el-hacker.org Downloads
    Name                                                                                      Last modified      Size
 Name                                                                                      Last modified      Size  
![[Volver]](/icons/back.gif) Parent Directory                                                                                               -
 Parent Directory                                                                                               -   
![[Directorio]](/icons/folder2.png) Chapter 40  Part 21 - Implement Physical Security/                                        2025-06-12 16:19    -
 Chapter 40  Part 21 - Implement Physical Security/                                        2025-06-12 16:19    -   
![[Directorio]](/icons/folder2.png) Chapter 39  Part 20 - Implement Cyber Security Resilience/                                2025-06-12 16:19    -
 Chapter 39  Part 20 - Implement Cyber Security Resilience/                                2025-06-12 16:19    -   
![[Directorio]](/icons/folder2.png) Chapter 38  Part 19 - Risk Management Processes and Concepts/                             2025-06-12 16:19    -
 Chapter 38  Part 19 - Risk Management Processes and Concepts/                             2025-06-12 16:19    -   
![[Directorio]](/icons/folder2.png) Chapter 37  Part 18 - Digital Forensics/                                                  2025-06-12 16:19    -
 Chapter 37  Part 18 - Digital Forensics/                                                  2025-06-12 16:19    -   
![[Directorio]](/icons/folder2.png) Chapter 36  Part 17 - Incident Response Procedures/                                       2025-06-12 16:19    -
 Chapter 36  Part 17 - Incident Response Procedures/                                       2025-06-12 16:19    -   
![[Directorio]](/icons/folder2.png) Chapter 35  Part 16 - Data Privacy & Protection Concepts/                                 2025-06-12 16:19    -
 Chapter 35  Part 16 - Data Privacy & Protection Concepts/                                 2025-06-12 16:19    -   
![[Directorio]](/icons/folder2.png) Chapter 34  Part 15 - Implement Secure Cloud Solutions/                                   2025-06-12 16:19    -
 Chapter 34  Part 15 - Implement Secure Cloud Solutions/                                   2025-06-12 16:19    -   
![[Directorio]](/icons/folder2.png) Chapter 33  Part 14 - Application Attacks/                                                2025-06-12 16:20    -
 Chapter 33  Part 14 - Application Attacks/                                                2025-06-12 16:20    -   
![[Directorio]](/icons/folder2.png) Chapter 32  Part 13 - Implement Secure Mobile Solutions/                                  2025-06-12 16:20    -
 Chapter 32  Part 13 - Implement Secure Mobile Solutions/                                  2025-06-12 16:20    -   
![[Directorio]](/icons/folder2.png) Chapter 31  Part 12 - Implement Host Security Solutions/                                  2025-06-12 16:20    -
 Chapter 31  Part 12 - Implement Host Security Solutions/                                  2025-06-12 16:20    -   
![[Directorio]](/icons/folder2.png) Chapter 30  Part 11 - Implement Secure Network Operations Protocols/                      2025-06-12 16:20    -
 Chapter 30  Part 11 - Implement Secure Network Operations Protocols/                      2025-06-12 16:20    -   
![[Directorio]](/icons/folder2.png) Chapter 29  Part 10 - Firewalls and Proxy Servers/                                        2025-06-12 16:21    -
 Chapter 29  Part 10 - Firewalls and Proxy Servers/                                        2025-06-12 16:21    -   
![[Directorio]](/icons/folder2.png) Chapter 28  Part 9 - Implementing Secure Network Designs/                                 2025-06-12 16:21    -
 Chapter 28  Part 9 - Implementing Secure Network Designs/                                 2025-06-12 16:21    -   
![[Directorio]](/icons/folder2.png) Chapter 27  Part 8 - Identity and Management Controls/                                    2025-06-12 16:21    -
 Chapter 27  Part 8 - Identity and Management Controls/                                    2025-06-12 16:21    -   
![[Directorio]](/icons/folder2.png) Chapter 26  Part 7 - Authentication Design Concepts/                                      2025-06-12 16:21    -
 Chapter 26  Part 7 - Authentication Design Concepts/                                      2025-06-12 16:21    -   
![[Directorio]](/icons/folder2.png) Chapter 25  Part 6 - Implementing Public Key Infrastructure/                              2025-06-12 16:21    -
 Chapter 25  Part 6 - Implementing Public Key Infrastructure/                              2025-06-12 16:21    -   
![[Directorio]](/icons/folder2.png) Chapter 24  Part 5 - Cryptographic Concepts, Hashing, Ciphers & Encryption/               2025-06-12 16:21    -
 Chapter 24  Part 5 - Cryptographic Concepts, Hashing, Ciphers & Encryption/               2025-06-12 16:21    -   
![[Directorio]](/icons/folder2.png) Chapter 23  Part 4 - Social Engineering Techniques & Malware/                             2025-06-12 16:26    -
 Chapter 23  Part 4 - Social Engineering Techniques & Malware/                             2025-06-12 16:26    -   
![[Directorio]](/icons/folder2.png) Chapter 22  Part 3 - Performing Security Assessments/                                     2025-06-12 16:32    -
 Chapter 22  Part 3 - Performing Security Assessments/                                     2025-06-12 16:32    -   
