|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| 01.Cybersecurity for executives.en.srt |
2.10KB |
| 01.Cybersecurity for executives.mp4 |
4.11MB |
| 02.What you should know.en.srt |
1.33KB |
| 02.What you should know.mp4 |
1.17MB |
| 03.How this course is organized.en.srt |
1.62KB |
| 03.How this course is organized.mp4 |
2.15MB |
| 04.Understand the big picture overview.en.srt |
2.08KB |
| 04.Understand the big picture overview.mp4 |
4.54MB |
| 05.Why are you a target.en.srt |
3.86KB |
| 05.Why are you a target.mp4 |
7.72MB |
| 06.Example - Organized crime.en.srt |
4.37KB |
| 06.Example - Organized crime.mp4 |
9.22MB |
| 07.Why are you in the line of fire.en.srt |
3.47KB |
| 07.Why are you in the line of fire.mp4 |
6.79MB |
| 08.Example - Cyberwar cross-fire.en.srt |
3.19KB |
| 08.Example - Cyberwar cross-fire.mp4 |
7.21MB |
| 09.Insider threat - Cyber failure.en.srt |
4.28KB |
| 09.Insider threat - Cyber failure.mp4 |
7.29MB |
| 10.Think about cybersecurity summary.en.srt |
1.62KB |
| 10.Think about cybersecurity summary.mp4 |
2.75MB |
| 11.Not what you buy, how you travel.en.srt |
5.88KB |
| 11.Not what you buy, how you travel.mp4 |
10.49MB |
| 12.Germ theory.en.srt |
2.63KB |
| 12.Germ theory.mp4 |
7.65MB |
| 13.Where to get IT support.en.srt |
6.13KB |
| 13.Where to get IT support.mp4 |
10.53MB |
| 14.Avoid phishing attacks summary.en.srt |
1.53KB |
| 14.Avoid phishing attacks summary.mp4 |
3.08MB |
| 15.What are phishing attacks.en.srt |
3.61KB |
| 15.What are phishing attacks.mp4 |
9.67MB |
| 16.How to avoid phishing attacks.en.srt |
4.27KB |
| 16.How to avoid phishing attacks.mp4 |
7.99MB |
| 17.Organizational response to phishing attacks.en.srt |
4.49KB |
| 17.Organizational response to phishing attacks.mp4 |
6.35MB |
| 18.Stop malicious code summary.en.srt |
1014B |
| 18.Stop malicious code summary.mp4 |
1.26MB |
| 19.What is malicious code.en.srt |
4.39KB |
| 19.What is malicious code.mp4 |
8.07MB |
| 20.How to avoid malicious code.en.srt |
6.75KB |
| 20.How to avoid malicious code.mp4 |
11.88MB |
| 21.Organizational response to malicious code.en.srt |
5.03KB |
| 21.Organizational response to malicious code.mp4 |
7.25MB |
| 22.Avoid identity theft summary.en.srt |
1019B |
| 22.Avoid identity theft summary.mp4 |
2.05MB |
| 23.What is identity theft.en.srt |
4.16KB |
| 23.What is identity theft.mp4 |
8.22MB |
| 24.How to avoid identity theft.en.srt |
5.45KB |
| 24.How to avoid identity theft.mp4 |
10.87MB |
| 25.Organizational response to identity theft.en.srt |
5.88KB |
| 25.Organizational response to identity theft.mp4 |
8.06MB |
| 26.Avoid financial cybertheft summary.en.srt |
1.01KB |
| 26.Avoid financial cybertheft summary.mp4 |
1.87MB |
| 27.What is financial cybertheft.en.srt |
4.62KB |
| 27.What is financial cybertheft.mp4 |
9.15MB |
| 28.How to avoid financial cybertheft.en.srt |
5.54KB |
| 28.How to avoid financial cybertheft.mp4 |
8.14MB |
| 29.Organizational response to financial cybertheft.en.srt |
5.60KB |
| 29.Organizational response to financial cybertheft.mp4 |
7.48MB |
| 30.Avoid cyberattacks summary.en.srt |
1.04KB |
| 30.Avoid cyberattacks summary.mp4 |
1.87MB |
| 31.What are cyberattacks on long trips.en.srt |
4.06KB |
| 31.What are cyberattacks on long trips.mp4 |
8.06MB |
| 32.How to avoid cyberattacks on long trips.en.srt |
4.50KB |
| 32.How to avoid cyberattacks on long trips.mp4 |
7.37MB |
| 33.Organizational response to cyberattacks on long trips.en.srt |
4.11KB |
| 33.Organizational response to cyberattacks on long trips.mp4 |
5.92MB |
| 34.Special topics summary.en.srt |
3.08KB |
| 34.Special topics summary.mp4 |
5.86MB |
| 35.Reasonable cybersecurity.en.srt |
5.69KB |
| 35.Reasonable cybersecurity.mp4 |
9.97MB |
| 36.Cyber insurance.en.srt |
4.78KB |
| 36.Cyber insurance.mp4 |
8.05MB |
| 37.Cloud computing.en.srt |
5.41KB |
| 37.Cloud computing.mp4 |
7.05MB |
| 38.Internet of Things.en.srt |
3.79KB |
| 38.Internet of Things.mp4 |
6.09MB |
| 39.Contractual firewalls.en.srt |
5.68KB |
| 39.Contractual firewalls.mp4 |
7.16MB |
| 40.Third-party cyber risk management.en.srt |
4.97KB |
| 40.Third-party cyber risk management.mp4 |
7.63MB |
| 41.Cybersecurity-related sales objectives.en.srt |
6.03KB |
| 41.Cybersecurity-related sales objectives.mp4 |
10.92MB |
| 42.Active defense.en.srt |
4.79KB |
| 42.Active defense.mp4 |
5.74MB |
| 43.Next steps.en.srt |
1.66KB |
| 43.Next steps.mp4 |
1.96MB |