el-hacker.org Downloads
   
 Name                                                                             Last modified      Size  
 Parent Directory                                                                                      -   
 17. Cyber War.mp4                                                                2023-11-27 16:33   45M  
 6. Popular myths about IT security - origins.mp4                                 2023-11-27 16:33   44M  
 2. IT Prehistory.mp4                                                             2023-11-27 16:32   44M  
 1. Introduction to Current Cyber Threats.mp4                                     2023-11-27 16:32   39M  
 19. Objective #1 - Data security - Introduction.mp4                              2023-11-27 16:33   39M  
 3. Let’s look a few years back.mp4                                             2023-11-27 16:33   36M  
 22. Integrity of data.mp4                                                        2023-11-27 16:32   32M  
 15. Online privacy.mp4                                                           2023-11-27 16:33   32M  
 20. Confidentiality of data.mp4                                                  2023-11-27 16:33   32M  
 4. Cyber crimes - an evolution not revolution.mp4                                2023-11-27 16:33   31M  
 7. Myths #1 - you’ll never be hacked.mp4                                       2023-11-27 16:33   29M  
 8. Myths #2 - you don’t need any protection software or hardware.mp4           2023-11-27 16:33   26M  
 21. EXERCISE Finding confidential data with search engines.mp4                   2023-11-27 16:32   23M  
 14. Fake identity.mp4                                                            2023-11-27 16:32   22M  
 16. Analyzing sniffing software.mp4                                              2023-11-27 16:33   20M  
 11. Trends in IT Security.mp4                                                    2023-11-27 16:32   19M  
 12. The birth of technology society.mp4                                          2023-11-27 16:32   19M  
 13. EXERCISE How much info can you gather.mp4                                    2023-11-27 16:32   14M  
 9. Myths #3 - IT security is always a priority.mp4                               2023-11-27 16:33  6.0M  
 18. Changing IT Security Trends - notes for the examination.pdf                  2023-11-27 16:33  2.0M  
 23. Data security - notes for the examination.pdf                                2023-11-27 16:32  2.0M  
 5. Current Cyber Threats - notes for the examination.pdf                         2023-11-27 16:32  1.5M  
 10. Popular Myths About Computer System Security - notes for the examination.pdf 2023-11-27 16:32  1.0M  
 17. Cyber War.srt                                                                2023-11-27 16:33  8.8K  
 17. Cyber War.vtt                                                                2023-11-27 16:33  7.7K  
 19. Objective #1 - Data security - Introduction.srt                              2023-11-27 16:33  7.3K  
 22. Integrity of data.srt                                                        2023-11-27 16:32  7.0K  
 7. Myths #1 - you’ll never be hacked.srt                                       2023-11-27 16:33  6.9K  
 15. Online privacy.srt                                                           2023-11-27 16:32  6.7K  
 19. Objective #1 - Data security - Introduction.vtt                              2023-11-27 16:33  6.4K  
 6. Popular myths about IT security - origins.srt                                 2023-11-27 16:32  6.4K  
 8. Myths #2 - you don’t need any protection software or hardware.srt           2023-11-27 16:33  6.3K  
 22. Integrity of data.vtt                                                        2023-11-27 16:32  6.2K  
 1. Introduction to Current Cyber Threats.srt                                     2023-11-27 16:32  6.1K  
 3. Let’s look a few years back.srt                                             2023-11-27 16:32  6.0K  
 7. Myths #1 - you’ll never be hacked.vtt                                       2023-11-27 16:33  6.0K  
 21. EXERCISE Finding confidential data with search engines.srt                   2023-11-27 16:33  6.0K  
 15. Online privacy.vtt                                                           2023-11-27 16:32  5.9K  
 4. Cyber crimes - an evolution not revolution.srt                                2023-11-27 16:32  5.8K  
 2. IT Prehistory.srt                                                             2023-11-27 16:33  5.7K  
 6. Popular myths about IT security - origins.vtt                                 2023-11-27 16:32  5.6K  
 14. Fake identity.srt                                                            2023-11-27 16:32  5.6K  
 20. Confidentiality of data.srt                                                  2023-11-27 16:33  5.6K  
 8. Myths #2 - you don’t need any protection software or hardware.vtt           2023-11-27 16:33  5.5K  
 1. Introduction to Current Cyber Threats.vtt                                     2023-11-27 16:32  5.3K  
 3. Let’s look a few years back.vtt                                             2023-11-27 16:32  5.3K  
 21. EXERCISE Finding confidential data with search engines.vtt                   2023-11-27 16:33  5.2K  
 4. Cyber crimes - an evolution not revolution.vtt                                2023-11-27 16:32  5.1K  
 2. IT Prehistory.vtt                                                             2023-11-27 16:33  5.0K  
 14. Fake identity.vtt                                                            2023-11-27 16:32  4.9K  
 20. Confidentiality of data.vtt                                                  2023-11-27 16:33  4.9K  
 13. EXERCISE How much info can you gather.srt                                    2023-11-27 16:32  4.2K  
 11. Trends in IT Security.srt                                                    2023-11-27 16:32  4.2K  
 16. Analyzing sniffing software.srt                                              2023-11-27 16:32  3.7K  
 13. EXERCISE How much info can you gather.vtt                                    2023-11-27 16:32  3.7K  
 11. Trends in IT Security.vtt                                                    2023-11-27 16:32  3.7K  
 12. The birth of technology society.srt                                          2023-11-27 16:32  3.4K  
 16. Analyzing sniffing software.vtt                                              2023-11-27 16:32  3.3K  
 12. The birth of technology society.vtt                                          2023-11-27 16:32  3.1K  
 9. Myths #3 - IT security is always a priority.srt                               2023-11-27 16:33  1.3K  
 9. Myths #3 - IT security is always a priority.vtt                               2023-11-27 16:33  1.1K