![KamilSec](/img/default-banner.jpg)
- 73
- 533 487
KamilSec
United States
Registrace 1. 11. 2019
This channel is dedicated to a hands-on exploration of RMF/Cyber and IT Security, catering to students, employees, and cyber enthusiasts. It emphasizes fundamental concepts in IT and IT Security, with a particular focus on practical aspects of US FISMA, NIST, RMF, and FedRAMP.
Mohammed Kamil Zakari
MSc.IT, CISSP, CISM, CISA, CEH, CDPSE, AWS CDA, AWS SAP, eJPT
I CONDUCT INDIVIDUALIZED RESUME AND INTERVIEW PREP SESSIONS, and On Demand Interview Prep Videos for IT Sec Analyst/ISSO and SCA available as well. Reach out.
Help grow the channel below: By subscribing and liking the videos, Thank you.
Patreon Channel Support
www.patreon.com/kamilSec?fan_landing=true
Order your KamilSec (KS) Designs Merch
kamilsec.creator-spring.com/
- CashApp: $Kamilzak
- Zelle: kaamilzak@gmail.com
- Paypal: paypal.me/MZakari
Thank You
Connect:
Twitter: Kamilzak_1
Instagram: @Kamilzak1
E-mail: Kaamilzak@gmail.com
Mohammed Kamil Zakari
MSc.IT, CISSP, CISM, CISA, CEH, CDPSE, AWS CDA, AWS SAP, eJPT
I CONDUCT INDIVIDUALIZED RESUME AND INTERVIEW PREP SESSIONS, and On Demand Interview Prep Videos for IT Sec Analyst/ISSO and SCA available as well. Reach out.
Help grow the channel below: By subscribing and liking the videos, Thank you.
Patreon Channel Support
www.patreon.com/kamilSec?fan_landing=true
Order your KamilSec (KS) Designs Merch
kamilsec.creator-spring.com/
- CashApp: $Kamilzak
- Zelle: kaamilzak@gmail.com
- Paypal: paypal.me/MZakari
Thank You
Connect:
Twitter: Kamilzak_1
Instagram: @Kamilzak1
E-mail: Kaamilzak@gmail.com
Episode 8: System Component Inventory (CM-8 Explained) | KamilSec
Episode 8: System Component Inventory (CM-8 Explained) | KamilSec
Welcome to Episode 8 of KamilSec! In this episode, we dive deep into System Component Inventory (CM-8) and its significance in maintaining secure and compliant IT systems.
System Component Inventory, or CM-8, is a crucial element in cybersecurity frameworks, ensuring that all components within an IT system are accounted for and properly managed. This episode covers:
🔹 What is CM-8? - An introduction to System Component Inventory and its importance. 🔹 CM-8 Requirements - A detailed look at the specific requirements and guidelines for CM-8 compliance. 🔹 Best Practices - Tips and best practices for conducting an effective system component inventory. 🔹 Compliance Checklist - A checklist to ensure your organization meets CM-8 standards. 🔹 Real-World Examples - Case studies and examples of CM-8 in action.
Whether you are an IT professional, cybersecurity enthusiast, or compliance officer, this episode will provide you with the knowledge and tools needed to master CM-8 and enhance your system's security posture.
Your Query:
Now playing Episode 7 Least Functionality (CM-7)
Episode 7 Least Functionality (CM-7)
Hermitcraft S10#9: Walking To The Horizon
Hermitcraft S10#9: Walking To The Horizon
Episode 8: Urinary Incontinence
Beyond the Box Episode 14: The ongoing ripple effects of the Red Sea situation
Episode 8 | SOA on GAP for Coconut
"Understanding System Component Inventory: CM-8 Explained"
"Best Practices for CM-8 Compliance in System Component Inventory"
"CM-8 Requirements Demystified: System Component Inventory"
"How to Conduct Effective System Component Inventory (CM-8)"
"Ensuring Security through CM-8: System Component Inventory"
"Mastering CM-8: System Component Inventory Essentials"
"CM-8 Compliance Checklist: System Component Inventory"
"System Component Inventory: CM-8 Tips and Insights"
"The Importance of CM-8 in System Component Inventory"
"Step-by-Step Guide to CM-8: System Component Inventory"
#SystemComponentInventory #CM8Explained #CyberSecurity #ComplianceMatters #TechTalk #InventoryManagement #ITCompliance #SystemSecurity #TechEducation #BestPractices #SecurityStandards #ITAudit #CyberCompliance #TechCompliance #SystemManagement #CyberDefense #RiskManagement #ITStandards #TechUpdates #DataSecurity #TechTips #ComplianceChecklist #TechGuidance #SecurityProtocols #ITGovernance #TechInsights #CyberAware #TechTutorials #CyberAware
🔔 Don't forget to like, share, and subscribe to KamilSec for more insightful content on cybersecurity and compliance.
📢 Join the Conversation! Comment below with your thoughts and experiences with CM-8. Have questions? Drop them in the comments, and we'll be sure to address them in future episodes.
#SystemComponentInventory #CM8 Explained #CyberSecurity #ComplianceMatters #TechTalk #InventoryManagement #ITCompliance #SystemSecurity #TechEducation #BestPractices #SecurityStandards #ITAudit #CyberCompliance #TechCompliance #SystemManagement #CyberDefense #RiskManagement #ITStandards #TechUpdates #DataSecurity #TechTips #ComplianceChecklist #TechGuidance #SecurityProtocols #ITGovernance #TechInsights #TechRegulations #SystemCompliance #TechTutorials #CyberAware
*************************************************************
**I ALSO CONDUCT INDIVIDUALIZED RESUME AND INTERVIEW PREP SESSION**
****Connect with me on Social Media***:
Twitter: Kamilzak_1
Instagram: @Kamilzak1
E-Mail: Kaamilzak@gmail.com
Thank you
Welcome to Episode 8 of KamilSec! In this episode, we dive deep into System Component Inventory (CM-8) and its significance in maintaining secure and compliant IT systems.
System Component Inventory, or CM-8, is a crucial element in cybersecurity frameworks, ensuring that all components within an IT system are accounted for and properly managed. This episode covers:
🔹 What is CM-8? - An introduction to System Component Inventory and its importance. 🔹 CM-8 Requirements - A detailed look at the specific requirements and guidelines for CM-8 compliance. 🔹 Best Practices - Tips and best practices for conducting an effective system component inventory. 🔹 Compliance Checklist - A checklist to ensure your organization meets CM-8 standards. 🔹 Real-World Examples - Case studies and examples of CM-8 in action.
Whether you are an IT professional, cybersecurity enthusiast, or compliance officer, this episode will provide you with the knowledge and tools needed to master CM-8 and enhance your system's security posture.
Your Query:
Now playing Episode 7 Least Functionality (CM-7)
Episode 7 Least Functionality (CM-7)
Hermitcraft S10#9: Walking To The Horizon
Hermitcraft S10#9: Walking To The Horizon
Episode 8: Urinary Incontinence
Beyond the Box Episode 14: The ongoing ripple effects of the Red Sea situation
Episode 8 | SOA on GAP for Coconut
"Understanding System Component Inventory: CM-8 Explained"
"Best Practices for CM-8 Compliance in System Component Inventory"
"CM-8 Requirements Demystified: System Component Inventory"
"How to Conduct Effective System Component Inventory (CM-8)"
"Ensuring Security through CM-8: System Component Inventory"
"Mastering CM-8: System Component Inventory Essentials"
"CM-8 Compliance Checklist: System Component Inventory"
"System Component Inventory: CM-8 Tips and Insights"
"The Importance of CM-8 in System Component Inventory"
"Step-by-Step Guide to CM-8: System Component Inventory"
#SystemComponentInventory #CM8Explained #CyberSecurity #ComplianceMatters #TechTalk #InventoryManagement #ITCompliance #SystemSecurity #TechEducation #BestPractices #SecurityStandards #ITAudit #CyberCompliance #TechCompliance #SystemManagement #CyberDefense #RiskManagement #ITStandards #TechUpdates #DataSecurity #TechTips #ComplianceChecklist #TechGuidance #SecurityProtocols #ITGovernance #TechInsights #CyberAware #TechTutorials #CyberAware
🔔 Don't forget to like, share, and subscribe to KamilSec for more insightful content on cybersecurity and compliance.
📢 Join the Conversation! Comment below with your thoughts and experiences with CM-8. Have questions? Drop them in the comments, and we'll be sure to address them in future episodes.
#SystemComponentInventory #CM8 Explained #CyberSecurity #ComplianceMatters #TechTalk #InventoryManagement #ITCompliance #SystemSecurity #TechEducation #BestPractices #SecurityStandards #ITAudit #CyberCompliance #TechCompliance #SystemManagement #CyberDefense #RiskManagement #ITStandards #TechUpdates #DataSecurity #TechTips #ComplianceChecklist #TechGuidance #SecurityProtocols #ITGovernance #TechInsights #TechRegulations #SystemCompliance #TechTutorials #CyberAware
*************************************************************
**I ALSO CONDUCT INDIVIDUALIZED RESUME AND INTERVIEW PREP SESSION**
****Connect with me on Social Media***:
Twitter: Kamilzak_1
Instagram: @Kamilzak1
E-Mail: Kaamilzak@gmail.com
Thank you
zhlédnutí: 80
Video
Episode 7 Least Functionality (CM-7): KamilSec
zhlédnutí 764Před 19 hodinami
Episode 7 Least Functionality (CM-7): KamilSec In this seventh episode of the NIST SP 800-53 Security Control explanations for CM. We reviewed the CM-7 Least Functionality as well as looking at simplifying what the control requirements are all about and how best to assess/test this control. Your Query: "Understanding Least Functionality (CM-7) with KamilSec" "How to Implement Least Functionalit...
Episode 6 Configuration Settings (CM-6)
zhlédnutí 754Před 14 dny
In this sixth episode of the NIST SP 800-53 Security Control explanations for CM. We reviewed the CM-6 Configuration Settings as well as looking at simplifying what the control requirements are all about and how best to assess/test this control. Computer Security Resource Center csrc.nist.gov/publications The free way to help the channel grow is by subscribing using the link below: czcams.com/u...
Episode 5 Access Restriction For Change (CM-5)
zhlédnutí 117Před 21 dnem
In this fifth episode of the NIST SP 800-53 Security Control explanations for CM. We reviewed the CM-5 Access Restriction For Change as well as looking at simplifying what the control requirements are all about and how best to assess/test this control. Computer Security Resource Center csrc.nist.gov/publications The free way to help the channel grow is by subscribing using the link below: czcam...
Episode 4 Impact Analyses (CM-4)
zhlédnutí 214Před 28 dny
In this third episode of the NIST SP 800-53 Security Control explanations for CM. We reviewed the CM-4 Impact Analyses as well as looking at simplifying what the control requirements are all about and how best to assess/test this control. Computer Security Resource Center csrc.nist.gov/publications The free way to help the channel grow is by subscribing using the link below: czcams.com/users/Ka...
Episode 3 Configuration Change Control (CM-3)
zhlédnutí 192Před 28 dny
In this third episode of the NIST SP 800-53 Security Control explanations for CM. We reviewed the CM-3 Configuration Change Control as well as looking at simplifying what the control requirements are all about and how best to assess/test this control. Computer Security Resource Center csrc.nist.gov/publications The free way to help the channel grow is by subscribing using the link below: czcams...
Episode 2 BASELINE CONFIGURATION (CM-2)
zhlédnutí 1,9KPřed 7 měsíci
In this second episode of the NIST SP 800-53 Security Control explanations for CM. We reviewed the CM-2 Baseline Configuration as well as looking at simplifying what the control requirements are all about and how best to assess/test this control. Computer Security Resource Center csrc.nist.gov/publications The free way to help the channel grow is by subscribing using the link below: czcams.com/...
Episode 1 CONFIGURATION MGMT POLICY AND PROCEDURE (CM-1)
zhlédnutí 1,5KPřed 7 měsíci
In this second season first episode of the NIST SP 800-53 Security Control explanantions, We reviewed the CM-1 Configuration Management Policy and Procedure trying to simplify what the control requirements are all about and how best to assess/test this control. Computer Security Resource Center csrc.nist.gov/publications The free way to help the channel grow is by subscribing using the link bel...
TIPS on Conducting NIST 800-53 Rev4 to Rev5 Control GAP Analysis
zhlédnutí 2,5KPřed 9 měsíci
In this video, we will explore the critical process of conducting a gap analysis for NIST 800-53 controls, specifically focusing on the transition from Revision 4 to Revision 5. To ensure comprehensive coverage of this topic, we have divided this video into two parts. Welcome to Part 1, which you are currently viewing here on CZcams (as indicated by the platform). In this segment, we will delve...
Episode 19_PUBLICLY ACCESSIBLE CONTENT_ (AC-22)
zhlédnutí 1,3KPřed 11 měsíci
In this episode of the NIST SP 800-53 Rev 5 Security Control explanatory series, We reviewed the AC-22 PUBLICLY ACCESSIBLE CONTENT and then tried to simplify what the control requirements are all about, and how best to assess/test this control during the Security Control Assessment (SCA) process and self control assessment process in the Continuous Monitoring/On-Going Authorization phase of the...
Episode 18_INFORMATION SHARING_ (AC-21)
zhlédnutí 571Před 11 měsíci
In this episode of the NIST SP 800-53 Rev 5 Security Control explanatory series, We reviewed the AC-21 INFORMATION SHARING and then tried to simplify what the control requirements are all about, and how best to assess/test this control during the Security Control Assessment (SCA) process and self control assessment process in the Continuous Monitoring/On-Going Authorization phase of the RMF. Co...
Excerpt from the IMO Tech's RMF Training During Week 1
zhlédnutí 1,8KPřed rokem
In this video excerpt we discussed the Cybersecurity Objectives of Confidentiality, Integrity and Availability (C.I.A). Encryption Algorithm Link: hat.sh/ MD5 Download Link: www.winmd5.com/ The free way to help the channel grow is by subscribing using the link below: czcams.com/users/KamilSec?su... Patreon & Channel Support www.patreon.com/kamilSec?fan_landing=true Order your KamilSec (KS) Des...
Episode 17_USE OF EXTERNAL SYSTEMS_ (AC-20)
zhlédnutí 669Před rokem
In this episode of the NIST SP 800-53 Rev 5 Security Control explanatory series, We reviewed the AC-20 USE OF EXTERNAL SYSTEM and then tried to simplify what the control requirements are all about, and how best to assess/test this control during the Security Control Assessment (SCA) process and self control assessment process in the Continuous Monitoring/On-Going Authorization phase of the RMF....
Episode 16_ACCESS CONTROL FOR MOBILE DEVICES_ (AC-19)
zhlédnutí 594Před rokem
In this episode of the NIST SP 800-53 Rev 5 Security Control explanatory series, We reviewed the AC-19 ACCESS CONTROL FOR MOBILE DEVICES and then tried to simplify what the control requirements are all about, and how best to assess/test this control during the Security Control Assessment (SCA) process and self control assessment process in the Continuous Monitoring/On-Going Authorization phase ...
Episode 15_WIRELESS ACCESS_ (AC-18)
zhlédnutí 1,4KPřed rokem
In this episode of the NIST SP 800-53 Rev 5 Security Control explanatory series, We reviewed the AC-18 Wireless Access Control and then tried to simplify what the control requirements are all about, and how best to assess/test this control during the Security Control Assessment (SCA) process and self control assessment process in the Continuous Monitoring/On-Going Authorization phase of the RMF...
Episode 13_Permitted Actions Without Identification and Authentications_ (AC-14)
zhlédnutí 860Před rokem
Episode 13_Permitted Actions Without Identification and Authentications_ (AC-14)
Episode 12_Session Termination_ (AC-12)
zhlédnutí 1,1KPřed rokem
Episode 12_Session Termination_ (AC-12)
Episode 11_Device Lock Control_ (AC-11)
zhlédnutí 1,1KPřed rokem
Episode 11_Device Lock Control_ (AC-11)
Episode 10_Concurrent Session Control_ (AC-10)
zhlédnutí 1,2KPřed rokem
Episode 10_Concurrent Session Control_ (AC-10)
Episode 9_Previous Logon Notification_ (AC-9)
zhlédnutí 908Před rokem
Episode 9_Previous Logon Notification_ (AC-9)
Episode 8_SYSTEM USE NOTIFICATION_ (AC-8)
zhlédnutí 1,4KPřed rokem
Episode 8_SYSTEM USE NOTIFICATION_ (AC-8)
Episode 7_UNSUCCESSFUL LOGON ATTEMPTS_ (AC-7)
zhlédnutí 1,8KPřed rokem
Episode 7_UNSUCCESSFUL LOGON ATTEMPTS_ (AC-7)
Episode 5_SEPARATION OF DUTIES_ (AC-5)
zhlédnutí 1,7KPřed rokem
Episode 5_SEPARATION OF DUTIES_ (AC-5)
Episode 4_INFORMATION FLOW ENFORCEMENT (AC-4)
zhlédnutí 2,7KPřed rokem
Episode 4_INFORMATION FLOW ENFORCEMENT (AC-4)
Episode 1 ACCESS CONTROL POLICY AND PROCEDURE (AC-1)
zhlédnutí 7KPřed rokem
Episode 1 ACCESS CONTROL POLICY AND PROCEDURE (AC-1)
Information System Contingency Planning (ISCP) Overview (SP 800-34 Rev 1)
zhlédnutí 4,7KPřed rokem
Information System Contingency Planning (ISCP) Overview (SP 800-34 Rev 1)
Thanks 🙏. Very interesting !
You are very welcome
Thank you sir 🎉
You are very welcome Ida!
Great!
Least functionality. Waoooo. First time hearing this. You are simply the best sir. Be blessed.
Thanks a ton!
So well explained! its beyond amazing!
Glad it was helpful!
Thank you sir for always sharing your knowledge. 🙌🏾🙌🏾
Thanks Ida!
Great! Thank you Sir!
Most welcome!
Thanks sir.
Most welcome
Thanks for sharing this, very helpful. If you have a broadcast IP with a port (192.168.x.x: 0000 whose state shows CLOSE_WAIT on the netstat -ano). What does that mean?
This means the remote server side connection socket is closed and waiting on the local connection socket to close.
THANK YOU!!!
You're welcome!
Hello I need help to complete some policy templates for class. its due in a few days. Can I hire you please?
I would have loved to, however my tight schedule will not allow me.
Another nice one. Thank you Sir
Very welcome
Thanks Kamil!
You are welcome!
Thank you Kamil . God bless you.
You are welcome, Ameen 🙏
Thanks boss. 🙏
You're very welcome
Thank you for this new video. Please, can you do more videos on privacy when have some time. Thank you
okay
How do say it if they ask you at the interview. I hope you teach that in the future
I do have some interview prep videos for sale via my Patreon page...Link in the video description.
Thanks again 🙌🏾🙌🏾🙌🏾
Any time!
Always happy to listen to you Kamil 🎊 🎉
You're the best!
Thank you so much brother
Always welcome
Very precise
Glad it was helpful!
My understanding was if a federal agency does the CSO FedRAMP Authorization then this security package cannot be reused by other agencies. The other agency must redo CSO FedRAMP Authorization review
They just need to request the package for their internal review, and that should suffice
If you know, you know ! Real mentor. Great job. 👏🏾 Thanks 🙏
Thanks!
Good information!
Thanks!
Awesome!
Thanks!
Hello Kamil, Thank you for your videos, they are great and well-explained. Please continue the series and cover the remaining controls. I look forward to your explanations!
Thank you, I will. The 9 to 5 pressure is a bit much
good job mate
Thanks!
Great explanation!! Should all (a) to (l) as well as enhancements be documented as part of the account management plan?
Yes, as long as it is part of the control requirements.
This is great. I was just asked this in my interview yesterday 💯 great content bro and God bless you for sharing the knowledge
Glad it was helpful!
I love this video bro. Some great training. Always loves supporting a brother 💯🇬🇭
Big up massive to my subscribers!
How we can make a good Dashboard once we are done with the analysis, please do video on that too
I believe you can leverage excel capabilities
U are an excellent teacher thankx alot forndoing whatbu do best
It's my pleasure
Your content is amazing KamilSec, on point about email header analysis. By the way, consider doing a video on FilterBounce. I can testify it beats the pants off of Debounce, NeverBounce, ZeroBounce and all others. Plus, with the monthly free verification, it gets even better.
Hey there KamilSec, love your content on email headers and shady links. Great stuff! Have you ever looked into FilterBounce? It is the real deal when it comes to email verification. Unlike some other tools, it actually gives you spot-on results, with a bounce rate less than 1%. You should give it a shot.
Great information!
Glad it was helpful!
Well done brotherly!!!
Thanks!
Excellent content and presentation. I'm using this to prepare for an upcoming SCA interview. Thank you so much brother!
Best of luck!
Very informative!
Glad it was helpful!
what if u find a stablished connection in cmd but the pid found in cmd doesnt show on task manager?
It should, sometimes you just have to expand the rows
Very insightful
Glad it was helpful!
Awesome, very clear and concise, just got an Isso position, is there a way I can contact you for further assistance ❤
kaamilzak@gmail.com
How do you get the CVE to wrap in the formula bar?
ALT + Enter
l just found it . Thanks for your explanation
Glad it helped
❤
This is exactly what I needed. Thank you for this video!
You're so welcome!
Do you accept GI bill as payment for your class ?
No, we don't accept GI Bills
The Legend himself! Vote is for SC control family
CM has already won the vote...
Great hands on tutoria, keep it up. Please will it be possible to get the excel template of the POA&M?
You can get access to the spreadsheet from my Patreon page
Hi, I’ve 10k vuls from my tenable scan. I want to segregate os and non os vulnerabilities. Kamil / can someone help?
Nice. Good explanation but is there a better way of doing the sorting by plugins when you have hundreds of plugins and assets to analyze. What about using the Pivoting in excel, will it not do the samething?
Definitely, pivot table can help