1:51
CompTIA CySA+ CS0-003 Introduction
Hans IT Academy
1:53
Log ingestion, Time synchronization, and Logging levels - CompTIA CySA+ CS0-003 1.1
2:32
Operating system (OS) concepts - CompTIA CySA+ CS0-003 1.2
2:19
Infrastructure concepts - CompTIA CySA+ CS0-003 1.3
2:24
Network architecture - CompTIA CySA+ CS0-003 1.4
2:21
Identity and access management - CompTIA CySA+ CS0-003 1.5
1:58
Public key infrastructure - CompTIA CySA+ CS0-003 1.6
1:23
Secure sockets layer (SSL) inspection - CompTIA CySA+ CS0-003 1.7
1:17
Sensitive data protection - CompTIA CySA+ CS0-003 1.8
2:33
Network-related threat indicators- CompTIA CySA+ CS0-003 1.9
2:01
Host-related threat indicators- CompTIA CySA+ CS0-003 1.10
1:49
Application-related threat indicators- CompTIA CySA+ CS0-003 1.11
2:00
Other threat indicators- CompTIA CySA+ CS0-003 1.12
1:29
Packet capture tools - CompTIA CySA+ CS0-003 1.12
1:33
Log analysis/correlation tools - CompTIA CySA+ CS0-003 1.13
1:42
SIEM 101 - CompTIA CySA+ CS0-003 1.14
1:14
SOAR 101 - CompTIA CySA+ CS0-003 1.15
1:27
Endpoint security - CompTIA CySA+ CS0-003 1.16
1:43
DNS and IP reputation - CompTIA CySA+ CS0-003 1.17
1:05
File analysis - CompTIA CySA+ CS0-003 1.18
1:09
Sandboxing - CompTIA CySA+ CS0-003 1.19
1:18
Pattern recognition - CompTIA CySA+ CS0-003 1.20
Interpreting suspicious commands - CompTIA CySA+ CS0-003 1.21
2:03
Email header analysis - CompTIA CySA+ CS0-003 1.22
Hashing/File analysis - CompTIA CySA+ CS0-003 1.23
1:44
User behavior analysis/impossible travel - CompTIA CySA+ CS0-003 1.24
2:25
JSON File - CompTIA CySA+ CS0-003 1.25
2:06
JSON injection - CompTIA CySA+ CS0-003 1.26
XML File - CompTIA CySA+ CS0-003 1.27
1:19
XML external entity injection - CompTIA CySA+ CS0-003 1.28
2:48
Machine learning overview - CompTIA CySA+ CS0-003 1.29
1:30
Python in cybersecurity - CompTIA CySA+ CS0-003 1.30
3:19
Regular expression (Regex) - CompTIA CySA+ CS0-003 1.31
1:02
Shell script - CompTIA CySA+ CS0-003 1.32
1:36
Powershell - CompTIA CySA+ CS0-003 1.33
Advanced persistent threat(APT) - CompTIA CySA+ CS0-003 1.34
1:00
Hacktivists - CompTIA CySA+ CS0-003 1.35
0:56
Script kiddie - CompTIA CySA+ CS0-003 1.36
Insider threats - CompTIA CySA+ CS0-003 1.37
Tactics, techniques, andprocedures (TTP) - CompTIA CySA+ CS0-003 1.38
1:21
Confidence levels - CompTIA CySA+ CS0-003 1.39
1:28
Open and closed intelligence - CompTIA CySA+ CS0-003 1.40
CERT and CSIRT - CompTIA CySA+ CS0-003 1.41
1:24
Incident response - CompTIA CySA+ CS0-003 1.42
Vulnerability management - CompTIA CySA+ CS0-003 1.43
2:15
Vulnerability scan types - CompTIA CySA+ CS0-003 1.44
2:43
Risk management - CompTIA CySA+ CS0-003 1.45
1:13
Risk analysis methods - CompTIA CySA+ CS0-003 1.46
Supplychain - CompTIA CySA+ CS0-003 1.47
Enterprise security architecture - CompTIA CySA+ CS0-003 1.48
2:12
Asset discovery - CompTIA CySA+ CS0-003 1.49
Indicator of compromise - CompTIA CySA+ CS0-003 1.50
1:10
Single pane of glass - CompTIA CySA+ CS0-003 1.51
Static vs dynamic - CompTIA CySA+ CS0-003 2.1
0:54
Nikto - CompTIA CySA+ CS0-003 2.2
AngryIP - CompTIA CySA+ CS0-003 2.3
0:57
Arachni - CompTIA CySA+ CS0-003 2.4
Burp - CompTIA CySA+ CS0-003 2.5
1:20
FOCA - CompTIA CySA+ CS0-003 2.6
1:38
Maltego - CompTIA CySA+ CS0-003 2.7
Zap - CompTIA CySA+ CS0-003 2.8
1:06
Single pane of glass - CompTIA CySA+ CS0-003 2.9
OpenVAS - CompTIA CySA+ CS0-003 2.9
Nessus - CompTIA CySA+ CS0-003 2.13
1:52
Critical infrastructure - CompTIA CySA+ CS0-003 2.14
1:03
Immunity debugger - CompTIA CySA+ CS0-003 2.15
0:46
GNU debugger - CompTIA CySA+ CS0-003 2.16
1:16
Nmap - CompTIA CySA+ CS0-003 2.17
Metasploit framework - CompTIA CySA+ CS0-003 2.18
0:55
Recon-ng - CompTIA CySA+ CS0-003 2.19
1:07
Scout Suite - CompTIA CySA+ CS0-003 2.20
Prowler - CompTIA CySA+ CS0-003 2.21
0:53
Pacu - CompTIA CySA+ CS0-003 2.22
2:17
CVSS - CompTIA CySA+ CS0-003 2.23
0:58
Confusion matrix - CompTIA CySA+ CS0-003 2.24
0:52
Contextual understanding - CompTIA CySA+ CS0-003 2.25
Exploitability/Weaponization - CompTIA CySA+ CS0-003 2.26
1:32
Asset Value - CompTIA CySA+ CS0-003 2.27
Zero day - CompTIA CySA+ CS0-003 2.28
Reflected vs persistent cross-site scripting - CompTIA CySA+ CS0-003 2.29
Overflow vulnerabilities - CompTIA CySA+ CS0-003 2.30
Data poisoning - CompTIA CySA+ CS0-003 2.31
Broken access control - CompTIA CySA+ CS0-003 2.32
1:04
Cryptographic failures - CompTIA CySA+ CS0-003 2.33
Injection flaws - CompTIA CySA+ CS0-003 2.34
cross-site request forgery - CompTIA CySA+ CS0-003 2.35
directory traversal attack - CompTIA CySA+ CS0-003 2.36
Insecure design - CompTIA CySA+ CS0-003 2.37
Security misconfiguration - CompTIA CySA+ CS0-003 2.38
end-of-life or outdated components - CompTIA CySA+ CS0-003 2.39
Identification and authentication failures - CompTIA CySA+ CS0-003 2.40
Server-side request forgery - CompTIA CySA+ CS0-003 2.41
1:11
Remote code execution - CompTIA CySA+ CS0-003 2.42
1:08
Privilege escalation - CompTIA CySA+ CS0-003 2.43
LFI and RFI - CompTIA CySA+ CS0-003 2.44
1:59
Different security controls - CompTIA CySA+ CS0-003 2.45
Patching and configuration management - CompTIA CySA+ CS0-003 2.12
Maintenance windows - CompTIA CySA+ CS0-003 2.11
Exception - CompTIA CySA+ CS0-003 2.10
5:11
Attack frameworks: MITRE ATT&CK/Diamond model/Cyber Kill Chain
Patching and configurationmanagement - CompTIA CySA+ CS0-003 2.46
1:50
Edge discovery - CompTIA CySA+ CS0-003 2.47
Passive discovery - CompTIA CySA+ CS0-003 2.48
Security controls testing - CompTIA CySA+ CS0-003 2.49
1:34
Penetration testing and adversary emulation - CompTIA CySA+ CS0-003 2.50
Bug bounty - CompTIA CySA+ CS0-003 2.51
Attack surface reduction - CompTIA CySA+ CS0-003 2.52