View
Tube
search
Sign in
Sign up
Subscriptions
Hans IT Academy
CompTIA CySA+ CS0-003 Certification Course
254,375 views
107 items
Last updated on Oct 22, 2023
public playlist
CompTIA CySA+ CS0-003 Certification Course
Hans IT Academy
1:50
CompTIA CySA+ CS0-003 Introduction
0 views
0
Hans IT Academy
1:53
Log ingestion, Time synchronization, and Logging levels - CompTIA CySA+ CS0-003 1.1
0 views
0
Hans IT Academy
2:32
Operating system (OS) concepts - CompTIA CySA+ CS0-003 1.2
0 views
0
Hans IT Academy
2:19
Infrastructure concepts - CompTIA CySA+ CS0-003 1.3
0 views
0
Hans IT Academy
2:24
Network architecture - CompTIA CySA+ CS0-003 1.4
0 views
0
Hans IT Academy
2:21
Identity and access management - CompTIA CySA+ CS0-003 1.5
0 views
0
Hans IT Academy
1:58
Public key infrastructure - CompTIA CySA+ CS0-003 1.6
0 views
0
Hans IT Academy
1:23
Secure sockets layer (SSL) inspection - CompTIA CySA+ CS0-003 1.7
0 views
0
Hans IT Academy
1:17
Sensitive data protection - CompTIA CySA+ CS0-003 1.8
0 views
0
Hans IT Academy
2:33
Network-related threat indicators- CompTIA CySA+ CS0-003 1.9
0 views
0
Hans IT Academy
2:01
Host-related threat indicators- CompTIA CySA+ CS0-003 1.10
0 views
0
Hans IT Academy
1:49
Application-related threat indicators- CompTIA CySA+ CS0-003 1.11
0 views
0
Hans IT Academy
2:00
Other threat indicators- CompTIA CySA+ CS0-003 1.12
0 views
0
Hans IT Academy
1:29
Packet capture tools - CompTIA CySA+ CS0-003 1.12
0 views
0
Hans IT Academy
1:33
Log analysis/correlation tools - CompTIA CySA+ CS0-003 1.13
0 views
0
Hans IT Academy
1:42
SIEM 101 - CompTIA CySA+ CS0-003 1.14
0 views
0
Hans IT Academy
1:14
SOAR 101 - CompTIA CySA+ CS0-003 1.15
0 views
0
Hans IT Academy
1:27
Endpoint security - CompTIA CySA+ CS0-003 1.16
0 views
0
Hans IT Academy
1:43
DNS and IP reputation - CompTIA CySA+ CS0-003 1.17
0 views
0
Hans IT Academy
1:05
File analysis - CompTIA CySA+ CS0-003 1.18
0 views
0
Hans IT Academy
1:09
Sandboxing - CompTIA CySA+ CS0-003 1.19
0 views
0
Hans IT Academy
1:18
Pattern recognition - CompTIA CySA+ CS0-003 1.20
0 views
0
Hans IT Academy
1:27
Interpreting suspicious commands - CompTIA CySA+ CS0-003 1.21
0 views
0
Hans IT Academy
2:03
Email header analysis - CompTIA CySA+ CS0-003 1.22
0 views
0
Hans IT Academy
2:01
Hashing/File analysis - CompTIA CySA+ CS0-003 1.23
0 views
0
Hans IT Academy
1:44
User behavior analysis/impossible travel - CompTIA CySA+ CS0-003 1.24
0 views
0
Hans IT Academy
2:25
JSON File - CompTIA CySA+ CS0-003 1.25
0 views
0
Hans IT Academy
2:06
JSON injection - CompTIA CySA+ CS0-003 1.26
0 views
0
Hans IT Academy
1:51
XML File - CompTIA CySA+ CS0-003 1.27
0 views
0
Hans IT Academy
1:19
XML external entity injection - CompTIA CySA+ CS0-003 1.28
0 views
0
Hans IT Academy
2:48
