RAR-files |
linkedin.learning.cybersecurity.for.startups-xqzt.rar |
50,000,000 |
70454377 |
linkedin.learning.cybersecurity.for.startups-xqzt.r00 |
50,000,000 |
90040D13 |
linkedin.learning.cybersecurity.for.startups-xqzt.r01 |
50,000,000 |
3B8F529F |
linkedin.learning.cybersecurity.for.startups-xqzt.r02 |
50,000,000 |
3820CB53 |
linkedin.learning.cybersecurity.for.startups-xqzt.r03 |
50,000,000 |
C07CCF20 |
linkedin.learning.cybersecurity.for.startups-xqzt.r04 |
50,000,000 |
7CF497D0 |
linkedin.learning.cybersecurity.for.startups-xqzt.r05 |
50,000,000 |
32FD3367 |
linkedin.learning.cybersecurity.for.startups-xqzt.r06 |
50,000,000 |
18B7DDEF |
linkedin.learning.cybersecurity.for.startups-xqzt.r07 |
29,590,742 |
F9FD2C1D |
|
Total size: |
429,590,742 |
|
|
Archived
files |
01.01-startups_and_cybersecurity.mkv
[dee8d61011734701]
|
23,705,298 |
718BF2F7 |
02.01-why_cybersecurity_matters.mkv
[8357c1a4d5816db3]
|
6,562,057 |
5A32E046 |
02.02-a_market_differentiator.mkv
[85fc69b36f5824f9]
|
23,353,302 |
752683D0 |
03.01-threats_vulnerabilities_and_risks.mkv
[9a3cf1b561fc46f3]
|
17,197,230 |
B2E22A1D |
03.02-controls_and_countermeasures.mkv
[8e64e793375f11ad]
|
15,732,523 |
D11C5E81 |
03.03-security_vs._privacy.mkv
[98f974d74edd6aa6]
|
17,868,654 |
9C4FD1D1 |
03.04-integrated_risk_management.mkv
[bdbd262af92cc19f]
|
17,532,505 |
99EF589D |
04.01-leveraging_assessments.mkv
[d381edaf9be64d2]
|
12,752,931 |
367BB7D1 |
04.02-risk_assessments.mkv
[3a910378e1a17afb]
|
21,131,557 |
EE11B8D8 |
04.03-security_controls_assessments.mkv
[6a928ec51641db83]
|
17,394,190 |
453C66C8 |
04.04-compliance_assessments.mkv
[1d5392417752d14f]
|
21,011,953 |
FA9A1EC1 |
04.05-penetration_tests.mkv
[d7609cb79858545d]
|
20,720,604 |
E66BB841 |
04.06-the_capability_maturity_model.mkv
[f8cd808354653bd0]
|
14,546,297 |
CDF8D37D |
05.01-people_who_work_for_your_startup.mkv
[6132e6e98a654b07]
|
20,846,637 |
9B464FB5 |
05.02-people_who_work_with_your_startup.mkv
[b8f7f5088e715a26]
|
18,232,084 |
18A7C645 |
05.03-service_providers.mkv
[4e71572630ba6aac]
|
17,414,848 |
67EE9047 |
05.04-virtual_cisos.mkv
[3d1eede41eba1521]
|
13,169,984 |
BD9EDCC0 |
05.05-finding_your_community.mkv
[aec9c686ca1ef61c]
|
9,868,455 |
1A64EC5B |
06.01-embrace_simplicity.mkv
[337ac8c01ca3483]
|
16,736,368 |
CF3BFF3C |
06.02-securing_access.mkv
[db50e1ddb33b431e]
|
13,603,083 |
792DA343 |
06.03-securing_assets.mkv
[3bf33b48e368df82]
|
19,815,876 |
DCDC78FE |
06.04-securing_data.mkv
[e8e038dd44cb3333]
|
21,603,837 |
77EF0F2A |
06.05-securing_people.mkv
[3f63b4762313d655]
|
13,842,499 |
E972A533 |
06.06-ensuring_resilience.mkv
[ee8713cafcb4df64]
|
24,785,805 |
F9063C92 |
07.01-its_all_about_balance.mkv
[592290452bfe9408]
|
10,093,966 |
40ED630A |
Ex_Files_Cybersecurity_for_Startups.zip |
65,499 |
9E1FE7B7 |
|
Total size: |
429,588,042 |
|
|