Prabh Nair

Prabh Nair

Prabh Nair is a cybersecurity podcaster covering cyber risk, ransomware, incident response, SOC operations, GRC, AI security, threat intelligence, digital forensics, ISO 27001, CISSP, CISM, and security leadership. Built for SOC analysts, auditors, cybersecurity professionals, students, and business leaders, each episode delivers simple explanations, practical lessons, and real-world examples to help you stay ahead in the fast-changing cyber world. #CyberSecurity #InformationSecurity #CyberRisk #GRC #SOC #IncidentResponse #Ransomware #ThreatIntelligence #AISecurity #DigitalForensics

  1. MAR 20

    AI Revolution: Navigating the Offensive and Defensive Digital Divide

    In an era where artificial intelligence (AI) is revolutionizing the way we live and work, ensuring the security of generative AI technologies is paramount. Join Mr. Harshil in "Enable Secure Generative AI" as he dives deep into the world of AI, offering expert insights on leveraging AI for enhancing security measures and mitigating risks.Harshil Shahhttps://www.linkedin.com/in/harshil-shah-004/?originalSubdomain=ae🔍 What You'll Learn:The Fundamentals of Generative AI: Understand what generative AI is and how it's transforming industries.Offensive Uses of AI: Explore how AI can be used as a tool for offensive strategies, including cybersecurity attacks and data breaches.Defensive AI Strategies: Discover how AI can defend against threats, secure data, and protect digital infrastructures.Best Practices for Secure AI Deployment: Gain valuable knowledge on deploying AI technologies securely to avoid vulnerabilities.Future of AI Security: Mr. Harshil shares his predictions on the evolution of AI security measures and technologies.Whether you're a tech enthusiast, an IT professional, or someone curious about the potential of AI, this video will provide you with a comprehensive overview of how to harness AI for security purposes, along with the ethical considerations and challenges faced in the field.🔗 Stay Connected:For more insights on AI and security, subscribe to our channel and hit the notification bell.Follow us on [Social Media Platform] for updates and more content on AI technologies.✍️ We Want to Hear from You!Share your thoughts on AI security in the comments below. Have you encountered any challenges or successes in implementing AI strategies? Let's start a conversation!

    55 min
  2. MAR 18

    OSCP Preparation (Step-by-Step Roadmap + Real Strategy)

    In this episode, Prabh sits down with Sérgio to break down a practical, no-fluff roadmap for preparing for the OSCP (Offensive Security Certified Professional) certification.This discussion is designed for anyone who feels overwhelmed by OSCP — and wants a structured approach that focuses on hands-on skills, repeatable methodology, and exam-ready habits.Sérgio’s Journey: From Hospitality to OSCPSérgio shares how he transitioned from being a restaurant shift supervisor into cybersecurity — and eventually earned the OSCP.Key takeaway: OSCP isn’t about being “naturally gifted.”It’s about practice, repetition, and building a personal methodology.What You Should Learn Before OSCPBefore buying OSCP material, Sérgio strongly recommends building fundamentals first:Linux fundamentals (file system, permissions, services, processes)Windows fundamentals (users, services, logs, privilege escalation basics)Basic networking & enumeration habitsComfort using terminals and troubleshootingHe suggests starting with platforms like Hack The Box or TryHackMe to build confidence before going into OSCP labs.Best Practice Platform for Exam ReadinessSérgio recommends training on Proving Grounds because it most closely matches OffSec-style machines and exam patterns.Why it matters:Practicing on OffSec-style labs builds the exact muscle memory needed for OSCP — especially under time pressure.The OSCP Notes System That Saves You in the ExamOne of the strongest lessons in this episode:Your notes and checklists are your real “weapon” in OSCP.Sérgio explains how he built an Excel-based tracking system to document:Machine difficulty rating (your own subjective scale)Steps takenKey learnings and takeawaysWhat worked / what failedRepeatable exploitation patternsThis helps you avoid repeating mistakes and creates a “playbook” you can use during the exam.OSCP Exam Methodology (How to Think Under Pressure)Sérgio stresses that OSCP success depends on a personal workflow:Start with full port scansRun targeted enumerationCheck common entry points (shares, web apps, creds, services)Always validate credentials across machinesBuild a repeatable process you can run like a scriptHe also highlights the value of becoming tool-flexible (not tool-dependent). Active Directory in OSCP (What to Focus On)The OSCP Active Directory portion is not about advanced enterprise AD topics.It’s about doing the fundamentals extremely well:Recon + enumerationCredential access and reuseLateral movement basicsTools like SecretsDump / Mimikatz (used correctly)Repeating the process across AD machines systematicallyTools, Tunneling & Not Overusing MetasploitSérgio shares realistic advice on tools OSCP candidates should understand:Privilege escalation basicsEnumeration scriptsPivoting/tunneling tools like Ligolo-NG and ChiselAvoid becoming dependent on MetasploitLearn to adapt when a tool failsOSCP Reporting: The Skill Most People IgnoreA big OSCP differentiator is report writing.Sérgio breaks down what matters in the exam report:Clean structureClear reproduction stepsScreenshots for proof (flags + key commands)A readable narrative (work backwards if needed)Make the examiner’s job easyHow to Know You’re Ready for OSCPSérgio suggests readiness looks like:You can solve boxes consistently in a limited timeframeYou’re comfortable with OffSec-style lab patternsYou have a repeatable checklist-driven methodologyYou can document everything clearly while hacking

