elhacker.INFO Downloads
Copyright issues contact webmaster@elhacker.info
Name Size
Parent Directory -
6.1 Introduction and Policy.mp4 8.0M
6.1 Introduction and Policy.vtt 5.6K
6.2 Policies and Best Practices Part 1.mp4 21M
6.2 Policies and Best Practices Part 1.vtt 12K
6.3 Policies and Best Practices Part 2.mp4 18M
6.3 Policies and Best Practices Part 2.vtt 11K
6.4 Scanning, Monitoring and Patching.mp4 22M
6.4 Scanning, Monitoring and Patching.vtt 9.5K
6.5 Patch Lifecycle Baselines and Traffic Analysis.mp4 20M
6.5 Patch Lifecycle Baselines and Traffic Analysis.vtt 9.3K
6.6 Fault Management.mp4 14M
6.6 Fault Management.vtt 7.3K
6.7 RAID and Data Backups.mp4 21M
6.7 RAID and Data Backups.vtt 9.8K
6.8 Business Continuity and Disaster Recovery Part 1.mp4 26M
6.8 Business Continuity and Disaster Recovery Part 1.vtt 12K
6.9 Business Continuity and Disaster Recovery Part 2.mp4 11M
6.9 Business Continuity and Disaster Recovery Part 2.vtt 6.9K
6.10 Virtualization Part 1.mp4 20M
6.10 Virtualization Part 1.vtt 12K
6.11 Virtualization Part 2.mp4 19M
6.11 Virtualization Part 2.vtt 11K
6.12 Cloud Computing.mp4 12M
6.12 Cloud Computing.vtt 7.1K
6.13 Cloud Services.mp4 31M
6.13 Cloud Services.vtt 16K
6.14 Cloud Deployment Models and Cloud Wrap-Up.mp4 12M
6.14 Cloud Deployment Models and Cloud Wrap-Up.vtt 6.5K
6.15 IoT Introduction.mp4 11M
6.15 IoT Introduction.vtt 4.2K
6.16 OWASP IoT and Wrap-Up.mp4 14M
6.16 OWASP IoT and Wrap-Up.vtt 12K
6.17 Hardening the System Part 1.mp4 7.2M
6.17 Hardening the System Part 1.vtt 3.7K
6.18 Hardening the System Part 2.mp4 9.4M
6.18 Hardening the System Part 2.vtt 5.6K
6.19 Vulnerability Assessments and Penetration Tests.mp4 13M
6.19 Vulnerability Assessments and Penetration Tests.vtt 6.6K
6.20 Incident Response.mp4 8.3M
6.20 Incident Response.vtt 5.7K
6.21 Forensic Investigations.mp4 14M
6.21 Forensic Investigations.vtt 8.1K