el-hacker.org Downloads
    Name                                                              Last modified      Size
 Name                                                              Last modified      Size  
![[Volver]](/icons/back.gif) Parent Directory                                                                       -
 Parent Directory                                                                       -   
![[VID]](/icons/movie.gif) 1. The CIA Triad.mp4                                              2024-02-14 17:33   23M
 1. The CIA Triad.mp4                                              2024-02-14 17:33   23M  
![[VID]](/icons/movie.gif) 2. Comparing Security Deployments Part 1_2.mp4                    2024-02-14 17:35   15M
 2. Comparing Security Deployments Part 1_2.mp4                    2024-02-14 17:35   15M  
![[VID]](/icons/movie.gif) 3. Comparing Security Deployments Part 2_2.mp4                    2024-02-14 17:33   10M
 3. Comparing Security Deployments Part 2_2.mp4                    2024-02-14 17:33   10M  
![[VID]](/icons/movie.gif) 4. Describing Security Terms Part 1_2.mp4                         2024-02-14 17:30   12M
 4. Describing Security Terms Part 1_2.mp4                         2024-02-14 17:30   12M  
![[VID]](/icons/movie.gif) 5. Describing Security Terms Part 2_2.mp4                         2024-02-14 17:31   24M
 5. Describing Security Terms Part 2_2.mp4                         2024-02-14 17:31   24M  
![[VID]](/icons/movie.gif) 6. Comparing Security Concepts_2.mp4                              2024-02-14 17:35   14M
 6. Comparing Security Concepts_2.mp4                              2024-02-14 17:35   14M  
![[VID]](/icons/movie.gif) 7. The Principles of Defense In-Depth Strategy_2.mp4              2024-02-14 17:28   16M
 7. The Principles of Defense In-Depth Strategy_2.mp4              2024-02-14 17:28   16M  
![[VID]](/icons/movie.gif) 8. Comparing Access Control Models_2.mp4                          2024-02-14 17:28   12M
 8. Comparing Access Control Models_2.mp4                          2024-02-14 17:28   12M  
![[VID]](/icons/movie.gif) 9. Common Vulnerability Scoring System_2.mp4                      2024-02-14 17:29   19M
 9. Common Vulnerability Scoring System_2.mp4                      2024-02-14 17:29   19M  
![[VID]](/icons/movie.gif) 10. The 5 Tuple Isolation Approach and Data Visibility_2.mp4      2024-02-14 17:34  9.2M
 10. The 5 Tuple Isolation Approach and Data Visibility_2.mp4      2024-02-14 17:34  9.2M  
![[VID]](/icons/movie.gif) 11. Intro to Vulnerability and Attack Surfaces.mp4                2024-02-14 17:32   11M
 11. Intro to Vulnerability and Attack Surfaces.mp4                2024-02-14 17:32   11M  
![[VID]](/icons/movie.gif) 12. On-Prem and Cloud-Based Vulnerabilities.mp4                   2024-02-14 17:34   79M
 12. On-Prem and Cloud-Based Vulnerabilities.mp4                   2024-02-14 17:34   79M  
![[VID]](/icons/movie.gif) 13. Zero-day Attacks13. Zero-day Attacks.mp4                      2024-02-14 17:35   39M
 13. Zero-day Attacks13. Zero-day Attacks.mp4                      2024-02-14 17:35   39M  
![[VID]](/icons/movie.gif) 14. Weak Configurations.mp4                                       2024-02-14 17:29   92M
 14. Weak Configurations.mp4                                       2024-02-14 17:29   92M  
![[VID]](/icons/movie.gif) 15. Third-Party Risks.mp4                                         2024-02-14 17:32   18M
 15. Third-Party Risks.mp4                                         2024-02-14 17:32   18M  
![[VID]](/icons/movie.gif) 16. Lack of Patch Management.mp4                                  2024-02-14 17:35   83M
 16. Lack of Patch Management.mp4                                  2024-02-14 17:35   83M  
![[VID]](/icons/movie.gif) 17. Vulnerability Management.mp4                                  2024-02-14 17:35   73M
 17. Vulnerability Management.mp4                                  2024-02-14 17:35   73M  
![[VID]](/icons/movie.gif) 18. Quiz and Review.mp4                                           2024-02-14 17:34   47M
 18. Quiz and Review.mp4                                           2024-02-14 17:34   47M  
![[VID]](/icons/movie.gif) 19. Intro to Data Types for Security Monitoring.mp4               2024-02-14 17:34  8.4M
 19. Intro to Data Types for Security Monitoring.mp4               2024-02-14 17:34  8.4M  