    53 min
  3. MAR 16

    How to Build a SOC Home Lab (Elastic SIEM) | Practical Demo with Pratyush

    In this episode, Prabh sits down with Pratyush to break down SOC (Security Operations Center) architecture and the real skills needed to start and grow a career in SOC — with a live practical demo of building a basic SOC using open-source tools.https://www.linkedin.com/in/pratyush-joshi-3391a0230/Noteshttps://excalidraw.com/#json=uAQ-z09mY63gTK6w0-5uq,rnK-MWtIUPZDl41wHQx7eg🎯 What You’ll Learn in This Podcast✅ SOC architecture explained (end-to-end workflow)✅ How log collection, parsing, and visualization actually works✅ Building a basic SOC using Elastic Stack (ELK)✅ Setting up Windows logging using Sysmon + WinLogBeat✅ Creating detections and alerts inside Elastic✅ Simulating real attacks using Atomic Red Team (MITRE ATT&CK)✅ How SOC tiers work (L1 → L2 → escalation & reporting)✅ How freshers can build practical SOC skills at home for free✅ Why learning a SIEM is the fastest way to understand cybersecurity🧱 SOC Architecture (Simplified)Pratyush explains SOC architecture in a simple way:Endpoints / Servers → Log Forwarder → SIEM (Elastic) → Dashboards → Detection Rules → Alerts → Investigation → ResponseWe cover how a SOC works across:Indexing (storing logs)Visualization (dashboards & searches)Detection rules (logic + thresholds)Alerting (triage & escalation)Response (SOAR/XDR concepts)⚙️ Live Demo: Build a Basic SOC with Elastic Stack (ELK)Pratyush demonstrates how to set up:✅ Elasticsearch + Kibana + LogstashInstallation and configuration basicsYAML configuration (host IPs, ports, security options)Creating Kibana data views and searching logsUnderstanding how logs are indexed and queried🖥️ Windows Telemetry Setup (Sysmon + WinLogBeat)🚨 Detection Engineering: Create Rules + Generate AlertsPratyush shows how to:Write queries to filter suspicious behaviorCreate detection rules inside ElasticTrigger alerts and understand SOC alert pipelinesExample: PowerShell-based suspicious activity detection (concept-level demo)This section is a mini introduction to Detection Engineering for SOC analysts.📈 SOC Career Path (L1 to L2 and Beyond)Pratyush explains the SOC tiers in a simple way:Tier 1 (L1)Monitor alertsValidate true vs false positivesEscalate suspicious incidentsTier 2 (L2)Deep investigationCorrelation across logsReport writing and remediation suggestionsHe also shares why:✅ Programming helps but is not mandatory to start✅ SIEM knowledge is the “core engine” of SOC growth✅ Home labs + practice gives freshers a huge edge🧠 Practical Skills to Become SOC-ReadyWe also discuss how to build real-world SOC habits:Log triage mindsetWriting investigation notesReporting and escalation clarityPracticing rule creation using SigmaLearning from platforms like Let’s Defend (for SOC scenarios)💻 SOC Home Lab Requirements (Minimal Setup)You can run this lab with:✅ 8GB RAM minimum✅ 40–50GB storage✅ VirtualBox / VMware✅ Ubuntu VM + Windows VMNo paid tools needed.SOC Playlisthttps://www.youtube.com/watch?v=zCLlrFZU0M8&list=PL0hT6hgexlYxd24Jb8OE7vZoas-iTcHAcISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/Infoseclearning#SOC #ElasticSIEM #CyberSecurity #SecurityOperationsCenter #BlueTeam #Sysmon #AtomicRedTeam #MITREATTACK #socanalyst

    1h 5m
  4. MAR 11

    Simplifying Public Key Infrastructure (PKI) for Beginners

    Welcome to our video on "What is PKI in Simple Terms?" If you’ve ever wondered what Public key Infrastructure (PKI) is and why it’s essential, this video is for you! We break down the complexities of PKI into simple, easy-to-understand language, making it accessible to everyone. In this video, You’ll learn:Why PKI is Important: Discover why Public Key Infrastructure is crucial for secure digital communications.Key Components of PKI: Understand the essential elements of PKI, including certificates, keys, and Certificate Authorities (CAs).The End-to-End PKI Process: Get a clear overview of how PKI works from start to finish.Common Questions Answered: We cover frequently asked questions about PKI to ensure you have a comprehensive understanding.💡 Why Watch This Video?Public Key Infrastructure is a cornerstone of secure online communication, and understanding it is key for anyone involved in cybersecurity or IT. Whether you’re a beginner or looking to refresh your knowledge, this video will give you the insights you need to grasp PKI and its importance.🔔 Don’t forget to like, comment, and subscribe for more easy-to-understand cybersecurity and IT concepts!Cryptography Fundamental: https://www.youtube.com/watch?v=2zxiWSitAlE&t=1304s&pp=ygUac3ltbWV0cmljIGVuY3J5cHRpb24gcHJhYmg%3DHashing and Digital Signature Fundamental https://www.youtube.com/watch?v=BuhWRY4hkpY&pp=ygUhZGlnaXRhbCBzaWduYXR1ciBlbmNyeXB0aW9uIHByYWJoAssess Your Knowledge of PKI https://www.youtube.com/watch?v=2TPe8R8BgsU&t=526s&pp=ygUcY2lzc3AgY3J5cHRvZ3JhcGh5IHF1ZXN0aW9ucw%3D%3D#PKI #PublicKeyInfrastructure #CyberSecurity #ITSecurity #PKIExplained, #DigitalCertificates #SecureCommunication #CyberSecurityForBeginners

