elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Last modified Size
Parent Directory -
Chapter 1 Welcome to the Course SY0-701/ 2025-06-12 16:33 -
Chapter 2 Part 1 - Summarize Fundamental Security Concepts/ 2025-06-12 16:32 -
Chapter 3 Part 2 - Compare Threat Types/ 2025-06-12 16:21 -
Chapter 4 Part 3 - Explain Cryptographic Solutions/ 2025-06-12 16:19 -
Chapter 5 Part 4 - Implement Identity and Access Management/ 2025-06-12 16:19 -
Chapter 6 Part 5 - Secure Enterprise Network Architecture/ 2025-06-12 16:18 -
Chapter 7 Part 6 - Secure Cloud Network Architecture/ 2025-06-12 16:18 -
Chapter 8 Part 7 - Explain Resiliency and Site Security Concepts/ 2025-06-12 16:18 -
Chapter 9 Part 8 - Explain Vulnerability Management/ 2025-06-12 16:18 -
Chapter 10 Part 9 - Evaluate Network Security Capabilities/ 2025-06-12 16:33 -
Chapter 11 Part 10 - Assess Endpoint Security Capabilities/ 2025-06-12 16:33 -
Chapter 12 Part 11 - Enhance Application Security Capabilities/ 2025-06-12 16:33 -
Chapter 13 Part 12 - Explain Incident Response and Monitoring Concepts/ 2025-06-12 16:33 -
Chapter 14 Part 13 - Analyze Indicators of Malicious Activity/ 2025-06-12 16:33 -
Chapter 15 Part 14 - Summarize Security Governance Concepts/ 2025-06-12 16:33 -
Chapter 16 Part 15 - Explain Risk Management/ 2025-06-12 16:33 -
Chapter 17 Part 16 - Summarize Data Protection and Compliance Concepts/ 2025-06-12 16:32 -
Chapter 18 Conclusion/ 2025-06-12 16:32 -
Chapter 19 Welcome to the Course (SY0-601)/ 2025-06-12 16:32 -
Chapter 20 Part 1 - Intro To Information Security And Security Roles & Responsibilities/ 2025-06-12 16:32 -
Chapter 21 Section 2 - Explaining Threat Actors And Threat Vectors/ 2025-06-12 16:32 -
Chapter 22 Part 3 - Performing Security Assessments/ 2025-06-12 16:32 -
Chapter 23 Part 4 - Social Engineering Techniques & Malware/ 2025-06-12 16:26 -
Chapter 24 Part 5 - Cryptographic Concepts, Hashing, Ciphers & Encryption/ 2025-06-12 16:21 -
Chapter 25 Part 6 - Implementing Public Key Infrastructure/ 2025-06-12 16:21 -
Chapter 26 Part 7 - Authentication Design Concepts/ 2025-06-12 16:21 -
Chapter 27 Part 8 - Identity and Management Controls/ 2025-06-12 16:21 -
Chapter 28 Part 9 - Implementing Secure Network Designs/ 2025-06-12 16:21 -
Chapter 29 Part 10 - Firewalls and Proxy Servers/ 2025-06-12 16:21 -
Chapter 30 Part 11 - Implement Secure Network Operations Protocols/ 2025-06-12 16:20 -
Chapter 31 Part 12 - Implement Host Security Solutions/ 2025-06-12 16:20 -
Chapter 32 Part 13 - Implement Secure Mobile Solutions/ 2025-06-12 16:20 -
Chapter 33 Part 14 - Application Attacks/ 2025-06-12 16:20 -
Chapter 34 Part 15 - Implement Secure Cloud Solutions/ 2025-06-12 16:19 -
Chapter 35 Part 16 - Data Privacy & Protection Concepts/ 2025-06-12 16:19 -
Chapter 36 Part 17 - Incident Response Procedures/ 2025-06-12 16:19 -
Chapter 37 Part 18 - Digital Forensics/ 2025-06-12 16:19 -
Chapter 38 Part 19 - Risk Management Processes and Concepts/ 2025-06-12 16:19 -
Chapter 39 Part 20 - Implement Cyber Security Resilience/ 2025-06-12 16:19 -
Chapter 40 Part 21 - Implement Physical Security/ 2025-06-12 16:19 -