![[VID]](/icons/movie.gif) 20. TCPdump Data.mp4                                              2024-02-14 17:35  121M
 20. TCPdump Data.mp4                                              2024-02-14 17:35  121M  
![[VID]](/icons/movie.gif) 21. NetFlow Data.mp4                                              2024-02-14 17:34   47M
 21. NetFlow Data.mp4                                              2024-02-14 17:34   47M  
![[VID]](/icons/movie.gif) 22. Data from Stateful Firewalls.mp4                              2024-02-14 17:30   80M
 22. Data from Stateful Firewalls.mp4                              2024-02-14 17:30   80M  
![[VID]](/icons/movie.gif) 23. Data from Next-gen Firewalls.mp4                              2024-02-14 17:34   52M
 23. Data from Next-gen Firewalls.mp4                              2024-02-14 17:34   52M  
![[VID]](/icons/movie.gif) 24. IPS and IDS Data.mp4                                          2024-02-14 17:33   34M
 24. IPS and IDS Data.mp4                                          2024-02-14 17:33   34M  
![[VID]](/icons/movie.gif) 25. Data from Security Appliances.mp4                             2024-02-14 17:32   27M
 25. Data from Security Appliances.mp4                             2024-02-14 17:32   27M  
![[VID]](/icons/movie.gif) 26. TOR Overview.mp4                                              2024-02-14 17:35   68M
 26. TOR Overview.mp4                                              2024-02-14 17:35   68M  
![[VID]](/icons/movie.gif) 27. Installing Tails.mp4                                          2024-02-14 17:29   33M
 27. Installing Tails.mp4                                          2024-02-14 17:29   33M  
![[VID]](/icons/movie.gif) 28. Steganography.mp4                                             2024-02-14 17:33   38M
 28. Steganography.mp4                                             2024-02-14 17:33   38M  
![[VID]](/icons/movie.gif) 29. HTTPS.mp4                                                     2024-02-14 17:33   78M
 29. HTTPS.mp4                                                     2024-02-14 17:33   78M  
![[VID]](/icons/movie.gif) 30. Tunneling.mp4                                                 2024-02-14 17:33   55M
 30. Tunneling.mp4                                                 2024-02-14 17:33   55M  
![[VID]](/icons/movie.gif) 31. NAT-PAT.mp4                                                   2024-02-14 17:34   81M
 31. NAT-PAT.mp4                                                   2024-02-14 17:34   81M  
![[VID]](/icons/movie.gif) 32. Introduction to Network Attacks.mp4                           2024-02-14 17:33  4.6M
 32. Introduction to Network Attacks.mp4                           2024-02-14 17:33  4.6M  
![[VID]](/icons/movie.gif) 33. Wireless Attacks.mp4                                          2024-02-14 17:29   45M
 33. Wireless Attacks.mp4                                          2024-02-14 17:29   45M  
![[VID]](/icons/movie.gif) 34. In-line or On-path Attacks.mp4                                2024-02-14 17:33   49M
 34. In-line or On-path Attacks.mp4                                2024-02-14 17:33   49M  
![[VID]](/icons/movie.gif) 35. Layer 2 attacks.mp4                                           2024-02-14 17:33   62M
 35. Layer 2 attacks.mp4                                           2024-02-14 17:33   62M  
![[VID]](/icons/movie.gif) 36. Domain name system (DNS).mp4                                  2024-02-14 17:33   44M
 36. Domain name system (DNS).mp4                                  2024-02-14 17:33   44M  
![[VID]](/icons/movie.gif) 37. Distributed denial-of-service (DDoS).mp4                      2024-02-14 17:31   33M
 37. Distributed denial-of-service (DDoS).mp4                      2024-02-14 17:31   33M  
![[VID]](/icons/movie.gif) 38. Malicious code or script execution.mp4                        2024-02-14 17:31   15M
 38. Malicious code or script execution.mp4                        2024-02-14 17:31   15M  
![[VID]](/icons/movie.gif) 39. Remediation Options.mp4                                       2024-02-14 17:32   42M
 39. Remediation Options.mp4                                       2024-02-14 17:32   42M  
![[VID]](/icons/movie.gif) 40. Review Quiz.mp4                                               2024-02-14 17:32   48M
 40. Review Quiz.mp4                                               2024-02-14 17:32   48M  
![[VID]](/icons/movie.gif) 41. Introduction to Application Attacks.mp4                       2024-02-14 17:31  4.4M
