elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Last modified Size
Parent Directory -
1. The CIA Triad.mp4 2024-02-14 17:33 23M
2. Comparing Security Deployments Part 1_2.mp4 2024-02-14 17:35 15M
3. Comparing Security Deployments Part 2_2.mp4 2024-02-14 17:33 10M
4. Describing Security Terms Part 1_2.mp4 2024-02-14 17:30 12M
5. Describing Security Terms Part 2_2.mp4 2024-02-14 17:31 24M
6. Comparing Security Concepts_2.mp4 2024-02-14 17:35 14M
7. The Principles of Defense In-Depth Strategy_2.mp4 2024-02-14 17:28 16M
8. Comparing Access Control Models_2.mp4 2024-02-14 17:28 12M
9. Common Vulnerability Scoring System_2.mp4 2024-02-14 17:29 19M
10. The 5 Tuple Isolation Approach and Data Visibility_2.mp4 2024-02-14 17:34 9.2M
11. Intro to Vulnerability and Attack Surfaces.mp4 2024-02-14 17:32 11M
12. On-Prem and Cloud-Based Vulnerabilities.mp4 2024-02-14 17:34 79M
13. Zero-day Attacks13. Zero-day Attacks.mp4 2024-02-14 17:35 39M
14. Weak Configurations.mp4 2024-02-14 17:29 92M
15. Third-Party Risks.mp4 2024-02-14 17:32 18M
16. Lack of Patch Management.mp4 2024-02-14 17:35 83M
17. Vulnerability Management.mp4 2024-02-14 17:35 73M
18. Quiz and Review.mp4 2024-02-14 17:34 47M
19. Intro to Data Types for Security Monitoring.mp4 2024-02-14 17:34 8.4M
20. TCPdump Data.mp4 2024-02-14 17:35 121M
21. NetFlow Data.mp4 2024-02-14 17:34 47M
22. Data from Stateful Firewalls.mp4 2024-02-14 17:30 80M
23. Data from Next-gen Firewalls.mp4 2024-02-14 17:34 52M
24. IPS and IDS Data.mp4 2024-02-14 17:33 34M
25. Data from Security Appliances.mp4 2024-02-14 17:32 27M
26. TOR Overview.mp4 2024-02-14 17:35 68M
27. Installing Tails.mp4 2024-02-14 17:29 33M
28. Steganography.mp4 2024-02-14 17:33 38M
29. HTTPS.mp4 2024-02-14 17:33 78M
30. Tunneling.mp4 2024-02-14 17:33 55M
31. NAT-PAT.mp4 2024-02-14 17:34 81M
32. Introduction to Network Attacks.mp4 2024-02-14 17:33 4.6M
33. Wireless Attacks.mp4 2024-02-14 17:29 45M
34. In-line or On-path Attacks.mp4 2024-02-14 17:33 49M
35. Layer 2 attacks.mp4 2024-02-14 17:33 62M
36. Domain name system (DNS).mp4 2024-02-14 17:33 44M
37. Distributed denial-of-service (DDoS).mp4 2024-02-14 17:31 33M
38. Malicious code or script execution.mp4 2024-02-14 17:31 15M
39. Remediation Options.mp4 2024-02-14 17:32 42M
40. Review Quiz.mp4 2024-02-14 17:32 48M
41. Introduction to Application Attacks.mp4 2024-02-14 17:31 4.4M
42. Injection Attacks.mp4 2024-02-14 17:32 24M
43. Cross Site Scripting.mp4 2024-02-14 17:31 15M
44. Poorly Written Apps.mp4 2024-02-14 17:34 41M
45. Overflow Attack Demo.mp4 2024-02-14 17:32 39M
46. Poorly Written App Attack.mp4 2024-02-14 17:32 22M
47. Impersonation.mp4 2024-02-14 17:35 23M
48. Error Handling Attack.mp4 2024-02-14 17:33 29M
49. Additional Application Attacks.mp4 2024-02-14 17:31 31M
50. Password Recovery Fail.mp4 2024-02-14 17:31 26M
51. Review Quiz.mp4 2024-02-14 17:32 38M
52. Introduction to Social Engineering.mp4 2024-02-14 17:32 16M
53. Phishing and Related Attacks.mp4 2024-02-14 17:28 44M
54. Low Tech Attacks.mp4 2024-02-14 17:31 42M
55. Why Social Engineering Works.mp4 2024-02-14 17:31 31M
56. The Top Social Engineering Tool.mp4 2024-02-14 17:30 45M
57. Identifying a Phishing Email.mp4 2024-02-14 17:32 62M
58. Social Engineering Toolkit.mp4 2024-02-14 17:32 45M
59. Review Quiz.mp4 2024-02-14 17:32 33M
60. Introduction to Cyber Attack Techniques.mp4 2024-02-14 17:29 3.2M
61. Malware.mp4 2024-02-14 17:31 64M
62. Password Attacks.mp4 2024-02-14 17:29 47M
63. Password Attack Example.mp4 2024-02-14 17:35 61M
64. Cyber Physical Components.mp4 2024-02-14 17:31 39M
65. Adversarial AI.mp4 2024-02-14 17:29 27M
66. Supply Chain Security.mp4 2024-02-14 17:32 13M
67. Cryptographic Attacks.mp4 2024-02-14 17:30 28M
68. Review Quiz.mp4 2024-02-14 17:31 49M
69. Intro to Digital Certificates and the PKI.mp4 2024-02-14 17:31 7.2M
70. Symmetrical vs Asymmetrical Encryption.mp4 2024-02-14 17:28 91M
71. Digital Certificates Overview.mp4 2024-02-14 17:35 35M
72. Digital Signatures.mp4 2024-02-14 17:30 87M
73. Creating an HTTPS Session Key.mp4 2024-02-14 17:30 51M
74. Public Key Infrastructure.mp4 2024-02-14 17:31 65M
75. Quiz and Review.mp4 2024-02-14 17:30 28M
76. Endpoint Security Monitoring Technologies.mp4 2024-02-14 17:28 29M
77. Identifying the Role of Attribution.mp4 2024-02-14 17:30 28M
78. Comparing Disk Images.mp4 2024-02-14 17:32 12M
79. Interpreting Logs.mp4 2024-02-14 17:35 41M
80. Analyzing Sandbox Reports.mp4 2024-02-14 17:29 15M
81. Windows Processes and Services.mp4 2024-02-14 17:29 24M
82. Windows Memory and WMI.mp4 2024-02-14 17:29 9.7M
83. Exploring the Windows Registry.mp4 2024-02-14 17:34 21M
84. Windows Networking.mp4 2024-02-14 17:34 20M
85. Windows File Systems.mp4 2024-02-14 17:28 13M
86. Exploring Linux Processes.mp4 2024-02-14 17:28 13M
87. Linux File Permissions.mp4 2024-02-14 17:29 16M
88. Linux Sudo and Networking.mp4 2024-02-14 17:30 16M
89. Introduction to Network Intrusion Analysis.mp4 2024-02-14 17:28 7.0M
90. Data Sources.mp4 2024-02-14 17:28 47M
91. Event Severity.mp4 2024-02-14 17:28 34M
92. PCAP analysis.mp4 2024-02-14 17:29 78M
93. Extract files from PCAP.mp4 2024-02-14 17:30 64M
94. Regular Expressions.mp4 2024-02-14 17:34 45M
95. Information Security Management Concepts.mp4 2024-02-14 17:29 30M
96. Discussing Elements of an Incident Response (IR) Plan.mp4 2024-02-14 17:34 11M
97. Defining the Incident Response Process.mp4 2024-02-14 17:28 21M
98. Mapping Stakeholders to Incident Response (IR) Categories.mp4 2024-02-14 17:32 7.9M
99. Exploring the Forensic Evidence Collection Process.mp4 2024-02-14 17:29 16M
100. Server Profiling.mp4 2024-02-14 17:35 26M
101. Network Profiling.mp4 2024-02-14 17:34 15M
102. Identifying Protected Network Data.mp4 2024-02-14 17:34 14M
103. The Cyber Kill Chain.mp4 2024-02-14 17:32 12M
104. SOC Metrics And Scope Analysis.mp4 2024-02-14 17:34 12M