Channel Avatar

Hemang Doshi @UCrP-kcQ77iiQGTVLJYs8miQ@youtube.com

None subscribers - no pronouns set

CISA Exam updates and Study Material


01:29
Network Time Protocol (NTP) | Ethical Hacking | CEH Exam Preparation 2024 | Hemang Doshi
01:23
What is Censys Tool | Ethical Hacking | CEH Exam Preparation 2024 | Hemang Doshi
02:07
Banner Grabbing | Ethical Hacking | CEH Exam Preparation 2024 | Hemang Doshi
09:11
Nmap (Network Mapper) | Ethical Hacking | CEH Exam Preparation 2024 | Hemang Doshi
10:24
Domain Name System (DNS) | Ethical Hacking | CEH Exam Preparation 2024 | Hemang Doshi
02:15
Understanding NetBIOS (Network Basic Input Output System) | CEH Exam Preparation 2024 | Hemang Doshi
02:51
What is DHCP (Dynamic Host Configuration Protocol) | CEH Exam Preparation 2024 | Hemang Doshi
02:36
Time to Live (TTL) | Ethical Hacking | CEH Exam Preparation 2024 | Hemang Doshi
05:30
Understanding Ports | Ethical Hacking | CEH Exam Preparation 2024 | Hemang Doshi
06:19
Transmission Control Protocol (TCP) | Ethical Hacking | CEH Exam Preparation 2024 | Hemang Doshi
04:54
Explained ICMP | Ping | HPing | Ethical Hacking | CEH Exam Preparation 2024 | Hemang Doshi
05:03
Address Resolution Protocol (ARP) | Ethical Hacking | CEH Exam Preparation 2024 | Hemang Doshi
08:08
OSI Layers | Ethical Hacking | CEH Exam Preparation 2024 | Hemang Doshi
01:49
INFOGA Tool | Ethical Hacking | CEH Exam Preparation 2024 | Hemang Doshi
02:35
Three Tier Architecture | Ethical Hacking | CEH Exam Preparation 2024 | Hemang Doshi
01:45
Understanding Maltego Tool | Ethical Hacking | CEH Exam Preparation 2024 | Hemang Doshi
04:08
Understanding Threat Intelligence | Ethical Hacking | CEH Exam Preparation 2024 | Hemang Doshi
03:04
What is Regional Internet Registry | Ethical Hacking | CEH Exam Preparation 2024 | Hemang Doshi
01:08
What is WHOIS Query Search | Ethical Hacking | | Hemagn Doshi | CEH Exam Preparation 2024
06:22
What is FOOTPRINTING & RECONNAISSANCE in Ethical Hacking | CEH Exam Preparation 2024 | Hemang Doshi
00:54
What is BUG BOUNTY | CEH Exam Preparation 2024 | HEMANG DOSHI
05:25
5 Phases of Ethical Hacking Methodology | CEH Exam Preparation 2024 | Hemang Doshi
02:20
Understanding the CIA Triad | CEH Exam Preparation 2024 | Hemang Doshi
05:12
Types of HACKERS | White Hat | Black Hat | Grey Hat | Red Hat | CEH Exam Preparation 2024
07:35
GDPR - Article 20: Right to data portability
04:11
GDPR - Article 19: Notification obligation
07:23
GDPR - Article 18: Right to restriction of processing
08:35
GDPR - Article 17: Right to erasure (‘right to be forgotten’)
02:54
GDPR - Article 16: Right to rectification
08:07
GDPR - Article 15 - Right of Access by Data Subject
12:15
GDPR - Article 14: Information to be provided where data have not been obtained from data subject
11:12
GDPR - Article 13: Information to be provided where data are collected from the data subject
02:25
GDPR - Article 11: Processing which does not require identification
03:20
GDPR - Article 10: Processing of personal data relating to criminal convictions and offences
06:53
GDPR - Article 9: Processing of special categories of personal data
05:53
GDPR - Article 8: Conditions applicable to child’s consent
10:08
GDPR - Article 7: Conditions for consent
09:47
Article 5 - Principles relating to processing of personal data
07:38
GDPR - Article 4 - Definitions
13:02
GDPR - Article 3 - Territorial scope
06:54
GDPR - Article 2 - Material scope
08:15
GDPR - Article 1: Subject-matter and objectives
02:20
GDPR - Introduction
01:00
AISA Certification - Become a Certified IT Auditor | GISA Council | For Graduate | No Experience Req
00:46
How to become IT auditor | No Experience Req. | GTU University | Practical IT Audit Training
02:08:17
Associate Information System Auditors Course (AISA)- Demo Lecture Hemang Doshi
05:33
JOIN AISA (ASSOCIATE INFORMATION SYSTEMS AUDITOR) | BECOME IT AUDITOR | DEMO LECTURE | HEMANG DOSHI
01:15
How to become IT Auditor | Join AISA (Associate Information System Auditor) | Ganpat University
00:55
Associate Information System Auditor
04:14
Lecture 14 - Step 3.9 - Auditing Restoration Test
03:32
Lecture 13 - Step 3.8 - Auditing Encryption Algorithm
03:08
Lecture 12 - Step 3.7 - Auditing Password Encryption
01:25
Lecture 11 - Step 3.6 - Auditing Secured Configuration Documents
03:28
Lecture 10 - Step 3.5 - Auditing Privilege Identification Management (PIM)
03:47
Lecture 9 - Step 3.4 - Auditing Backup Location
00:50
Lecture 5 - Step 3 - Auditing controls related to Database.
05:27
Lecture 8 - Step 3.3 - Auditing Operating Systems of database.
02:43
Lecture 7 - Step 3.2 - Auditing Database Categorization
01:58
Lecture 6 - Step 3.1 - Auditing Database Ownership
33:11
Lecture 4 - Step 2 - Auditing controls related to Applications