el-hacker.org Downloads
    Name                                                                                        Last modified      Size
 Name                                                                                        Last modified      Size  
![[Volver]](/icons/back.gif) Parent Directory                                                                                                 -
 Parent Directory                                                                                                 -   
![[Directorio]](/icons/folder2.png) 01. Chapter 0 About the CySA Exam @udemyrip/                                                2025-10-17 11:37    -
 01. Chapter 0 About the CySA Exam @udemyrip/                                                2025-10-17 11:37    -   
![[Directorio]](/icons/folder2.png) 02. Chapter 1 System and Network Architectures @udemyrip/                                   2025-10-17 11:37    -
 02. Chapter 1 System and Network Architectures @udemyrip/                                   2025-10-17 11:37    -   
![[Directorio]](/icons/folder2.png) 03. Chapter 2 Threat Intelligence in Support of Organizational Security @udemyrip/          2025-10-17 11:36    -
 03. Chapter 2 Threat Intelligence in Support of Organizational Security @udemyrip/          2025-10-17 11:36    -   
![[Directorio]](/icons/folder2.png) 04. Chapter 3 Attack Methodology Frameworks @udemyrip/                                      2025-10-17 11:36    -
 04. Chapter 3 Attack Methodology Frameworks @udemyrip/                                      2025-10-17 11:36    -   
![[Directorio]](/icons/folder2.png) 05. Chapter 4 Analyzing Potentially Malicious Activity @udemyrip/                           2025-10-17 11:36    -
 05. Chapter 4 Analyzing Potentially Malicious Activity @udemyrip/                           2025-10-17 11:36    -   
![[Directorio]](/icons/folder2.png) 06. Chapter 5 Techniques for Malicious Activity Analysis @udemyrip/                         2025-10-17 11:36    -
 06. Chapter 5 Techniques for Malicious Activity Analysis @udemyrip/                         2025-10-17 11:36    -   
![[Directorio]](/icons/folder2.png) 07. Chapter 6 Tools for Malicious Activity Analysis @udemyrip/                              2025-10-17 11:35    -
 07. Chapter 6 Tools for Malicious Activity Analysis @udemyrip/                              2025-10-17 11:35    -   
![[Directorio]](/icons/folder2.png) 08. Chapter 7 Fundamentals of Threat Intelligence @udemyrip/                                2025-10-17 11:35    -
 08. Chapter 7 Fundamentals of Threat Intelligence @udemyrip/                                2025-10-17 11:35    -   
![[Directorio]](/icons/folder2.png) 09. Chapter 8 Applying Threat Intelligence in Support of Organizational Security @udemyrip/ 2025-10-17 11:35    -
 09. Chapter 8 Applying Threat Intelligence in Support of Organizational Security @udemyrip/ 2025-10-17 11:35    -   
![[Directorio]](/icons/folder2.png) 10. Chapter 9 Vulnerability Scanning Methods and Concepts @udemyrip/                        2025-10-17 11:35    -
 10. Chapter 9 Vulnerability Scanning Methods and Concepts @udemyrip/                        2025-10-17 11:35    -   
![[Directorio]](/icons/folder2.png) 11. Chapter 10 Vulnerability Assessment Tools @udemyrip/                                    2025-10-17 11:34    -
 11. Chapter 10 Vulnerability Assessment Tools @udemyrip/                                    2025-10-17 11:34    -   
![[Directorio]](/icons/folder2.png) 12. Chapter 11 Analyzing and Prioritizing Vulnerabilities @udemyrip/                        2025-10-17 11:33    -
 12. Chapter 11 Analyzing and Prioritizing Vulnerabilities @udemyrip/                        2025-10-17 11:33    -   
![[Directorio]](/icons/folder2.png) 13. Chapter 12 Mitigating Vulnerabilities @udemyrip/                                        2025-10-17 11:33    -
 13. Chapter 12 Mitigating Vulnerabilities @udemyrip/                                        2025-10-17 11:33    -   
![[Directorio]](/icons/folder2.png) 14. Chapter 13 Vulnerability Handling and Response @udemyrip/                               2025-10-17 11:33    -
 14. Chapter 13 Vulnerability Handling and Response @udemyrip/                               2025-10-17 11:33    -   
![[Directorio]](/icons/folder2.png) 15. Chapter 14 Incident Response Procedures @udemyrip/                                      2025-10-17 11:33    -
 15. Chapter 14 Incident Response Procedures @udemyrip/                                      2025-10-17 11:33    -   
![[Directorio]](/icons/folder2.png) 16. Chapter 15 Post-Incident Response Activities @udemyrip/                                 2025-10-17 11:33    -
 16. Chapter 15 Post-Incident Response Activities @udemyrip/                                 2025-10-17 11:33    -   
![[Directorio]](/icons/folder2.png) 17. Chapter 16 Utilize Basic Digital Forensics Techniques @udemyrip/                        2025-10-17 11:33    -
 17. Chapter 16 Utilize Basic Digital Forensics Techniques @udemyrip/                        2025-10-17 11:33    -