RAR-files |
linkedin.learning.cybersecurity.for.executives-xqzt.rar |
100,000,000 |
7A872A8B |
linkedin.learning.cybersecurity.for.executives-xqzt.r00 |
100,000,000 |
7D0B65B3 |
linkedin.learning.cybersecurity.for.executives-xqzt.r01 |
100,000,000 |
7D288D5E |
linkedin.learning.cybersecurity.for.executives-xqzt.r02 |
100,000,000 |
5AB3DA68 |
linkedin.learning.cybersecurity.for.executives-xqzt.r03 |
100,000,000 |
9C1E5C6A |
linkedin.learning.cybersecurity.for.executives-xqzt.r04 |
100,000,000 |
F2041B73 |
linkedin.learning.cybersecurity.for.executives-xqzt.r05 |
46,017,925 |
599584B0 |
|
Total size: |
646,017,925 |
|
|
Archived
files |
01.01-you_are_a_target_and_the_first_line_of_defense.mkv
[12766ecdbc0a489c]
|
37,116,371 |
3A4CBC50 |
02.01-understand_the_big_picture_overview.mkv
[61a4ac2605b738ee]
|
12,282,521 |
2DAF7A85 |
02.02-why_are_you_a_target.mkv
[dc35d569b63da1ff]
|
16,386,024 |
FD368060 |
02.03-example_organized_crime.mkv
[3de1c3f9b771585c]
|
25,989,568 |
1330904C |
02.04-why_are_you_in_the_line_of_fire.mkv
[5509b712ce008986]
|
20,992,235 |
030174AC |
02.05-example_cyber_war_cross-fire.mkv
[231664529cd36bf5]
|
15,048,964 |
EFA55A82 |
02.06-insider_threat_cyber_failure.mkv
[86e0ffdf081904dd]
|
22,204,961 |
F3F984C4 |
03.01-think_about_cybersecurity_summary.mkv
[25c4b01a5b2fcf56]
|
8,830,436 |
589D80AD |
03.02-not_what_you_buy_how_you_travel.mkv
[4fab9990a7c559d5]
|
24,333,409 |
4882AC09 |
03.03-germ_theory.mkv
[7073770ec66b079]
|
13,613,957 |
C1A158AB |
03.04-where_to_get_it_support.mkv
[d24c9dc179bc0690]
|
16,276,143 |
A3D73858 |
04.01-avoid_phishing_attacks_summary.mkv
[a1c93b73cbdfa2bd]
|
7,929,792 |
DB749C5E |
04.02-what_are_phishing_attacks.mkv
[7749797975d3db40]
|
21,196,246 |
93B7BB4E |
04.03-organizational_response_to_phishing_attacks.mkv
[1ec899b46f69930]
|
17,404,950 |
8AC47C05 |
05.01-stop_malicious_code_summary.mkv
[6a4c248a36e71864]
|
5,537,866 |
076F80F6 |
05.02-what_is_malicious_code.mkv
[af7cc6d611c369fe]
|
22,700,383 |
2465C4F7 |
05.03-organizational_response_to_malicious_code.mkv
[a183e32de5ca1b6d]
|
18,073,142 |
CA8EE7FD |
06.01-avoid_identity_theft_summary.mkv
[efcdf8d7974b8d2b]
|
4,324,266 |
EC5E2A0B |
06.02-what_is_identity_theft.mkv
[dccaf7f101e24efd]
|
19,587,700 |
3CB6BE49 |
06.03-organizational_response_to_identity_theft.mkv
[6752bd7d994bf3ed]
|
28,130,948 |
BF3DD591 |
07.01-avoid_financial_cyber_theft_summary.mkv
[9c07180c71cd8ea0]
|
4,803,405 |
AB48B904 |
07.02-what_is_financial_cyber_theft.mkv
[5b6065a4b15ac4a9]
|
29,352,580 |
5231B767 |
07.03-organizational_response_to_financial_cyber_theft.mkv
[d3074ac2dd122bb7]
|
28,844,395 |
02C1C362 |
08.01-special_topics_summary.mkv
[91d7c651ee2e93ba]
|
15,439,020 |
8E4BF522 |
08.02-reasonable_cybersecurity.mkv
[b38079250b64ec4d]
|
17,560,237 |
90BDD8F0 |
08.03-cyber_insurance.mkv
[a2fe52d3bd1608]
|
25,962,640 |
3E4E41A1 |
08.04-cloud_computing.mkv
[4d8f0adf9d97807b]
|
25,531,013 |
B2BA6991 |
08.05-internet_of_things.mkv
[ef05534e5ad6dd9d]
|
23,554,735 |
BB966319 |
08.06-contractual_firewalls.mkv
[1c0ae922e9eb3168]
|
28,451,181 |
DC9AE5BD |
08.07-third-party_cyber_risk_management.mkv
[6868671e3a02e2e3]
|
23,378,711 |
DC5FD6B7 |
08.08-cybersecurity-related_sales_objectives.mkv
[5ec76c2b64205c83]
|
25,635,595 |
DC3BD658 |
08.09-active_defense.mkv
[26855c126133f795]
|
26,962,807 |
17522479 |
09.01-next_steps.mkv
[e5c0d9184fc20df9]
|
12,578,505 |
5010965A |
|
Total size: |
646,014,706 |
|
|