elhacker.INFO Downloads

[ index of contents ]

Copyright issues contact [email protected]
Icon  Name                                            Size  
[Volver] Parent Directory - [VID] 1.2_General Cybersecurity Concepts.mp4 197M [VID] 1.3_Introduction to SOC.mp4 86M [VID] 1.4_SOC People.mp4 108M [VID] 1.5_Introduction to SOC Services.mp4 219M [VID] 1.6_Security Monitoring part 1.mp4 109M [VID] 1.6a_Security Monitoring part 2.mp4 110M [VID] 1.7_Security Monitoring part 3.mp4 84M [VID] 1.8_SOC Use Cases.mp4 109M [VID] 1.9_Threat intelligence part 1.mp4 157M [VID] 1.9a_Threat Intelligence pt2.mp4 201M [VID] 1.10_Threat Hunting Part 1.mp4 234M [VID] 1.11_Threat Hunting Part 2.mp4 175M [VID] 1.12_SOC Technologies Part 1.mp4 164M [VID] 1.12a_SOC Technologies Part 2.mp4 116M [VID] 1.13_In Detail ELK Stack.mp4 68M [VID] 1.14_SOC Tools.mp4 194M [VID] 1.15_SOC Development And Maturity Levels.mp4 106M [VID] 1.16_Lab_Threat hunting walk-through.mp4 98M [VID] 1.17_Lab_WMI Consumer Hunting.mp4 118M [VID] 1.18_Lab_Linux Service Hunting.mp4 119M [VID] 1.19_Lab_Domain Name Hunting.mp4 122M