elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
1. The CIA Triad.mp4 23M
2. Comparing Security Deployments Part 1_2.mp4 15M
3. Comparing Security Deployments Part 2_2.mp4 10M
4. Describing Security Terms Part 1_2.mp4 12M
5. Describing Security Terms Part 2_2.mp4 24M
6. Comparing Security Concepts_2.mp4 14M
7. The Principles of Defense In-Depth Strategy_2.mp4 16M
8. Comparing Access Control Models_2.mp4 12M
9. Common Vulnerability Scoring System_2.mp4 19M
10. The 5 Tuple Isolation Approach and Data Visibility_2.mp4 9.2M
11. Intro to Vulnerability and Attack Surfaces.mp4 11M
12. On-Prem and Cloud-Based Vulnerabilities.mp4 79M
13. Zero-day Attacks13. Zero-day Attacks.mp4 39M
14. Weak Configurations.mp4 92M
15. Third-Party Risks.mp4 18M
16. Lack of Patch Management.mp4 83M
17. Vulnerability Management.mp4 73M
18. Quiz and Review.mp4 47M
19. Intro to Data Types for Security Monitoring.mp4 8.4M
20. TCPdump Data.mp4 121M
21. NetFlow Data.mp4 47M
22. Data from Stateful Firewalls.mp4 80M
23. Data from Next-gen Firewalls.mp4 52M
24. IPS and IDS Data.mp4 34M
25. Data from Security Appliances.mp4 27M
26. TOR Overview.mp4 68M
27. Installing Tails.mp4 33M
28. Steganography.mp4 38M
29. HTTPS.mp4 78M
30. Tunneling.mp4 55M
31. NAT-PAT.mp4 81M
32. Introduction to Network Attacks.mp4 4.6M
33. Wireless Attacks.mp4 45M
34. In-line or On-path Attacks.mp4 49M
35. Layer 2 attacks.mp4 62M
36. Domain name system (DNS).mp4 44M
37. Distributed denial-of-service (DDoS).mp4 33M
38. Malicious code or script execution.mp4 15M
39. Remediation Options.mp4 42M
40. Review Quiz.mp4 48M
41. Introduction to Application Attacks.mp4 4.4M
42. Injection Attacks.mp4 24M
43. Cross Site Scripting.mp4 15M
44. Poorly Written Apps.mp4 41M
45. Overflow Attack Demo.mp4 39M
46. Poorly Written App Attack.mp4 22M
47. Impersonation.mp4 23M
48. Error Handling Attack.mp4 29M
49. Additional Application Attacks.mp4 31M
50. Password Recovery Fail.mp4 26M
51. Review Quiz.mp4 38M
52. Introduction to Social Engineering.mp4 16M
53. Phishing and Related Attacks.mp4 44M
54. Low Tech Attacks.mp4 42M
55. Why Social Engineering Works.mp4 31M
56. The Top Social Engineering Tool.mp4 45M
57. Identifying a Phishing Email.mp4 62M
58. Social Engineering Toolkit.mp4 45M
59. Review Quiz.mp4 33M
60. Introduction to Cyber Attack Techniques.mp4 3.2M
61. Malware.mp4 64M
62. Password Attacks.mp4 47M
63. Password Attack Example.mp4 61M
64. Cyber Physical Components.mp4 39M
65. Adversarial AI.mp4 27M
66. Supply Chain Security.mp4 13M
67. Cryptographic Attacks.mp4 28M
68. Review Quiz.mp4 49M
69. Intro to Digital Certificates and the PKI.mp4 7.2M
70. Symmetrical vs Asymmetrical Encryption.mp4 91M
71. Digital Certificates Overview.mp4 35M
72. Digital Signatures.mp4 87M
73. Creating an HTTPS Session Key.mp4 51M
74. Public Key Infrastructure.mp4 65M
75. Quiz and Review.mp4 28M
76. Endpoint Security Monitoring Technologies.mp4 29M
77. Identifying the Role of Attribution.mp4 28M
78. Comparing Disk Images.mp4 12M
79. Interpreting Logs.mp4 41M
80. Analyzing Sandbox Reports.mp4 15M
81. Windows Processes and Services.mp4 24M
82. Windows Memory and WMI.mp4 9.7M
83. Exploring the Windows Registry.mp4 21M
84. Windows Networking.mp4 20M
85. Windows File Systems.mp4 13M
86. Exploring Linux Processes.mp4 13M
87. Linux File Permissions.mp4 16M
88. Linux Sudo and Networking.mp4 16M
89. Introduction to Network Intrusion Analysis.mp4 7.0M
90. Data Sources.mp4 47M
91. Event Severity.mp4 34M
92. PCAP analysis.mp4 78M
93. Extract files from PCAP.mp4 64M
94. Regular Expressions.mp4 45M
95. Information Security Management Concepts.mp4 30M
96. Discussing Elements of an Incident Response (IR) Plan.mp4 11M
97. Defining the Incident Response Process.mp4 21M
98. Mapping Stakeholders to Incident Response (IR) Categories.mp4 7.9M
99. Exploring the Forensic Evidence Collection Process.mp4 16M
100. Server Profiling.mp4 26M
101. Network Profiling.mp4 15M
102. Identifying Protected Network Data.mp4 14M
103. The Cyber Kill Chain.mp4 12M
104. SOC Metrics And Scope Analysis.mp4 12M