Attack Without Extra Tool?

    Today I will discuss:

    1. What is Denial-of-Service Attack?

    2. Different types of DoS attacks?

    3. How can you perform DoS attack easily?



    Watch 👓 this video here:👉 https://www.facebook.com/cybersec.prism/videos/378460339876806

    Please Like the video and 📣📣📣 share with your friends. Also let me know of ✍✍✍ what do you think of this video.



    Thanks,



    Meena

    Your 'Cyber Warrior' Friend
    __________________________________________________

    You can watch 👓👓👓 all the videos of Cybersecurity Series here: 

    Facebook Page : 👉👉👉 Cybersecurity Prism https://www.facebook.com/cybersec.prism

    Please click on the 'Follow' button 💛 on my Facebook page, to receive a Facebook notification when I publish another live video!



    You can connect with me:

    Hear My Podcast: https://anchor.fm/meena-r

    Linkedin Page: Cybersecurity Prism https://www.linkedin.com/company/10117131/

    Facebook Group: Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever

    __________________________________________________

    🙊🙉🙈


    ---

    Send in a voice message: https://anchor.fm/meena-r/message

    • 7 Min.
    Day-210: What Is Unified Threat Management (UTM) System?

    Day-210: What Is Unified Threat Management (UTM) System?

    Today I will discuss:

    1. What is Unified Threat Management (UTM)?

    2. Why do you need UTM?

    3. What are the benefits of having UTM?



    Watch 👓 this video here:👉 https://www.facebook.com/1641415809511832/videos/678161853091236

    Please Like the video and 📣📣📣 share with your friends. Also let me know of ✍✍✍ what do you think of this video.



    Thanks,



    Meena

    Your 'Cyber Warrior' Friend
    __________________________________________________

    You can watch 👓👓👓 all the videos of Cybersecurity Series here: 

    Facebook Page : 👉👉👉 Cybersecurity Prism https://www.facebook.com/cybersec.prism

    Please click on the 'Follow' button 💛 on my Facebook page, to receive a Facebook notification when I publish another live video!



    You can connect with me:

    Hear My Podcast: https://anchor.fm/meena-r

    Linkedin Page: Cybersecurity Prism https://www.linkedin.com/company/10117131/

    Facebook Group: Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever

    __________________________________________________

    🙊🙉🙈


    ---

    Send in a voice message: https://anchor.fm/meena-r/message

    • 7 Min.

Top‑Podcasts in Technologie

Zuhörer haben auch Folgendes abonniert: