Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
DEV Community
Close
#
infosectrain
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
What is Azure Data Factory (ADF) Integration Runtime?
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Jul 1 '24
What is Azure Data Factory (ADF) Integration Runtime?
#
azure
#
azurecloud
#
azuredatafactory
#
infosectrain
1
reaction
Comments
Add Comment
2 min read
What is Infrastructure as Code (IaC)?
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
May 28 '24
What is Infrastructure as Code (IaC)?
#
iac
#
devops
#
cloudcomputing
#
infosectrain
Comments
Add Comment
2 min read
Trust and Transparency in Cloud Computing
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Jun 7 '24
Trust and Transparency in Cloud Computing
#
cloudcomputing
#
cloudsecurity
#
infosectrain
#
ccak
Comments
Add Comment
2 min read
What is the Cloud Controls Matrix (CCM)?
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
May 3 '24
What is the Cloud Controls Matrix (CCM)?
#
ccm
#
cloudcontrolsmatrix
#
cloudcomputing
#
infosectrain
Comments
Add Comment
2 min read
Top 10 Methods for Securing Mobile Devices and Applications
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Jun 4 '24
Top 10 Methods for Securing Mobile Devices and Applications
#
cybersecurity
#
mobilesecurity
#
infosectrain
#
learntorise
Comments
Add Comment
3 min read
Penetration Testing Tools
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
May 1 '24
Penetration Testing Tools
#
penetrationtesting
#
cybersecurity
#
infosectrain
#
penetrationtools
Comments
Add Comment
3 min read
Shoulder Surfing: Definition and Prevention Strategies
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
May 30 '24
Shoulder Surfing: Definition and Prevention Strategies
#
shouldersurfing
#
cybersecurity
#
security
#
infosectrain
Comments
Add Comment
3 min read
What is Mobile Device Management (MDM)?
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
May 28 '24
What is Mobile Device Management (MDM)?
#
mdm
#
mobiledevicemanagement
#
mobilesecurity
#
infosectrain
Comments
Add Comment
3 min read
What is Rainbow Table Attack?
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Apr 25 '24
What is Rainbow Table Attack?
#
rainbowtable
#
cybersecurity
#
cehcertification
#
infosectrain
Comments
Add Comment
2 min read
Tips to Maintain Strong Cloud Security
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
May 20 '24
Tips to Maintain Strong Cloud Security
#
cloud
#
cloudsecurity
#
infosectrain
#
cloudcomputing
Comments
Add Comment
2 min read
What is SQL Injection?
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
May 7 '24
What is SQL Injection?
#
sqlinjection
#
cybersecurity
#
sqlinjectionattack
#
infosectrain
Comments
Add Comment
3 min read
Data Link Layer of OSI Model
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Mar 29 '24
Data Link Layer of OSI Model
#
datalinklayer
#
osimodel
#
networksecurity
#
infosectrain
Comments
Add Comment
3 min read
What are the Challenges of Cloud Forensics?
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Mar 21 '24
What are the Challenges of Cloud Forensics?
#
cloudforensics
#
datasecurity
#
cloudcomputing
#
infosectrain
Comments
Add Comment
3 min read
Top 10 Cybersecurity Technologies
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Apr 10 '24
Top 10 Cybersecurity Technologies
#
cybersecurity
#
cissp
#
ai
#
infosectrain
Comments
Add Comment
3 min read
AWS Config vs. AWS CloudTrail
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Mar 28 '24
AWS Config vs. AWS CloudTrail
#
aws
#
awscloudtrail
#
awsconfig
#
infosectrain
Comments
Add Comment
3 min read
What is VPC Flow Logs in AWS?
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Apr 3 '24
What is VPC Flow Logs in AWS?
#
vpcflowlogs
#
virtualprivatecloud
#
aws
#
infosectrain
Comments
Add Comment
3 min read
What is RSA Archer Questionnaire?
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Mar 13 '24
What is RSA Archer Questionnaire?
#
rsaarcherquestionnaire
#
rsaarch
#
infosectrain
#
grc
Comments
Add Comment
3 min read
Dark Web and Its Impact on Data Privacy
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Mar 12 '24
Dark Web and Its Impact on Data Privacy
#
darkweb
#
dataprivacy
#
infosectrain
#
cybersecurity
Comments
Add Comment
3 min read
What is Website Defacement Attack?
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Feb 21 '24
What is Website Defacement Attack?
#
websiteattack
#
cybersecurity
#
infosectrain
#
learntoris
Comments
Add Comment
2 min read
What is a Supply Chain Attack?
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Jan 25 '24
What is a Supply Chain Attack?
#
supplychainattack
#
cybersecurity
#
infosectrain
#
cyberattacks
Comments
Add Comment
3 min read
How to Get Free Cybersecurity Training?
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Jan 4 '24
How to Get Free Cybersecurity Training?
#
cybersecurity
#
infosectrain
#
cyberattacks
#
learntorise
Comments
Add Comment
3 min read
What is a Cloud Access Security Broker (CASB)?
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Dec 26 '23
What is a Cloud Access Security Broker (CASB)?
#
casb
#
cloudsecuritytraining
#
infosectrain
#
cloudaccesssecuritybroker
Comments
Add Comment
3 min read
What is Fuzz Testing?
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Nov 17 '23
What is Fuzz Testing?
#
fuzz
#
fuzzing
#
cybersecurity
#
infosectrain
Comments
Add Comment
3 min read
What is Amazon CloudFormation?
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Dec 18 '23
What is Amazon CloudFormation?
#
aws
#
cloudformation
#
infosectrain
#
cloudsecurity
Comments
Add Comment
3 min read
What is Google Hacking Database (GHDB)?
Shivam Chamoli
Shivam Chamoli
Shivam Chamoli
Follow
Dec 15 '23
What is Google Hacking Database (GHDB)?
#
googlehacking
#
cybersecurity
#
googledorks
#
infosectrain
2
reactions
Comments
Add Comment
3 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account