 41. Introduction to Application Attacks.mp4                       2024-02-14 17:31  4.4M  
![[VID]](/icons/movie.gif) 42. Injection Attacks.mp4                                         2024-02-14 17:32   24M
 42. Injection Attacks.mp4                                         2024-02-14 17:32   24M  
![[VID]](/icons/movie.gif) 43. Cross Site Scripting.mp4                                      2024-02-14 17:31   15M
 43. Cross Site Scripting.mp4                                      2024-02-14 17:31   15M  
![[VID]](/icons/movie.gif) 44. Poorly Written Apps.mp4                                       2024-02-14 17:34   41M
 44. Poorly Written Apps.mp4                                       2024-02-14 17:34   41M  
![[VID]](/icons/movie.gif) 45. Overflow Attack Demo.mp4                                      2024-02-14 17:32   39M
 45. Overflow Attack Demo.mp4                                      2024-02-14 17:32   39M  
![[VID]](/icons/movie.gif) 46. Poorly Written App Attack.mp4                                 2024-02-14 17:32   22M
 46. Poorly Written App Attack.mp4                                 2024-02-14 17:32   22M  
![[VID]](/icons/movie.gif) 47. Impersonation.mp4                                             2024-02-14 17:35   23M
 47. Impersonation.mp4                                             2024-02-14 17:35   23M  
![[VID]](/icons/movie.gif) 48. Error Handling Attack.mp4                                     2024-02-14 17:33   29M
 48. Error Handling Attack.mp4                                     2024-02-14 17:33   29M  
![[VID]](/icons/movie.gif) 49. Additional Application Attacks.mp4                            2024-02-14 17:31   31M
 49. Additional Application Attacks.mp4                            2024-02-14 17:31   31M  
![[VID]](/icons/movie.gif) 50. Password Recovery Fail.mp4                                    2024-02-14 17:31   26M
 50. Password Recovery Fail.mp4                                    2024-02-14 17:31   26M  
![[VID]](/icons/movie.gif) 51. Review Quiz.mp4                                               2024-02-14 17:32   38M
 51. Review Quiz.mp4                                               2024-02-14 17:32   38M  
![[VID]](/icons/movie.gif) 52. Introduction to Social Engineering.mp4                        2024-02-14 17:32   16M
 52. Introduction to Social Engineering.mp4                        2024-02-14 17:32   16M  
![[VID]](/icons/movie.gif) 53. Phishing and Related Attacks.mp4                              2024-02-14 17:28   44M
 53. Phishing and Related Attacks.mp4                              2024-02-14 17:28   44M  
![[VID]](/icons/movie.gif) 54. Low Tech Attacks.mp4                                          2024-02-14 17:31   42M
 54. Low Tech Attacks.mp4                                          2024-02-14 17:31   42M  
![[VID]](/icons/movie.gif) 55. Why Social Engineering Works.mp4                              2024-02-14 17:31   31M
 55. Why Social Engineering Works.mp4                              2024-02-14 17:31   31M  
![[VID]](/icons/movie.gif) 56. The Top Social Engineering Tool.mp4                           2024-02-14 17:30   45M
 56. The Top Social Engineering Tool.mp4                           2024-02-14 17:30   45M  
![[VID]](/icons/movie.gif) 57. Identifying a Phishing Email.mp4                              2024-02-14 17:32   62M
 57. Identifying a Phishing Email.mp4                              2024-02-14 17:32   62M  
![[VID]](/icons/movie.gif) 58. Social Engineering Toolkit.mp4                                2024-02-14 17:32   45M
 58. Social Engineering Toolkit.mp4                                2024-02-14 17:32   45M  
![[VID]](/icons/movie.gif) 59. Review Quiz.mp4                                               2024-02-14 17:32   33M
 59. Review Quiz.mp4                                               2024-02-14 17:32   33M  
![[VID]](/icons/movie.gif) 60. Introduction to Cyber Attack Techniques.mp4                   2024-02-14 17:29  3.2M
 60. Introduction to Cyber Attack Techniques.mp4                   2024-02-14 17:29  3.2M  
![[VID]](/icons/movie.gif) 61. Malware.mp4                                                   2024-02-14 17:31   64M
 61. Malware.mp4                                                   2024-02-14 17:31   64M  
![[VID]](/icons/movie.gif) 62. Password Attacks.mp4                                          2024-02-14 17:29   47M
