"People must know the past to understand the present and face the future." ―Nellie McClung"
  • Anonymous
  • 2022-11-26 18:50:48
  • Unknown

RELEASE >

ReScene version pyReScene Auto 0.7 XQZT File size CRC
Download
35,347
Stored files
688 A3E9ACAB
28,220 4DC27A59
462 63B7E656
RAR-files
linkedin.learning.cybersecurity.for.executives-xqzt.rar 100,000,000 7A872A8B
linkedin.learning.cybersecurity.for.executives-xqzt.r00 100,000,000 7D0B65B3
linkedin.learning.cybersecurity.for.executives-xqzt.r01 100,000,000 7D288D5E
linkedin.learning.cybersecurity.for.executives-xqzt.r02 100,000,000 5AB3DA68
linkedin.learning.cybersecurity.for.executives-xqzt.r03 100,000,000 9C1E5C6A
linkedin.learning.cybersecurity.for.executives-xqzt.r04 100,000,000 F2041B73
linkedin.learning.cybersecurity.for.executives-xqzt.r05 46,017,925 599584B0

Total size: 646,017,925
Archived files
01.01-you_are_a_target_and_the_first_line_of_defense.mkv [12766ecdbc0a489c] 37,116,371 3A4CBC50
02.01-understand_the_big_picture_overview.mkv [61a4ac2605b738ee] 12,282,521 2DAF7A85
02.02-why_are_you_a_target.mkv [dc35d569b63da1ff] 16,386,024 FD368060
02.03-example_organized_crime.mkv [3de1c3f9b771585c] 25,989,568 1330904C
02.04-why_are_you_in_the_line_of_fire.mkv [5509b712ce008986] 20,992,235 030174AC
02.05-example_cyber_war_cross-fire.mkv [231664529cd36bf5] 15,048,964 EFA55A82
02.06-insider_threat_cyber_failure.mkv [86e0ffdf081904dd] 22,204,961 F3F984C4
03.01-think_about_cybersecurity_summary.mkv [25c4b01a5b2fcf56] 8,830,436 589D80AD
03.02-not_what_you_buy_how_you_travel.mkv [4fab9990a7c559d5] 24,333,409 4882AC09
03.03-germ_theory.mkv [7073770ec66b079] 13,613,957 C1A158AB
03.04-where_to_get_it_support.mkv [d24c9dc179bc0690] 16,276,143 A3D73858
04.01-avoid_phishing_attacks_summary.mkv [a1c93b73cbdfa2bd] 7,929,792 DB749C5E
04.02-what_are_phishing_attacks.mkv [7749797975d3db40] 21,196,246 93B7BB4E
04.03-organizational_response_to_phishing_attacks.mkv [1ec899b46f69930] 17,404,950 8AC47C05
05.01-stop_malicious_code_summary.mkv [6a4c248a36e71864] 5,537,866 076F80F6
05.02-what_is_malicious_code.mkv [af7cc6d611c369fe] 22,700,383 2465C4F7
05.03-organizational_response_to_malicious_code.mkv [a183e32de5ca1b6d] 18,073,142 CA8EE7FD
06.01-avoid_identity_theft_summary.mkv [efcdf8d7974b8d2b] 4,324,266 EC5E2A0B
06.02-what_is_identity_theft.mkv [dccaf7f101e24efd] 19,587,700 3CB6BE49
06.03-organizational_response_to_identity_theft.mkv [6752bd7d994bf3ed] 28,130,948 BF3DD591
07.01-avoid_financial_cyber_theft_summary.mkv [9c07180c71cd8ea0] 4,803,405 AB48B904
07.02-what_is_financial_cyber_theft.mkv [5b6065a4b15ac4a9] 29,352,580 5231B767
07.03-organizational_response_to_financial_cyber_theft.mkv [d3074ac2dd122bb7] 28,844,395 02C1C362
08.01-special_topics_summary.mkv [91d7c651ee2e93ba] 15,439,020 8E4BF522
08.02-reasonable_cybersecurity.mkv [b38079250b64ec4d] 17,560,237 90BDD8F0
08.03-cyber_insurance.mkv [a2fe52d3bd1608] 25,962,640 3E4E41A1
08.04-cloud_computing.mkv [4d8f0adf9d97807b] 25,531,013 B2BA6991
08.05-internet_of_things.mkv [ef05534e5ad6dd9d] 23,554,735 BB966319
08.06-contractual_firewalls.mkv [1c0ae922e9eb3168] 28,451,181 DC9AE5BD
08.07-third-party_cyber_risk_management.mkv [6868671e3a02e2e3] 23,378,711 DC5FD6B7
08.08-cybersecurity-related_sales_objectives.mkv [5ec76c2b64205c83] 25,635,595 DC3BD658
08.09-active_defense.mkv [26855c126133f795] 26,962,807 17522479
09.01-next_steps.mkv [e5c0d9184fc20df9] 12,578,505 5010965A

Total size: 646,014,706
Video files
Sample
linkedin.learning.cybersecurity.for.executives-xqzt-sample.mkv 9,327,953 1E3E376B
RAR Recovery
Not Present
Labels UNKNOWN