589689.xyz

[ ] Linkedin - Cybersecurity Awareness - Cybersecurity Terminology

  • 收录时间:2023-12-18 14:50:45
  • 文件大小:105MB
  • 下载次数:1
  • 最近下载:2023-12-18 14:50:45
  • 磁力链接:

文件列表

  1. ~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.mp4 10MB
  2. ~Get Your Files Here !/05 - 4. Technology/01 - Secure practices, terms, and exercises.mp4 10MB
  3. ~Get Your Files Here !/06 - 5. Threat Actors and Risks/02 - Technical risks.mp4 8MB
  4. ~Get Your Files Here !/03 - 2. People/01 - Security awareness and leadership.mp4 8MB
  5. ~Get Your Files Here !/03 - 2. People/04 - Understanding privacy.mp4 8MB
  6. ~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.mp4 7MB
  7. ~Get Your Files Here !/04 - 3. Process/02 - Technical controls.mp4 7MB
  8. ~Get Your Files Here !/05 - 4. Technology/02 - Network controls.mp4 7MB
  9. ~Get Your Files Here !/05 - 4. Technology/03 - Advancements in technology.mp4 7MB
  10. ~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.mp4 7MB
  11. ~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/01 - What is cybersecurity.mp4 6MB
  12. ~Get Your Files Here !/01 - Introduction/01 - Welcome to Cybersecurity Terminology 101.mp4 5MB
  13. ~Get Your Files Here !/03 - 2. People/02 - Red vs. blue vs. purple teams.mp4 5MB
  14. ~Get Your Files Here !/03 - 2. People/03 - Who are the adversaries.mp4 5MB
  15. ~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/02 - People, process, and technology.mp4 3MB
  16. ~Get Your Files Here !/07 - Conclusion/01 - Apply cybersecurity terminology.mp4 3MB
  17. ~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.srt 6KB
  18. ~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.srt 6KB
  19. ~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.srt 6KB
  20. ~Get Your Files Here !/04 - 3. Process/02 - Technical controls.srt 6KB
  21. ~Get Your Files Here !/06 - 5. Threat Actors and Risks/02 - Technical risks.srt 5KB
  22. ~Get Your Files Here !/05 - 4. Technology/02 - Network controls.srt 5KB
  23. ~Get Your Files Here !/03 - 2. People/01 - Security awareness and leadership.srt 5KB
  24. ~Get Your Files Here !/03 - 2. People/04 - Understanding privacy.srt 5KB
  25. ~Get Your Files Here !/05 - 4. Technology/01 - Secure practices, terms, and exercises.srt 5KB
  26. ~Get Your Files Here !/03 - 2. People/03 - Who are the adversaries.srt 4KB
  27. ~Get Your Files Here !/05 - 4. Technology/03 - Advancements in technology.srt 4KB
  28. ~Get Your Files Here !/03 - 2. People/02 - Red vs. blue vs. purple teams.srt 4KB
  29. ~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/01 - What is cybersecurity.srt 4KB
  30. ~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/02 - People, process, and technology.srt 2KB
  31. ~Get Your Files Here !/07 - Conclusion/01 - Apply cybersecurity terminology.srt 2KB
  32. ~Get Your Files Here !/01 - Introduction/01 - Welcome to Cybersecurity Terminology 101.srt 2KB
  33. ~Get Your Files Here !/Bonus Resources.txt 386B
  34. Get Bonus Downloads Here.url 176B