elhacker.INFO Downloads
Name Size
Parent Directory -
104. SOC Metrics And Scope Analysis.mp4 12M
103. The Cyber Kill Chain.mp4 12M
102. Identifying Protected Network Data.mp4 14M
101. Network Profiling.mp4 15M
100. Server Profiling.mp4 26M
99. Exploring the Forensic Evidence Collection Process.mp4 16M
98. Mapping Stakeholders to Incident Response (IR) Categories.mp4 7.9M
97. Defining the Incident Response Process.mp4 21M
96. Discussing Elements of an Incident Response (IR) Plan.mp4 11M
95. Information Security Management Concepts.mp4 30M
94. Regular Expressions.mp4 45M
93. Extract files from PCAP.mp4 64M
92. PCAP analysis.mp4 78M
91. Event Severity.mp4 34M
90. Data Sources.mp4 47M
89. Introduction to Network Intrusion Analysis.mp4 7.0M
88. Linux Sudo and Networking.mp4 16M
87. Linux File Permissions.mp4 16M
86. Exploring Linux Processes.mp4 13M
85. Windows File Systems.mp4 13M
84. Windows Networking.mp4 20M
83. Exploring the Windows Registry.mp4 21M
82. Windows Memory and WMI.mp4 9.7M
81. Windows Processes and Services.mp4 24M
80. Analyzing Sandbox Reports.mp4 15M
79. Interpreting Logs.mp4 41M
78. Comparing Disk Images.mp4 12M
77. Identifying the Role of Attribution.mp4 28M
76. Endpoint Security Monitoring Technologies.mp4 29M
75. Quiz and Review.mp4 28M
74. Public Key Infrastructure.mp4 65M
73. Creating an HTTPS Session Key.mp4 51M
72. Digital Signatures.mp4 87M
71. Digital Certificates Overview.mp4 35M
70. Symmetrical vs Asymmetrical Encryption.mp4 91M
69. Intro to Digital Certificates and the PKI.mp4 7.2M
68. Review Quiz.mp4 49M
67. Cryptographic Attacks.mp4 28M
66. Supply Chain Security.mp4 13M
65. Adversarial AI.mp4 27M
64. Cyber Physical Components.mp4 39M
63. Password Attack Example.mp4 61M
62. Password Attacks.mp4 47M
61. Malware.mp4 64M
60. Introduction to Cyber Attack Techniques.mp4 3.2M
59. Review Quiz.mp4 33M
58. Social Engineering Toolkit.mp4 45M
57. Identifying a Phishing Email.mp4 62M
56. The Top Social Engineering Tool.mp4 45M
55. Why Social Engineering Works.mp4 31M
54. Low Tech Attacks.mp4 42M
53. Phishing and Related Attacks.mp4 44M
52. Introduction to Social Engineering.mp4 16M
51. Review Quiz.mp4 38M
50. Password Recovery Fail.mp4 26M
49. Additional Application Attacks.mp4 31M
48. Error Handling Attack.mp4 29M
47. Impersonation.mp4 23M
46. Poorly Written App Attack.mp4 22M
45. Overflow Attack Demo.mp4 39M
44. Poorly Written Apps.mp4 41M
43. Cross Site Scripting.mp4 15M
42. Injection Attacks.mp4 24M
41. Introduction to Application Attacks.mp4 4.4M
40. Review Quiz.mp4 48M
39. Remediation Options.mp4 42M
38. Malicious code or script execution.mp4 15M
37. Distributed denial-of-service (DDoS).mp4 33M
36. Domain name system (DNS).mp4 44M
35. Layer 2 attacks.mp4 62M
34. In-line or On-path Attacks.mp4 49M
33. Wireless Attacks.mp4 45M
32. Introduction to Network Attacks.mp4 4.6M
31. NAT-PAT.mp4 81M
30. Tunneling.mp4 55M
29. HTTPS.mp4 78M
28. Steganography.mp4 38M
27. Installing Tails.mp4 33M
26. TOR Overview.mp4 68M
25. Data from Security Appliances.mp4 27M
24. IPS and IDS Data.mp4 34M
23. Data from Next-gen Firewalls.mp4 52M
22. Data from Stateful Firewalls.mp4 80M
21. NetFlow Data.mp4 47M
20. TCPdump Data.mp4 121M
19. Intro to Data Types for Security Monitoring.mp4 8.4M
18. Quiz and Review.mp4 47M
17. Vulnerability Management.mp4 73M
16. Lack of Patch Management.mp4 83M
15. Third-Party Risks.mp4 18M
14. Weak Configurations.mp4 92M
13. Zero-day Attacks13. Zero-day Attacks.mp4 39M
12. On-Prem and Cloud-Based Vulnerabilities.mp4 79M
11. Intro to Vulnerability and Attack Surfaces.mp4 11M
10. The 5 Tuple Isolation Approach and Data Visibility_2.mp4 9.2M
9. Common Vulnerability Scoring System_2.mp4 19M
8. Comparing Access Control Models_2.mp4 12M
7. The Principles of Defense In-Depth Strategy_2.mp4 16M
6. Comparing Security Concepts_2.mp4 14M
5. Describing Security Terms Part 2_2.mp4 24M
4. Describing Security Terms Part 1_2.mp4 12M
3. Comparing Security Deployments Part 2_2.mp4 10M
2. Comparing Security Deployments Part 1_2.mp4 15M
1. The CIA Triad.mp4 23M