Channel Avatar

Hans IT Academy @UCHESFahN78x8_OexgDJr_pw@youtube.com

4.41K subscribers - no pronouns set

Welcome to your ultimate destination for IT exam preparation


01:23
Attack surface reduction - CompTIA CySA+ CS0-003 2.52
01:05
Bug bounty - CompTIA CySA+ CS0-003 2.51
01:34
Penetration testing and adversary emulation - CompTIA CySA+ CS0-003 2.50
01:07
Security controls testing - CompTIA CySA+ CS0-003 2.49
01:44
Passive discovery - CompTIA CySA+ CS0-003 2.48
01:50
Edge discovery - CompTIA CySA+ CS0-003 2.47
01:58
Patching and configurationmanagement - CompTIA CySA+ CS0-003 2.46
09:22
Normalization (1NF, 2NF, 3NF, BCNF) overview - Database management 101
04:26
Relational diagram/model overview - Database management 101
05:31
UML (Unified Modeling Language) diagram/model simply explained - Database management 101
06:37
EER (enhanced entity relationship) diagram/model simply explained - Database management 101
12:29
ER (entity relationship) diagram/model simply explained - Database management 101
13:21
Conceptual models explained (ER, EER, and UML Models) - Database management 101
02:02
Database management overview - Database management 101
01:59
Different security controls - CompTIA CySA+ CS0-003 2.45
01:27
LFI and RFI - CompTIA CySA+ CS0-003 2.44
01:08
Privilege escalation - CompTIA CySA+ CS0-003 2.43
01:11
Remote code execution - CompTIA CySA+ CS0-003 2.42
01:05
Server-side request forgery - CompTIA CySA+ CS0-003 2.41
01:02
Identification and authentication failures - CompTIA CySA+ CS0-003 2.40
01:05
end-of-life or outdated components - CompTIA CySA+ CS0-003 2.39
01:05
Security misconfiguration - CompTIA CySA+ CS0-003 2.38
00:58
Insecure design - CompTIA CySA+ CS0-003 2.37
01:04
directory traversal attack - CompTIA CySA+ CS0-003 2.36
01:09
cross-site request forgery - CompTIA CySA+ CS0-003 2.35
01:09
Injection flaws - CompTIA CySA+ CS0-003 2.34
01:04
Cryptographic failures - CompTIA CySA+ CS0-003 2.33
01:10
Broken access control - CompTIA CySA+ CS0-003 2.32
01:19
Data poisoning - CompTIA CySA+ CS0-003 2.31
02:21
Overflow vulnerabilities - CompTIA CySA+ CS0-003 2.30
01:09
Zero day - CompTIA CySA+ CS0-003 2.28
01:13
Reflected vs persistent cross-site scripting - CompTIA CySA+ CS0-003 2.29
01:32
Asset Value - CompTIA CySA+ CS0-003 2.27
01:33
Exploitability/Weaponization - CompTIA CySA+ CS0-003 2.26
00:52
Contextual understanding - CompTIA CySA+ CS0-003 2.25
00:58
Confusion matrix - CompTIA CySA+ CS0-003 2.24
02:17
CVSS - CompTIA CySA+ CS0-003 2.23
00:53
Pacu - CompTIA CySA+ CS0-003 2.22
00:46
Prowler - CompTIA CySA+ CS0-003 2.21
01:07
Scout Suite - CompTIA CySA+ CS0-003 2.20
00:55
Recon-ng - CompTIA CySA+ CS0-003 2.19
01:29
Metasploit framework - CompTIA CySA+ CS0-003 2.18
01:16
Nmap - CompTIA CySA+ CS0-003 2.17
00:46
GNU debugger - CompTIA CySA+ CS0-003 2.16
01:03
Immunity debugger - CompTIA CySA+ CS0-003 2.15
01:52
Critical infrastructure - CompTIA CySA+ CS0-003 2.14
01:19
Nessus - CompTIA CySA+ CS0-003 2.13
01:42
Patching and configuration management - CompTIA CySA+ CS0-003 2.12
01:08
Maintenance windows - CompTIA CySA+ CS0-003 2.11
01:09
Exception - CompTIA CySA+ CS0-003 2.10
01:14
OpenVAS - CompTIA CySA+ CS0-003 2.9
01:06
Single pane of glass - CompTIA CySA+ CS0-003 2.9
00:54
Zap - CompTIA CySA+ CS0-003 2.8
01:38
Maltego - CompTIA CySA+ CS0-003 2.7
01:20
FOCA - CompTIA CySA+ CS0-003 2.6
01:09
Burp - CompTIA CySA+ CS0-003 2.5
00:57
Arachni - CompTIA CySA+ CS0-003 2.4
01:05
AngryIP - CompTIA CySA+ CS0-003 2.3
00:54
Nikto - CompTIA CySA+ CS0-003 2.2
01:43
Static vs dynamic - CompTIA CySA+ CS0-003 2.1