Пікірлер
@jyotsdeep
@jyotsdeep 2 күн бұрын
What is the source of the checklist? Is it a part of the SOX regulation or something created by someone else to help companies manage SOX compliance?
@kashifrashid6107
@kashifrashid6107 2 күн бұрын
Platform name ?😊
@Rosefernandis
@Rosefernandis 10 күн бұрын
Video is good... But the background music is interfering with concentration.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 9 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@kashifrashid6107
@kashifrashid6107 11 күн бұрын
Bht maza aya series ka excellent ❤❤❤
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 9 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@SaiKarthiksatyavarapu
@SaiKarthiksatyavarapu 11 күн бұрын
is there is one-one training pls confirm
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 9 күн бұрын
yes, please whatsapp me on +91 971 860 3114
@satishjadhav6543
@satishjadhav6543 12 күн бұрын
Sir What type of interview questions will come on this topic
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 9 күн бұрын
yes, please whatsapp me on +91 971 860 3114
@mduvais5774
@mduvais5774 12 күн бұрын
This website not supported in India
@kashifrashid6107
@kashifrashid6107 13 күн бұрын
Excellent as always
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 9 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@jyoshnadivya6380
@jyoshnadivya6380 13 күн бұрын
Hi sir plz upload the Soc 2 complains part 4 video
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 9 күн бұрын
Thanks for your interest! Stay tuned for the next part, coming soon.
@Sweta-t4y
@Sweta-t4y 14 күн бұрын
Why organizations seeks for only soc2 reports rather than soc1 report.could you please explain me
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 9 күн бұрын
The preference for **SOC 2** reports over **SOC 1** reports often depends on the type of organization, the services provided, and the stakeholders' needs. Below is an explanation of why organizations typically seek SOC 2 reports over SOC 1 reports: --- ### **Difference Between SOC 1 and SOC 2** 1. **SOC 1 (System and Organization Controls 1):** - Focus: Financial reporting. - Purpose: Ensures that controls at the service organization are designed and implemented to meet the needs of its **customers’ financial reporting requirements**. - Audience: Primarily intended for auditors and stakeholders concerned with financial audits. - Examples of Use Cases: - Payroll services. - Accounting software. - Financial transaction processing systems. 2. **SOC 2 (System and Organization Controls 2):** - Focus: Data security, privacy, and operational controls. - Purpose: Ensures that controls related to **Trust Services Criteria (TSC)**-security, availability, processing integrity, confidentiality, and privacy-are in place and operating effectively. - Audience: Intended for stakeholders, such as customers or partners, who are concerned about how the organization manages and secures data. - Examples of Use Cases: - SaaS providers. - Cloud storage and hosting services. - IT service providers. --- ### **Why Organizations Prefer SOC 2 Reports** 1. **Focus on Security and Data Protection:** - In today’s business environment, **data security** is a top concern for most organizations. SOC 2 focuses on **how securely data is handled, stored, and processed**, which aligns with what customers and partners are looking for in cloud-based and IT-driven services. 2. **Broader Applicability Across Industries:** - SOC 2 is relevant to a wide range of industries, such as technology, healthcare, and e-commerce, because it deals with **operational and security-related issues**. SOC 1, by contrast, is limited to businesses that directly affect financial reporting. 3. **Customer Demand:** - Many organizations-especially SaaS providers, cloud services, and IT vendors-are required by their **customers** to demonstrate they have proper data protection controls in place. - Customers may explicitly request SOC 2 reports when evaluating vendors, as it directly addresses the concerns about security and availability. 4. **Data Privacy Regulations:** - With the rise of data privacy laws like **GDPR**, **CCPA**, and others, SOC 2 reports provide a clear framework to show compliance with best practices for privacy and confidentiality. 5. **Trust and Reputation:** - SOC 2 reports build trust with stakeholders (customers, partners, investors) by demonstrating a **commitment to security and privacy**. This is especially important for companies handling sensitive customer data. 6. **Modern Business Models (Cloud and SaaS):** - Many modern businesses operate in **cloud-based environments** or as **service providers**, where security, availability, and confidentiality are critical. SOC 2 addresses these specific needs better than SOC 1. 7. **Non-Financial Focus:** - SOC 1 is financial-reporting-specific, making it less relevant for companies that do not directly impact their clients' financial audits. On the other hand, SOC 2 applies to **non-financial operational processes**, which are often more critical for customers outside the accounting and finance domain. --- ### **When SOC 1 May Be Preferred** Despite the preference for SOC 2, there are cases where SOC 1 is necessary, such as: - Businesses offering **financial outsourcing services**, like payroll processors or financial data aggregators. - Organizations that directly impact **internal controls over financial reporting (ICFR)** for their customers. --- ### **Conclusion** Organizations generally seek **SOC 2 reports** over SOC 1 reports because SOC 2 addresses **broader and more critical concerns** around **security, availability, processing integrity, confidentiality, and privacy**, which are relevant to a wider range of industries and customers. SOC 1 is more specialized and primarily used for financial reporting contexts. For modern businesses, especially those in technology and cloud services, SOC 2 aligns better with the expectations of customers and regulatory compliance needs.
@Sweta-t4y
@Sweta-t4y 9 күн бұрын
@LearnITSecuritywithLuvJohar thank you sir
@Sweta-t4y
@Sweta-t4y 9 күн бұрын
How we decide design of the control is perfect in TOD
@Dutt936
@Dutt936 14 күн бұрын
kUDOS SIR AND THANKS
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 9 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@poonchezhians
@poonchezhians 14 күн бұрын
Really awesome, thanks for sharing Johar. Can you please share any case studies on IoT, OT, ICS industry.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 9 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@1parag
@1parag 24 күн бұрын
What a nice video
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 24 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@Funbylife438
@Funbylife438 25 күн бұрын
Sir BCP and DRP Relat to each other And risk appetite/Risk capacity
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 25 күн бұрын
Relationship Between BCP and DRP Definitions: Business Continuity Plan (BCP): A proactive plan that ensures essential business functions continue during and after a disruption. It focuses on minimizing downtime and maintaining business operations. Disaster Recovery Plan (DRP): A reactive plan that deals specifically with restoring IT systems, data, and infrastructure after a disaster or significant disruption. How They Relate: Complementary Focus: BCP is broader, covering all aspects of the organization, including people, processes, and technology. DRP is a subset of BCP, focused exclusively on IT and technical recovery. Shared Goal: Both aim to reduce the impact of disruptions, ensure recovery, and maintain organizational resilience. Sequential Application: BCP ensures that critical business functions continue during a disruption. DRP kicks in to restore the technical environment to normal operations. Integration: BCP and DRP should be integrated and tested together to ensure seamless recovery. For example, a BCP might rely on a DRP to restore key IT systems necessary for operational continuity.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 25 күн бұрын
Risk Appetite and Risk Capacity in BCP and DRP Risk Appetite: Definition: The level of risk an organization is willing to accept to achieve its objectives. Influence on BCP/DRP: If an organization has a high-risk appetite, it may invest less in BCP/DRP and accept greater disruption. A low-risk appetite leads to more robust BCP/DRP planning, with investments in redundancy, backups, and rapid recovery mechanisms. Risk Capacity: Definition: The maximum level of risk the organization can handle without jeopardizing its survival. Influence on BCP/DRP: Even if an organization has a high-risk appetite, its risk capacity may limit how much risk it can actually tolerate. Organizations with limited resources (low risk capacity) may prioritize essential elements in their BCP/DRP to stay within budget. Balancing Risk Appetite and Risk Capacity: Alignment: BCP and DRP strategies should align with the organization's risk appetite and capacity. Investment Decisions: The extent of investment in continuity and recovery measures is influenced by: Risk appetite: Determines willingness to invest in risk mitigation. Risk capacity: Defines the feasible scope of investment. Scenarios: High Risk Appetite, Low Risk Capacity: Focused and cost-effective BCP/DRP. Low Risk Appetite, High Risk Capacity: Comprehensive and robust BCP/DRP. Practical Example A bank (low risk appetite, high risk capacity): Implements detailed BCP and DRP due to regulatory requirements and critical operations. Maintains redundant data centers, automated backups, and frequent disaster recovery testing. A small startup (high risk appetite, low risk capacity): May prioritize BCP for core operations while having a minimal DRP (e.g., relying on cloud backups).
@Dutt936
@Dutt936 27 күн бұрын
kudos sir
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 27 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@Dutt936
@Dutt936 26 күн бұрын
@@LearnITSecuritywithLuvJohar sure sir why not
@taiwosokan1018
@taiwosokan1018 28 күн бұрын
Wow this is great! Well simplified!
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 27 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@taiwosokan1018
@taiwosokan1018 27 күн бұрын
Do you offer one on one consultation for coming interviews?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 27 күн бұрын
yes, please whatsapp me on +91 971 860 3114
@kushagrajain6285
@kushagrajain6285 28 күн бұрын
How's job market in India for this compared to cloud or devops... Everyone today is going in cloud so competition is very high now
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 27 күн бұрын
cybersecurity and GRC is the next thing for next 15 years across the world not only in India
@idhr4095
@idhr4095 28 күн бұрын
How can I start my career in grc.i work in call center as customer service executive
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 27 күн бұрын
please whatsapp me on +91 971 860 3114
@Dutt936
@Dutt936 29 күн бұрын
kudos sir keep it up and thank U
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 29 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@kashifrashid6107
@kashifrashid6107 Ай бұрын
At the last ya pta kesy chly ga k risk ka level kia hai ? Appetite ?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 29 күн бұрын
yes every company will decide its risk appetite
@kashifrashid6107
@kashifrashid6107 29 күн бұрын
@LearnITSecuritywithLuvJohar ok
@taarzanez
@taarzanez Ай бұрын
Bhai Music remove krdo...sab ne 2 part ki demand ki haioh bhi bna do
@taarzanez
@taarzanez Ай бұрын
Who gave the idea of adding music / he has spoiled your idea/ if possible remove
@kashifrashid6107
@kashifrashid6107 Ай бұрын
Excellent keep it up ❤
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 29 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@kashifrashid6107
@kashifrashid6107 Ай бұрын
Bro thora sa practical work ki series bana do mtlb documentation krta hoa ka practical
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
uske liye meri training leni padegi bro, itna easy nahi hai ye sab, please whatsapp me on +91 971 860 3114
@kashifrashid6107
@kashifrashid6107 Ай бұрын
@LearnITSecuritywithLuvJohar ok mn apsa contact krta
@kashifrashid6107
@kashifrashid6107 Ай бұрын
❤❤
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@kashifrashid6107
@kashifrashid6107 Ай бұрын
Excellent just excellent ❤
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@taarzanez
@taarzanez Ай бұрын
Brilliantly Done !
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@shubhamkelhe3862
@shubhamkelhe3862 Ай бұрын
Hello. I have experience and expertise in ISO 9001 & am looking to start my career in ISO 27001. Need your guidance on these lines!
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
please whatsapp me on +91 971 860 3114
@AmirB-v8e
@AmirB-v8e Ай бұрын
Hello Sir, This is Amir, I gave a request in Linkedin, I need to talk to you, pls accpect my connection
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
please whatsapp me on +91 971 860 3114
@swapnadeepmtr28
@swapnadeepmtr28 Ай бұрын
Can you make more such videos into ITacs. Very helpful
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@gajanantodakar3768
@gajanantodakar3768 Ай бұрын
Nice information
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@ljkobile
@ljkobile Ай бұрын
Where is the link
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
please whatsapp me on +91 971 860 3114
@janakidevi5068
@janakidevi5068 Ай бұрын
Thank you very much luv for your continuous efforts on cybersecurity.your videos really helped me to gain knowledge in cybersecurity. Thank you . All the best
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@abdullahfaisal7252
@abdullahfaisal7252 Ай бұрын
Suppose I have more than 10k keys. Now the challenge is to ensure that Key remains safe and secure and avoids any deletion or alteration of data (accidentally or mistakenly). If any of the keys are lost, it will be a huge disaster. At the moment, the encrypted data is backed up and stored on the servers. Now, my question is that, as per ISO 27001, 1. what can be the best practice to be implemented to manage cryptography to avoid any deletion or modification? 2. how to manage encrypted data backup.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
1. Best Practices for Managing Cryptography to Avoid Deletion or Modification Cryptographic key management is critical in protecting sensitive data. As per ISO 27001, here are key practices: a. Implement a Key Management Policy Develop and document a Key Management Policy that covers: Key generation, distribution, storage, use, and retirement. Role-based access control (RBAC) for key management. Segregation of duties to ensure no single individual has complete control over key management operations. b. Use a Hardware Security Module (HSM) Deploy a Hardware Security Module (HSM) for secure generation, storage, and management of cryptographic keys. HSMs ensure tamper-resistance and enforce policies such as "no export of private keys." c. Implement Key Versioning Use key versioning to maintain historical versions of keys for rollback purposes. Ensure old keys are securely archived and not deleted until explicitly approved by management. d. Enforce Strong Access Controls Use multi-factor authentication (MFA) for access to key management systems. Restrict key management activities to a limited number of trusted individuals with separate approvals. e. Regular Audits and Monitoring Continuously monitor key usage and maintain audit logs to detect unauthorized access or modifications. Conduct regular internal and external audits to ensure compliance with the policy. f. Backup and Recovery for Keys Backup keys in a secure manner (e.g., encrypted and stored in a separate, secure environment). Use geographically distributed secure storage for redundancy (e.g., HSM replication or secure vaults). g. Establish Key Retention and Destruction Policies Define a lifecycle for each key type (e.g., encryption keys, signing keys). Ensure retired keys are securely destroyed using methods that prevent recovery. 2. Managing Encrypted Data Backups To safeguard encrypted data backups, ISO 27001 recommends several measures to prevent data loss, alteration, or unauthorized access: a. Backup Policy Create a documented Backup Policy that specifies: Backup frequency (e.g., daily, weekly). Retention periods. Encryption standards (AES-256 or higher). b. Encryption at Rest and in Transit Ensure backups are encrypted at rest and during transit. Use secure protocols such as TLS for transferring backups. c. Use Secure Backup Storage Locations Store backups in secure, geographically diverse locations to mitigate risks from physical damage or disasters. Utilize cold storage (offline backups) for added security against ransomware or cyberattacks. d. Regular Backup Testing Conduct routine restoration tests to ensure backups are complete and can be restored without issues. Simulate disaster recovery scenarios to evaluate the effectiveness of backup strategies. e. Immutable Backups Use immutable backup storage solutions to ensure backups cannot be modified or deleted during their retention period (e.g., WORM-Write Once Read Many technology). f. Access Control and Monitoring Implement strict access control to backup systems using MFA and logging access activities. Enable audit trails for backup operations and review them regularly for anomalies. g. Backup Validation Validate the integrity of backups to ensure they have not been tampered with using techniques like checksums or cryptographic hashes. h. Service-Level Agreements (SLAs) for Backup Management If you’re using third-party storage solutions, ensure SLAs cover encryption, physical security, and disaster recovery requirements. Key ISO 27001 Clauses to Focus On A.10.1 (Policy on the use of cryptographic controls): Develop a cryptography policy aligned with your organization’s risk management process. A.12.3 (Backup): Implement and test backup procedures to protect against data loss. A.18.1.5 (Regulation of cryptographic controls): Ensure compliance with legal, regulatory, and contractual obligations related to cryptographic controls.
@cosmopolitanalankrita8795
@cosmopolitanalankrita8795 Ай бұрын
You should've provided the content in written form instead of just reading it
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
I provide trainings at very reasonable fees, please whatsapp me on +91 971 860 3114
@VthePeople4156
@VthePeople4156 2 ай бұрын
Please add timestamps &&&& Simply simplify complete AWS & all cloud's security.......
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@VthePeople4156
@VthePeople4156 Ай бұрын
Please Teach complete cloud security from scratch... Step by step​ @@ teach how to audit complete cloud environment ( what r d top 10 services we need to learn for Audit) Very high demand skillset for next 5 years... @@LearnITSecuritywithLuvJohar
@VthePeople4156
@VthePeople4156 Ай бұрын
Overall teach us complete cloud security & security audit...form very Basic level for all 3 cloud platforms
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
I provide trainings at very reasonable fees, please whatsapp me on +91 971 860 3114
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Ай бұрын
I provide trainings at very reasonable fees, please whatsapp me on +91 971 860 3114
@pravinteli3335
@pravinteli3335 2 ай бұрын
Lot of depth in this discuss, its give me bigger picture. thanks
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
please share the videos
@deeepsss
@deeepsss 2 ай бұрын
thank you so much sir, we would like to have more case studies on this and maybe share the document if possible.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@SureshPant-t9w
@SureshPant-t9w 2 ай бұрын
Nice , I am very excited to start and join your iso27k training . May I know when new batch will start ?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
please whatsapp me on +91 971 860 3114
@MLHBeauty
@MLHBeauty 2 ай бұрын
Is this based on iso27001:2022? Or the old version?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
new version
@MLHBeauty
@MLHBeauty 2 ай бұрын
Thank you for this video. More articles please, also a tutorial on DPIA will be good please.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
Sure thing!
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@faizankhanseo4639
@faizankhanseo4639 2 ай бұрын
Hi Sir, As auditors, can we provide our remarks at the end on the particular clause after assessing other clauses? This is because it would be difficult to give remarks on aspects like management, continuity, and monitoring without fully seeing (asking evidence) them in an organization.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
Yes, as auditors, it is entirely appropriate and often necessary to provide remarks on a particular clause only after assessing related clauses and gathering sufficient evidence. This approach aligns with the principles of professional auditing and ensures that your observations are based on a comprehensive understanding of the organization’s practices and controls.
@aayushivijh1222
@aayushivijh1222 2 ай бұрын
Please tell what are validation controls
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
Validation controls are tools used in web development to ensure that the data entered by users into a form is valid and meets specific criteria before being processed or submitted. These controls are commonly used in frameworks like ASP.NET to enhance user input reliability and provide immediate feedback for errors. ### **Types of Validation Controls** 1. **RequiredFieldValidator** - Ensures that a form field is not left blank. - Commonly used for mandatory fields like name, email, etc. 2. **CompareValidator** - Compares the value of one control with another or a specific value. - Used for tasks like confirming passwords or validating date ranges. 3. **RangeValidator** - Ensures that a value falls within a specified range. - Useful for numeric or date inputs, like age or event dates. 4. **RegularExpressionValidator** - Validates input based on a regular expression. - Used for patterns like email formats, phone numbers, or postal codes. 5. **CustomValidator** - Allows developers to write custom logic for validation. - Suitable for complex validation scenarios not covered by built-in validators. 6. **ValidationSummary** - Displays a summary of all validation errors on the page. - Enhances user experience by showing all issues in one place. 7. **Custom Client-Side Validation** - JavaScript or other client-side scripting to perform immediate validation before the form submission. ### **How Validation Controls Work** - **Server-Side Validation**: Validation occurs on the server after the form is submitted. This is more secure because it prevents users from bypassing validation by disabling JavaScript. - **Client-Side Validation**: Validation happens in the browser before the form is submitted, providing instant feedback to the user. While faster, it’s less secure since it can be bypassed. ### **Benefits of Validation Controls** 1. **Improves Data Quality**: Ensures only valid data is processed. 2. **Enhances User Experience**: Provides immediate feedback. 3. **Reduces Server Load**: Prevents invalid submissions from reaching the server. 4. **Flexibility**: Custom validators allow for a wide range of validation scenarios. These controls are crucial for creating robust, user-friendly, and secure web applications.
@shabbirkaru
@shabbirkaru 2 ай бұрын
Excellent informative podcast today
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@tabishparvez5873
@tabishparvez5873 2 ай бұрын
Can you provide its notes also please ? I have been continuously watching your videos
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
I provide trainings at very reasonable fees, please whatsapp me on +91 971 860 3114
@tabishparvez5873
@tabishparvez5873 2 ай бұрын
can you provide the notes please ?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
please whatsapp me on +91 971 860 3114
@tabishparvez5873
@tabishparvez5873 2 ай бұрын
Thank you so much to make a video in a very understandable way . Today I got a call for a interview and they asked me if i have certification of ITIL 4 foundation level. Then I found your videos worth watching. Thank you dost
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@tabishparvez5873
@tabishparvez5873 2 ай бұрын
@LearnITSecuritywithLuvJohar sure
@pavithra1510
@pavithra1510 2 ай бұрын
How to join in this whatsapp group
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
please whatsapp me on +91 971 860 3114
@aayushivijh1222
@aayushivijh1222 2 ай бұрын
Email services of an organisation comes under ITAC?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
Yes, email services of an organization typically fall under Information Technology Application Controls (ITAC). ITACs are specific controls applied to ensure the accuracy, integrity, and security of data processed by individual applications, such as email systems. Here’s how email services align with ITAC: Access Management: Ensures only authorized users have access to the email system. Implements authentication controls like passwords or multi-factor authentication (MFA). Data Integrity: Monitors email content to prevent tampering or loss of data during transmission. Uses encryption for secure communication. Confidentiality: Protects sensitive organizational information exchanged via email. Employs security measures like secure sockets layer (SSL) or transport layer security (TLS). Audit and Monitoring: Tracks email activity for compliance and detects potential misuse or unauthorized access. Logs user actions and email system changes. Automation Controls: Manages automated email workflows to ensure they function as intended (e.g., alerts, automated notifications).
@aayushivijh1222
@aayushivijh1222 2 ай бұрын
Thanks sir
@SR1-191
@SR1-191 2 ай бұрын
Dear Shri Johar ji, I have qualification and experience still I am not able to find job in IT security and SoX compliances. Would you please provide me some guidance in this regards. -Regards SNR
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
please whatsapp me on +91 971 860 3114