![[Directorio]](/icons/folder2.png) Chapter 21  Section 2 - Explaining Threat Actors And Threat Vectors/                      2025-06-12 16:32    -
 Chapter 21  Section 2 - Explaining Threat Actors And Threat Vectors/                      2025-06-12 16:32    -   
![[Directorio]](/icons/folder2.png) Chapter 20  Part 1 - Intro To Information Security And Security Roles & Responsibilities/ 2025-06-12 16:32    -
 Chapter 20  Part 1 - Intro To Information Security And Security Roles & Responsibilities/ 2025-06-12 16:32    -   
![[Directorio]](/icons/folder2.png) Chapter 19  Welcome to the Course (SY0-601)/                                              2025-06-12 16:32    -
 Chapter 19  Welcome to the Course (SY0-601)/                                              2025-06-12 16:32    -   
![[Directorio]](/icons/folder2.png) Chapter 18  Conclusion/                                                                   2025-06-12 16:32    -
 Chapter 18  Conclusion/                                                                   2025-06-12 16:32    -   
![[Directorio]](/icons/folder2.png) Chapter 17  Part 16 - Summarize Data Protection and Compliance Concepts/                  2025-06-12 16:32    -
 Chapter 17  Part 16 - Summarize Data Protection and Compliance Concepts/                  2025-06-12 16:32    -   
![[Directorio]](/icons/folder2.png) Chapter 16  Part 15 - Explain Risk Management/                                            2025-06-12 16:33    -
 Chapter 16  Part 15 - Explain Risk Management/                                            2025-06-12 16:33    -   
![[Directorio]](/icons/folder2.png) Chapter 15  Part 14 - Summarize Security Governance Concepts/                             2025-06-12 16:33    -
 Chapter 15  Part 14 - Summarize Security Governance Concepts/                             2025-06-12 16:33    -   
![[Directorio]](/icons/folder2.png) Chapter 14  Part 13 - Analyze Indicators of Malicious Activity/                           2025-06-12 16:33    -
 Chapter 14  Part 13 - Analyze Indicators of Malicious Activity/                           2025-06-12 16:33    -   
![[Directorio]](/icons/folder2.png) Chapter 13  Part 12 - Explain Incident Response and Monitoring Concepts/                  2025-06-12 16:33    -
 Chapter 13  Part 12 - Explain Incident Response and Monitoring Concepts/                  2025-06-12 16:33    -   
![[Directorio]](/icons/folder2.png) Chapter 12  Part 11 - Enhance Application Security Capabilities/                          2025-06-12 16:33    -
 Chapter 12  Part 11 - Enhance Application Security Capabilities/                          2025-06-12 16:33    -   
![[Directorio]](/icons/folder2.png) Chapter 11  Part 10 - Assess Endpoint Security Capabilities/                              2025-06-12 16:33    -
 Chapter 11  Part 10 - Assess Endpoint Security Capabilities/                              2025-06-12 16:33    -   
![[Directorio]](/icons/folder2.png) Chapter 10  Part 9 - Evaluate Network Security Capabilities/                              2025-06-12 16:33    -
 Chapter 10  Part 9 - Evaluate Network Security Capabilities/                              2025-06-12 16:33    -   
![[Directorio]](/icons/folder2.png) Chapter 9  Part 8 - Explain Vulnerability Management/                                     2025-06-12 16:18    -
 Chapter 9  Part 8 - Explain Vulnerability Management/                                     2025-06-12 16:18    -   
![[Directorio]](/icons/folder2.png) Chapter 8  Part 7 - Explain Resiliency and Site Security Concepts/                        2025-06-12 16:18    -
 Chapter 8  Part 7 - Explain Resiliency and Site Security Concepts/                        2025-06-12 16:18    -   
![[Directorio]](/icons/folder2.png) Chapter 7  Part 6 - Secure Cloud Network Architecture/                                    2025-06-12 16:18    -
 Chapter 7  Part 6 - Secure Cloud Network Architecture/                                    2025-06-12 16:18    -   
![[Directorio]](/icons/folder2.png) Chapter 6  Part 5 - Secure Enterprise Network Architecture/                               2025-06-12 16:18    -
 Chapter 6  Part 5 - Secure Enterprise Network Architecture/                               2025-06-12 16:18    -   
![[Directorio]](/icons/folder2.png) Chapter 5  Part 4 - Implement Identity and Access Management/                             2025-06-12 16:19    -
 Chapter 5  Part 4 - Implement Identity and Access Management/                             2025-06-12 16:19    -   
![[Directorio]](/icons/folder2.png) Chapter 4  Part 3 - Explain Cryptographic Solutions/                                      2025-06-12 16:19    -
 Chapter 4  Part 3 - Explain Cryptographic Solutions/                                      2025-06-12 16:19    -   
![[Directorio]](/icons/folder2.png) Chapter 3  Part 2 - Compare Threat Types/                                                 2025-06-12 16:21    -
 Chapter 3  Part 2 - Compare Threat Types/                                                 2025-06-12 16:21    -   
![[Directorio]](/icons/folder2.png) Chapter 2  Part 1 - Summarize Fundamental Security Concepts/                              2025-06-12 16:32    -
 Chapter 2  Part 1 - Summarize Fundamental Security Concepts/                              2025-06-12 16:32    -   
![[Directorio]](/icons/folder2.png) Chapter 1  Welcome to the Course SY0-701/                                                 2025-06-12 16:33    -
 Chapter 1  Welcome to the Course SY0-701/                                                 2025-06-12 16:33    -