el-hacker.org Downloads
   
 Name                                                                                        Last modified      Size  
 Parent Directory                                                                                                 -   
 01. Chapter 0 About the CySA Exam @udemyrip/                                                2025-10-17 11:37    -   
 02. Chapter 1 System and Network Architectures @udemyrip/                                   2025-10-17 11:37    -   
 03. Chapter 2 Threat Intelligence in Support of Organizational Security @udemyrip/          2025-10-17 11:36    -   
 04. Chapter 3 Attack Methodology Frameworks @udemyrip/                                      2025-10-17 11:36    -   
 05. Chapter 4 Analyzing Potentially Malicious Activity @udemyrip/                           2025-10-17 11:36    -   
 06. Chapter 5 Techniques for Malicious Activity Analysis @udemyrip/                         2025-10-17 11:36    -   
 07. Chapter 6 Tools for Malicious Activity Analysis @udemyrip/                              2025-10-17 11:35    -   
 08. Chapter 7 Fundamentals of Threat Intelligence @udemyrip/                                2025-10-17 11:35    -   
 09. Chapter 8 Applying Threat Intelligence in Support of Organizational Security @udemyrip/ 2025-10-17 11:35    -   
 10. Chapter 9 Vulnerability Scanning Methods and Concepts @udemyrip/                        2025-10-17 11:35    -   
 11. Chapter 10 Vulnerability Assessment Tools @udemyrip/                                    2025-10-17 11:34    -   
 12. Chapter 11 Analyzing and Prioritizing Vulnerabilities @udemyrip/                        2025-10-17 11:33    -   
 13. Chapter 12 Mitigating Vulnerabilities @udemyrip/                                        2025-10-17 11:33    -   
 14. Chapter 13 Vulnerability Handling and Response @udemyrip/                               2025-10-17 11:33    -   
 15. Chapter 14 Incident Response Procedures @udemyrip/                                      2025-10-17 11:33    -   
 16. Chapter 15 Post-Incident Response Activities @udemyrip/                                 2025-10-17 11:33    -   
 17. Chapter 16 Utilize Basic Digital Forensics Techniques @udemyrip/                        2025-10-17 11:33    -