 62. Password Attacks.mp4                                          2024-02-14 17:29   47M  
![[VID]](/icons/movie.gif) 63. Password Attack Example.mp4                                   2024-02-14 17:35   61M
 63. Password Attack Example.mp4                                   2024-02-14 17:35   61M  
![[VID]](/icons/movie.gif) 64. Cyber Physical Components.mp4                                 2024-02-14 17:31   39M
 64. Cyber Physical Components.mp4                                 2024-02-14 17:31   39M  
![[VID]](/icons/movie.gif) 65. Adversarial AI.mp4                                            2024-02-14 17:29   27M
 65. Adversarial AI.mp4                                            2024-02-14 17:29   27M  
![[VID]](/icons/movie.gif) 66. Supply Chain Security.mp4                                     2024-02-14 17:32   13M
 66. Supply Chain Security.mp4                                     2024-02-14 17:32   13M  
![[VID]](/icons/movie.gif) 67. Cryptographic Attacks.mp4                                     2024-02-14 17:30   28M
 67. Cryptographic Attacks.mp4                                     2024-02-14 17:30   28M  
![[VID]](/icons/movie.gif) 68. Review Quiz.mp4                                               2024-02-14 17:31   49M
 68. Review Quiz.mp4                                               2024-02-14 17:31   49M  
![[VID]](/icons/movie.gif) 69. Intro to Digital Certificates and the PKI.mp4                 2024-02-14 17:31  7.2M
 69. Intro to Digital Certificates and the PKI.mp4                 2024-02-14 17:31  7.2M  
![[VID]](/icons/movie.gif) 70. Symmetrical vs Asymmetrical Encryption.mp4                    2024-02-14 17:28   91M
 70. Symmetrical vs Asymmetrical Encryption.mp4                    2024-02-14 17:28   91M  
![[VID]](/icons/movie.gif) 71. Digital Certificates Overview.mp4                             2024-02-14 17:35   35M
 71. Digital Certificates Overview.mp4                             2024-02-14 17:35   35M  
![[VID]](/icons/movie.gif) 72. Digital Signatures.mp4                                        2024-02-14 17:30   87M
 72. Digital Signatures.mp4                                        2024-02-14 17:30   87M  
![[VID]](/icons/movie.gif) 73. Creating an HTTPS Session Key.mp4                             2024-02-14 17:30   51M
 73. Creating an HTTPS Session Key.mp4                             2024-02-14 17:30   51M  
![[VID]](/icons/movie.gif) 74. Public Key Infrastructure.mp4                                 2024-02-14 17:31   65M
 74. Public Key Infrastructure.mp4                                 2024-02-14 17:31   65M  
![[VID]](/icons/movie.gif) 75. Quiz and Review.mp4                                           2024-02-14 17:30   28M
 75. Quiz and Review.mp4                                           2024-02-14 17:30   28M  
![[VID]](/icons/movie.gif) 76. Endpoint Security Monitoring Technologies.mp4                 2024-02-14 17:28   29M
 76. Endpoint Security Monitoring Technologies.mp4                 2024-02-14 17:28   29M  
![[VID]](/icons/movie.gif) 77. Identifying the Role of Attribution.mp4                       2024-02-14 17:30   28M
 77. Identifying the Role of Attribution.mp4                       2024-02-14 17:30   28M  
![[VID]](/icons/movie.gif) 78. Comparing Disk Images.mp4                                     2024-02-14 17:32   12M
 78. Comparing Disk Images.mp4                                     2024-02-14 17:32   12M  
![[VID]](/icons/movie.gif) 79. Interpreting Logs.mp4                                         2024-02-14 17:35   41M
 79. Interpreting Logs.mp4                                         2024-02-14 17:35   41M  
![[VID]](/icons/movie.gif) 80. Analyzing Sandbox Reports.mp4                                 2024-02-14 17:29   15M
 80. Analyzing Sandbox Reports.mp4                                 2024-02-14 17:29   15M  
![[VID]](/icons/movie.gif) 81. Windows Processes and Services.mp4                            2024-02-14 17:29   24M
 81. Windows Processes and Services.mp4                            2024-02-14 17:29   24M  
![[VID]](/icons/movie.gif) 82. Windows Memory and WMI.mp4                                    2024-02-14 17:29  9.7M
 82. Windows Memory and WMI.mp4                                    2024-02-14 17:29  9.7M  
![[VID]](/icons/movie.gif) 83. Exploring the Windows Registry.mp4                            2024-02-14 17:34   21M
 83. Exploring the Windows Registry.mp4                            2024-02-14 17:34   21M  
