elhacker.INFO Downloads
Name Size
Parent Directory -
18. Relationship Between Information Security Aspects.srt 6.3K
18. Relationship Between Information Security Aspects.mp4 28M
17. Classification of Security Controls.srt 5.8K
17. Classification of Security Controls.mp4 22M
16. What is a Security Control .srt 7.0K
16. What is a Security Control .mp4 32M
15. Risk in Information Security.srt 7.3K
15. Risk in Information Security.mp4 32M
14. Impact.srt 5.0K
14. Impact.mp4 17M
13. Threat.srt 8.1K
13. Threat.mp4 35M
12. Vulnerability Assessment Types.srt 11K
12. Vulnerability Assessment Types.mp4 50M
11. Vulnerability - What is it.srt 6.4K
11. Vulnerability - What is it.mp4 24M
10. Availability.srt 7.5K
10. Availability.mp4 27M
9. Integrity.srt 5.4K
9. Integrity.mp4 24M
8. Confidentiality.srt 5.7K
8. Confidentiality.mp4 20M
7. CIA Triad - Overview.srt 2.6K
7. CIA Triad - Overview.mp4 11M
6. Definition of Information Security.srt 6.2K
6. Definition of Information Security.mp4 24M
5. InfoSec Documents and its types.srt 5.8K
5. InfoSec Documents and its types.mp4 26M
4. Information and Assets.srt 7.3K
4. Information and Assets.mp4 22M
3. Section Overview.srt 2.1K
3. Section Overview.mp4 9.0M
2. Please Find the Attached Resources for your reference..html 132
2.7 Dafydd Stuttard, Marcus Pinto - The web application hacker_s handbook_ finding and exploiting security flaws-Wiley (2011).pdf 15M
2.6 Mastering Kali Linux for Web Penetration Testing.pdf 34M
2.5 Rafay Baloch - Ethical Hacking and Penetration Testing Guide-Auerbach Publications (2014).pdf 22M
2.4 Andres Andreu - Professional Pen Testing for Web Applications (2006).pdf 7.6M
2.3 Joseph Marshall - Hands-On Bug Hunting for Penetration Testers_ A practical guide to help ethical hackers discover web application security flaws-Packt Publishing (2018).pdf 14M
2.2 The-Hacker-Playbook-Practical-Guide-To-Penetration-Testing-2014.pdf 26M
2.1 Black Hat Python.pdf 6.5M
1. Introduction.srt 3.1K
1. Introduction.mp4 48M