Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
1. 100 Multiple Choice Questions on Cyber Security.html |
202б |
1. Awareness.mp4 |
7.99Мб |
1. Awareness.srt |
1.30Кб |
1. Backup and Data Recovery.mp4 |
9.39Мб |
1. Backup and Data Recovery.srt |
1.51Кб |
1. BluVector.mp4 |
7.72Мб |
1. BluVector.srt |
1.39Кб |
1. Expensive for businesses.mp4 |
3.90Мб |
1. Expensive for businesses.srt |
770б |
1. Incident Response Analyst.mp4 |
10.17Мб |
1. Incident Response Analyst.srt |
1.67Кб |
1. Introduction.mp4 |
25.26Мб |
1. Introduction.srt |
3.94Кб |
1. Keylogging.mp4 |
5.75Мб |
1. Keylogging.srt |
1.02Кб |
1. Malware.mp4 |
6.88Мб |
1. Malware.srt |
1.14Кб |
1. Recap.mp4 |
5.82Мб |
1. Recap.srt |
1.15Кб |
1. What is Cyber Security.mp4 |
23.83Мб |
1. What is Cyber Security.srt |
3.61Кб |
1. What is Data Science.mp4 |
24.98Мб |
1. What is Data Science.srt |
3.90Кб |
10. Vulnerability Assessments and Security Training.mp4 |
5.53Мб |
10. Vulnerability Assessments and Security Training.srt |
942б |
2. 100 Multiple Choice Questions on Cyber Security.html |
202б |
2. Bricata.mp4 |
10.18Мб |
2. Bricata.srt |
1.75Кб |
2. Complicated for businesses.mp4 |
3.85Мб |
2. Complicated for businesses.srt |
684б |
2. History of Cyber Security.mp4 |
22.56Мб |
2. History of Cyber Security.srt |
3.81Кб |
2. History of Data Science.mp4 |
26.27Мб |
2. History of Data Science.srt |
3.77Кб |
2. Packet Sniffing.mp4 |
9.20Мб |
2. Packet Sniffing.srt |
1.62Кб |
2. Physical Access Controls.mp4 |
5.09Мб |
2. