elhacker.INFO Downloads

[ índice de contenido ]

Copyright issues contact webmaster@elhacker.info
Icon  Name                                                                                Size  
[Volver] Parent Directory - [VID] 83. Hunting With Notebooks.mp4 118M [VID] 82. Sentinel Bookmarks.mp4 30M [VID] 81. Hunting With Livestreams.mp4 24M [VID] 80. Threat Hunting Queries.mp4 38M [VID] 79. Security Operations Efficiency Workbook.mp4 38M [VID] 78. Custom Workbooks.mp4 53M [VID] 77. Sentinel Workbooks.mp4 77M [VID] 76. User and Entity Behavior Analytics (UEBA).mp4 42M [VID] 75. Multi-Workspace Incidents.mp4 21M [VID] 74. Incidents Within Sentinel.mp4 86M [VID] 73. Defender Playbooks.mp4 28M [VID] 72. Automation Rules.mp4 38M [VID] 71. Creating Playbooks.mp4 41M [VID] 70. KQL Exercise.mp4 62M [VID] 69. Incident Creation Logic with KQL.mp4 115M [VID] 68. Connector Provided Queries and Workflow.mp4 33M [VID] 67. Custom Analytics Rules.mp4 33M [VID] 66. Activate Microsoft Security Analytics Rules.mp4 25M [VID] 65. Design and Configure Analytics Rules.mp4 80M [VID] 64. Intro to Sentinel Analytics Rules.mp4 9.3M [VID] 63. Ingesting Custom Logs.mp4 49M [VID] 62. Threat Intelligence Connectors.mp4 49M [VID] 61. Syslog and CEF Event Collectors.mp4 89M [VID] 60. Configuring Data Connectors Via Policies.mp4 43M [VID] 59. Data Sources and Prerequisites.mp4 66M [VID] 58. Microsoft Sentinel Data Storage.mp4 112M [VID] 57. Microsoft Sentinel Roles.mp4 53M [VID] 56. Setting Up Microsoft Sentinel.mp4 27M [VID] 55. Microsoft Sentinel Workspaces.mp4 56M [VID] 54. SIEMs and SOARs.mp4 47M [VID] 53. Data Privacy.mp4 22M [VID] 52. Key Vault Alerts.mp4 32M [VID] 51. Threat Intelligence.mp4 18M [VID] 50. Managing Alerts.mp4 98M [VID] 49. Types of Alerts.mp4 24M [VID] 48. Automated Responses.mp4 91M [VID] 47. Intro Managing Defender for Cloud.mp4 18M [VID] 46. Cloud Alert Rules.mp4 56M [VID] 45. Connect GCP Cloud Resources.mp4 31M [VID] 44. Connect AWS Cloud Resources.mp4 36M [VID] 43. Data Connectors.mp4 37M [VID] 42. Data Retention and Recommendations.mp4 66M [VID] 41. Microsoft Defender for Cloud.mp4 63M [VID] 40. Attack Simulation Training.mp4 50M [VID] 39. Cross-Domain Investigations.mp4 41M [VID] 38. Cloud App Policies.mp4 35M [VID] 37. Investigating Cloud App Activity.mp4 88M [VID] 36. Discovering Cloud Apps.mp4 76M [VID] 35. Microsoft Defender for Cloud Apps.mp4 35M [VID] 34. Investigating Defender for Identity Events.mp4 31M [VID] 33. Tagging Sensitive Accounts.mp4 24M [VID] 32. Using Secure Score.mp4 38M [VID] 31. Investigating Azure Identity Events.mp4 31M [VID] 30. Conditional Access Policies.mp4 33M [VID] 29. Azure Identity Policies.mp4 36M [VID] 28. MS Defender for Endpoint.mp4 30M [VID] 27. Threat Analytics.mp4 26M [VID] 26. Recommended Endpoint Configurations.mp4 33M [VID] 25. Responding to Incidents.mp4 62M [VID] 24. Custom Detection Alerts.mp4 25M [VID] 23. Attack Surface Reduction Rules.mp4 24M [VID] 22. Data Settings and Alert Notifications.mp4 27M [VID] 21. Automated Investigation and Response (AIR).mp4 32M [VID] 20. Into to MS Defender for Endpoint.mp4 37M [VID] 19. Insider Risk Policies.mp4 30M [VID] 18. Sensitivity Labels.mp4 43M [VID] 17. DLP Policies and Alerts.mp4 34M [VID] 16. User Email Submissions.mp4 33M [VID] 15. Detect, Investigate, Respond and Remediate Threats.mp4 114M [VID] 14. Teams, Sharepoint and OneDrive Policies.mp4 48M [VID] 13. Protecting Office 365.mp4 34M [VID] 12. MS 365 Defender Policies & Rules Alert and Activity Policies.mp4 21M [VID] 11. MS 365 Defender Policies & Rules Additional Rules.mp4 40M [VID] 10. MS 365 Defender Policies & Rules AllowBlock Lists.mp4 19M [VID] 9. MS 365 Defender Policies & Rules Anti-Malware, Safe Attachments & Safe Links.mp4 41M [VID] 8. MS 365 Defender Policies & Rules Anti-SPAM.mp4 32M [VID] 7. MS 365 Defender Policies & Rules Anti-Phishing.mp4 51M [VID] 6. MS 365 Defender Policies & Rules Built-In Rules.mp4 49M [VID] 5. Microsoft 365 Defender Portal Wrap-Up.mp4 52M [VID] 4. Microsoft 365 Defender Portal Email & Collaboration.mp4 35M [VID] 3. Microsoft 365 Defender Portal Endpoints.mp4 53M [VID] 2. Microsoft 365 Defender Portal Introduction.mp4 86M [VID] 1. Getting to Know MS 365 Defender.mp4 44M

Recent Courses

CEHv13
HackTricks - AWS Red Team Expert (ARTE)
Certified Exploit Development Professional [CEDP]
Advance Exploitation Course By Umar Sabil
CompTIA Security+ (SY0-701 & SY0-601) Full Training Guide
ITProTV - LPIC-2 Linux Engineer (202-450)_
OffSec - PEN-210 - Foundational Wireless Network Attacks
OffSec EXP-301
FOR508 Videos 2023
Introduction Windows Malware Development
Red-Teaming-Exploit-Development-with-Assembly-and-C-MSAC
SEC450 Videos 2020
AWS Cloud Red Team Specialist [CARTS]
SEC670 MP3 2025.4
Zero Point Security - Red Team Ops 2025.2
Certified Red Team Analyst [CCRTA] 2022
EC Council - DroneWorkshop
HTB - AI Red Teamer 2025.3 Path
SEC670 Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control
Maltrak - Threat Hunting In Microsoft Sentinel and Defender
Hybrid Multi-Cloud Red Team Specialist [CHMRTS]
Stealth Cyber Operator [CSCO]
Process Injection Analyst [CPIA]
Red Team Specialist [CRTS V1]
Practical Hardware Hacking
Red Team Infra Dev [CRT-ID]
Purple Team Analyst [CPTA V1]
Assembly 101
EC-Council Certified Cloud Security Engineer (CCSE)
Udemy - Web Security & Bug Bounty Learn Penetration Testing 2025
INE - Advanced Web Application Penetration Testing (New)_
Windows Red Team Lab (CRTE) 2025.2
Mandiant - Malware Analysis 2025
13Cubed - Investigating Linux Devices
Zero Point Security - DevOps for Pentesters 2025.3
Offensive Development w Greg Hatcher & John Stigerwalt
Pluralsight - Windows Server 2022 Administration
BittenTech - TechHacker Ethical Hacking and Cyber Security
Kaspersky - Hunting APTs like a Ninja with YARA
A-Windows_Process_Injection_For_Red-Blue_Team
QURE Academy - Advanced Attacks Against Active Directory
EC-Council - Certified Network Defender v3 2024.11
EC-Council - Cyber Security Technician
PEN-200 - Penetration Testing with Kali Linux Videos
EDRPv3 EC-Council Disaster Recovery Professional
OffSec - PEN-200 2024.11
Practical Analysis with Security Onion
SANS ON DEMAND COURSE
Top 5 Tools & Techniques for Penetration Testing
CVE's for Bug Bounties & Penetration Testing
Creating Batch Scripts For Android
Oreilly - Mastering Cybersecurity with Python - From Basics to Advanced Defense
Recon For Bug Bounties & Penetration Testing
Bug Bounty Hunting and Penetration Testing v2
Bug Bounty Hunting and Penetration Testing v1
Bootcamp de Backend Avanzado_ Microservicios
Sketchup desde Cero para Arquitectos
Creación y consulta de bases de datos con ChatGPT y SQL
Storytelling Audiovisual para redes sociales
Introducción a Frameworks de Frontend con Vue 3"
Trafficker Expert
2. Digital Marketing Course ( English )
Creación de videojuegos
Master en Creación de Videojuegos
Photoshop 2020 para fotógrafos. Conoce el Retoque nivel PRO!
Soporte Técnico a Computadoras en Entornos Corporativos
13 CURSO DE REPARACION DE IMPRESORAS
18. Copywriting como escribir para vender mas
Master en Reparación de iPhone
Crea Aplicaciones Java Web
Curso de creación de bots [CodigoFacilito]
Maestría en CSS3 Flexbox, Grid, SASS, Bootstrap 5
Robótica con Matlab Cinemática directa y Simulación
COMMUNITY AND CONTENT MANAGER
Aprende Android con Ejemplos
Adobe Premiere desde Cero
ELECTRICIDAD
Invertir en Criptomonedas - Blockchain - Trading - DeFi - UDEMY
Angular - De cero a experto
Electrónica desde cero
Creación de videojuegos
Universidad del dropshipping
Cursos PhotoShop
reparacion de ps2
Curso de Linux s4vitar
rofesional en Reparacion de Laptops
Curso Marketing PRO Masterclass - John Dani
Curso de Reparación de Discos Duros y Recuperación de Datos
CURSO WORD, POWERPOINT
EXCEL DE PRINCIPIANTE A EXPERTO
CURSO SOLIDWORKS
Seguridad Informática desde Cero
Master Unreal Engine 4 Para Arquitectura en Español
Aprende.realidad.aumentada.con.ARKit
COMO VENDER POR FB e IG ADS - FELIPE VERGARA
AUTOCAD 2019 DE PRINCIPIANTE A AVANZADO
Curso Word
Curso Adobe Illustrator Sé un experto en ilustración digital
Universidad Python 2021 - POO, Django, Flask y Postgresql