![[VID]](/icons/movie.gif) 84. Windows Networking.mp4                                        2024-02-14 17:34   20M
 84. Windows Networking.mp4                                        2024-02-14 17:34   20M  
![[VID]](/icons/movie.gif) 85. Windows File Systems.mp4                                      2024-02-14 17:28   13M
 85. Windows File Systems.mp4                                      2024-02-14 17:28   13M  
![[VID]](/icons/movie.gif) 86. Exploring Linux Processes.mp4                                 2024-02-14 17:28   13M
 86. Exploring Linux Processes.mp4                                 2024-02-14 17:28   13M  
![[VID]](/icons/movie.gif) 87. Linux File Permissions.mp4                                    2024-02-14 17:29   16M
 87. Linux File Permissions.mp4                                    2024-02-14 17:29   16M  
![[VID]](/icons/movie.gif) 88. Linux Sudo and Networking.mp4                                 2024-02-14 17:30   16M
 88. Linux Sudo and Networking.mp4                                 2024-02-14 17:30   16M  
![[VID]](/icons/movie.gif) 89. Introduction to Network Intrusion Analysis.mp4                2024-02-14 17:28  7.0M
 89. Introduction to Network Intrusion Analysis.mp4                2024-02-14 17:28  7.0M  
![[VID]](/icons/movie.gif) 90. Data Sources.mp4                                              2024-02-14 17:28   47M
 90. Data Sources.mp4                                              2024-02-14 17:28   47M  
![[VID]](/icons/movie.gif) 91. Event Severity.mp4                                            2024-02-14 17:28   34M
 91. Event Severity.mp4                                            2024-02-14 17:28   34M  
![[VID]](/icons/movie.gif) 92. PCAP analysis.mp4                                             2024-02-14 17:29   78M
 92. PCAP analysis.mp4                                             2024-02-14 17:29   78M  
![[VID]](/icons/movie.gif) 93. Extract files from PCAP.mp4                                   2024-02-14 17:30   64M
 93. Extract files from PCAP.mp4                                   2024-02-14 17:30   64M  
![[VID]](/icons/movie.gif) 94. Regular Expressions.mp4                                       2024-02-14 17:34   45M
 94. Regular Expressions.mp4                                       2024-02-14 17:34   45M  
![[VID]](/icons/movie.gif) 95. Information Security Management Concepts.mp4                  2024-02-14 17:29   30M
 95. Information Security Management Concepts.mp4                  2024-02-14 17:29   30M  
![[VID]](/icons/movie.gif) 96. Discussing Elements of an Incident Response (IR) Plan.mp4     2024-02-14 17:34   11M
 96. Discussing Elements of an Incident Response (IR) Plan.mp4     2024-02-14 17:34   11M  
![[VID]](/icons/movie.gif) 97. Defining the Incident Response Process.mp4                    2024-02-14 17:28   21M
 97. Defining the Incident Response Process.mp4                    2024-02-14 17:28   21M  
![[VID]](/icons/movie.gif) 98. Mapping Stakeholders to Incident Response (IR) Categories.mp4 2024-02-14 17:32  7.9M
 98. Mapping Stakeholders to Incident Response (IR) Categories.mp4 2024-02-14 17:32  7.9M  
![[VID]](/icons/movie.gif) 99. Exploring the Forensic Evidence Collection Process.mp4        2024-02-14 17:29   16M
 99. Exploring the Forensic Evidence Collection Process.mp4        2024-02-14 17:29   16M  
![[VID]](/icons/movie.gif) 100. Server Profiling.mp4                                         2024-02-14 17:35   26M
 100. Server Profiling.mp4                                         2024-02-14 17:35   26M  
![[VID]](/icons/movie.gif) 101. Network Profiling.mp4                                        2024-02-14 17:34   15M
 101. Network Profiling.mp4                                        2024-02-14 17:34   15M  
![[VID]](/icons/movie.gif) 102. Identifying Protected Network Data.mp4                       2024-02-14 17:34   14M
 102. Identifying Protected Network Data.mp4                       2024-02-14 17:34   14M  
![[VID]](/icons/movie.gif) 103. The Cyber Kill Chain.mp4                                     2024-02-14 17:32   12M
 103. The Cyber Kill Chain.mp4                                     2024-02-14 17:32   12M  
![[VID]](/icons/movie.gif) 104. SOC Metrics And Scope Analysis.mp4                           2024-02-14 17:34   12M
 104. SOC Metrics And Scope Analysis.mp4                           2024-02-14 17:34   12M