Machine learning overview - CompTIA CySA+ CS0-003 1.29
0 views
0
Hans IT Academy
1:30
Python in cybersecurity - CompTIA CySA+ CS0-003 1.30
0 views
0
Hans IT Academy
3:19
Regular expression (Regex) - CompTIA CySA+ CS0-003 1.31
0 views
0
Hans IT Academy
1:02
Shell script - CompTIA CySA+ CS0-003 1.32
0 views
0
Hans IT Academy
1:36
Powershell - CompTIA CySA+ CS0-003 1.33
0 views
0
Hans IT Academy
1:36
Advanced persistent threat(APT) - CompTIA CySA+ CS0-003 1.34
0 views
0
Hans IT Academy
1:00
Hacktivists - CompTIA CySA+ CS0-003 1.35
0 views
0
Hans IT Academy
0:56
Script kiddie - CompTIA CySA+ CS0-003 1.36
0 views
0
Hans IT Academy
1:53
Insider threats - CompTIA CySA+ CS0-003 1.37
0 views
0
Hans IT Academy
1:19
Tactics, techniques, andprocedures (TTP) - CompTIA CySA+ CS0-003 1.38
0 views
0
Hans IT Academy
1:21
Confidence levels - CompTIA CySA+ CS0-003 1.39
0 views
0
Hans IT Academy
1:28
Open and closed intelligence - CompTIA CySA+ CS0-003 1.40
0 views
0
Hans IT Academy
1:14
CERT and CSIRT - CompTIA CySA+ CS0-003 1.41
0 views
0
Hans IT Academy
1:24
Incident response - CompTIA CySA+ CS0-003 1.42
0 views
0
Hans IT Academy
1:42
Vulnerability management - CompTIA CySA+ CS0-003 1.43
0 views
0
Hans IT Academy
2:15
Vulnerability scan types - CompTIA CySA+ CS0-003 1.44
0 views
0
Hans IT Academy
2:43
Risk management - CompTIA CySA+ CS0-003 1.45
0 views
0
Hans IT Academy
1:13
Risk analysis methods - CompTIA CySA+ CS0-003 1.46
0 views
0
Hans IT Academy
1:13
Supplychain - CompTIA CySA+ CS0-003 1.47
0 views
0
Hans IT Academy
1:00
Enterprise security architecture - CompTIA CySA+ CS0-003 1.48
0 views
0
Hans IT Academy
2:12
Asset discovery - CompTIA CySA+ CS0-003 1.49
0 views
0
Hans IT Academy
1:51
Indicator of compromise - CompTIA CySA+ CS0-003 1.50
0 views
0
Hans IT Academy
1:10
Single pane of glass - CompTIA CySA+ CS0-003 1.51
0 views
0
Hans IT Academy
1:43
Static vs dynamic - CompTIA CySA+ CS0-003 2.1
0 views
0
Hans IT Academy
0:54
Nikto - CompTIA CySA+ CS0-003 2.2
0 views
0
Hans IT Academy
1:05
AngryIP - CompTIA CySA+ CS0-003 2.3
0 views
0
Hans IT Academy
0:57
Arachni - CompTIA CySA+ CS0-003 2.4
0 views
0
Hans IT Academy
1:09
Burp - CompTIA CySA+ CS0-003 2.5
0 views
0
Hans IT Academy
1:20
FOCA - CompTIA CySA+ CS0-003 2.6
0 views
0
Hans IT Academy
1:38
Maltego - CompTIA CySA+ CS0-003 2.7
0 views
0
Hans IT Academy
0:54
Zap - CompTIA CySA+ CS0-003 2.8
0 views
0
Hans IT Academy
1:06
Single pane of glass - CompTIA CySA+ CS0-003 2.9
0 views
0
Hans IT Academy
1:14
OpenVAS - CompTIA CySA+ CS0-003 2.9
0 views
0
Hans IT Academy
1:19
Nessus - CompTIA CySA+ CS0-003 2.13
0 views
0
Hans IT Academy
1:52
Critical infrastructure - CompTIA CySA+ CS0-003 2.14
0 views
0
Hans IT Academy
1:03
Immunity debugger - CompTIA CySA+ CS0-003 2.15
0 views
0
Hans IT Academy
0:46
GNU debugger - CompTIA CySA+ CS0-003 2.16
0 views
0
Hans IT Academy
1:16
Nmap - CompTIA CySA+ CS0-003 2.17
0 views
0
Hans IT Academy
1:29
Metasploit framework - CompTIA CySA+ CS0-003 2.18
0 views
0
Hans IT Academy
0:55
Recon-ng - CompTIA CySA+ CS0-003 2.19
0 views
0
Hans IT Academy
1:07
Scout Suite - CompTIA CySA+ CS0-003 2.20
0 views
0
Hans IT Academy
0:46
Prowler - CompTIA CySA+ CS0-003 2.21
0 views
0
Hans IT Academy
0:53
Pacu - CompTIA CySA+ CS0-003 2.22
0 views
0
Hans IT Academy
2:17
CVSS - CompTIA CySA+ CS0-003 2.23
0 views
0
Hans IT Academy
0:58
Confusion matrix - CompTIA CySA+ CS0-003 2.24
0 views
0
Hans IT Academy
0:52
Contextual understanding - CompTIA CySA+ CS0-003 2.25
0 views
0
Hans IT Academy
1:33
Exploitability/Weaponization - CompTIA CySA+ CS0-003 2.26
0 views
0
Hans IT Academy
1:32
Asset Value - CompTIA CySA+ CS0-003 2.27
0 views
0
Hans IT Academy
1:09
Zero day - CompTIA CySA+ CS0-003 2.28
0 views
0
Hans IT Academy
1:13
Reflected vs persistent cross-site scripting - CompTIA CySA+ CS0-003 2.29
0 views
0
Hans IT Academy
2:21
Overflow vulnerabilities - CompTIA CySA+ CS0-003 2.30
0 views
0
Hans IT Academy
1:19
Data poisoning - CompTIA CySA+ CS0-003 2.31
0 views
0
Hans IT Academy
1:10
Broken access control - CompTIA CySA+ CS0-003 2.32
0 views
0
Hans IT Academy
1:04
Cryptographic failures - CompTIA CySA+ CS0-003 2.33
0 views
0
Hans IT Academy
1:09
Injection flaws - CompTIA CySA+ CS0-003 2.34
0 views
0
Hans IT Academy
1:09
cross-site request forgery - CompTIA CySA+ CS0-003 2.35
0 views
0
Hans IT Academy
1:04
directory traversal attack - CompTIA CySA+ CS0-003 2.36
0 views
0
Hans IT Academy
0:58
Insecure design - CompTIA CySA+ CS0-003 2.37
0 views
0
Hans IT Academy
1:05
Security misconfiguration - CompTIA CySA+ CS0-003 2.38
0 views
0
Hans IT Academy
1:05
end-of-life or outdated components - CompTIA CySA+ CS0-003 2.39
0 views
0
Hans IT Academy
1:02
Identification and authentication failures - CompTIA CySA+ CS0-003 2.40
0 views
0
Hans IT Academy
1:05
Server-side request forgery - CompTIA CySA+ CS0-003 2.41
0 views
0
Hans IT Academy
1:11
Remote code execution - CompTIA CySA+ CS0-003 2.42
0 views
0
Hans IT Academy
1:08
Privilege escalation - CompTIA CySA+ CS0-003 2.43
0 views
0
Hans IT Academy
1:27
LFI and RFI - CompTIA CySA+ CS0-003 2.44
0 views
0
Hans IT Academy
1:59
Different security controls - CompTIA CySA+ CS0-003 2.45
0 views
0
Hans IT Academy
1:42
Patching and configuration management - CompTIA CySA+ CS0-003 2.12
0 views
0
Hans IT Academy
1:08
Maintenance windows - CompTIA CySA+ CS0-003 2.11
0 views
0
Hans IT Academy
1:09
Exception - CompTIA CySA+ CS0-003 2.10
0 views
0
Hans IT Academy
5:11
Attack frameworks: MITRE ATT&CK/Diamond model/Cyber Kill Chain
0 views
0