    23 min
  5. MAR 10

    How to Build an Enterprise Cybersecurity Program From Scratch

    In this episode, Prabh sits down with Dr. Eric to break down what most organizations get wrong about cybersecurity: they over-focus on “prevention” and under-invest in building a resilient security program.This conversation is designed for CISOs, security leaders, and anyone responsible for creating or fixing an enterprise security function — especially in environments with limited budget, limited maturity, or limited executive attention.What This Podcast CoversThis 30-minute podcast focuses on how to build a cybersecurity program from the ground up, including:What an information security program actually includesThe real difference between security strategy vs security programHow to prioritize security work without trying to “secure everything”How to gain executive trust when you're new in the roleWhy people + process come before toolsHow to build a security program even when budgets are tightSecurity Program vs Security Strategy (Most People Confuse This)Dr. Eric explains that a strategy is the direction — what you want to achieve and why.A program is how you execute consistently: operating model, processes, governance, reporting, and repeatable outcomes.If you only have strategy without a program, you get slides — not security.🎯 The Prioritization Method That WorksInstead of trying to secure the entire organization at once, Dr. Eric recommends:Pick one critical process or data setIdentify its risk toleranceMap the biggest threatsFix the largest vulnerabilities firstRepeat in small, measurable stepsThis “focus-and-repeat” approach can secure 80% of critical processes within a year, compared to the traditional method that fails due to overload and complexity.🤝 Executive Engagement: Start With Legal + CFO (Not CEO)One of the strongest leadership lessons in this episode:If you're building a security program from scratch, don’t start by pitching the CEO.Start with:Chief Legal Counsel (risk, liability, compliance)CFO (funding, business impact, risk tolerance)Building credibility with these stakeholders creates momentum and trust — which makes later CEO alignment easier and faster.🗣 CISO Communication That Gets AttentionDr. Eric shares what separates successful security leaders from technical-only leaders:✅ Speak in the language executives care about:financial riskoperational downtimerisk tolerancereputational exposureregulatory consequences💰 Building Security in Budget-Constrained OrganizationsIf funding is limited, Dr. Eric recommends a simple approach:start with small investmentsdemonstrate measurable valueshow outcomes and risk reductionthen request bigger budgets with credibilityThis is how security programs survive and scale in real enterprises.🎯 Who Should Watch This?This episode is ideal for:CISOs and security leadersSecurity managers and architectsGRC leaders and risk teamsSOC leaders and security engineersAnyone building a cybersecurity program from zeroCISO talkshttps://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1NIST Serieshttps://www.youtube.com/watch?v=VcC_KabV_Ho&list=PL0hT6hgexlYy0vBwMv0eteiyAxB48RQzy&pp=gAQBiAQBGRC Serieshttps://www.youtube.com/watch?v=mq_vSLHm4r0&list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28&pp=gAQBISO 27001 Videohttps://www.youtube.com/watch?v=sQqJH2naU6I&t=1454s&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzISO 27001 Implementation Guidehttps://www.youtube.com/watch?v=GBfwk10Hh-o&pp=ygUeaXNvIDI3MDAxIGltcGxlbWVudGF0aW9uIHN0ZXBzGRC Practical Serieshttps://www.youtube.com/playlist?list=PL0hT6hgexlYztA41j1bceTfVagP9mtq28GRC Interviewhttps://www.youtube.com/playlist?list=PL0hT6hgexlYz1Usn1Nrnur6OzVoz59zylInternal Audithttps://www.youtube.com/playlist?list=PL0hT6hgexlYyNWBcGYfabwumCr0GKmLWvStudy with MeTelegram Grouphttps://t.me/Infoseclearning#cisos #ciso #cissp #cism #infosec

    32 min

Ratings & Reviews

5
out of 5
3 Ratings

About

Prabh Nair is a cybersecurity podcaster covering cyber risk, ransomware, incident response, SOC operations, GRC, AI security, threat intelligence, digital forensics, ISO 27001, CISSP, CISM, and security leadership. Built for SOC analysts, auditors, cybersecurity professionals, students, and business leaders, each episode delivers simple explanations, practical lessons, and real-world examples to help you stay ahead in the fast-changing cyber world. #CyberSecurity #InformationSecurity #CyberRisk #GRC #SOC #IncidentResponse #Ransomware #ThreatIntelligence #AISecurity #DigitalForensics

You Might Also Like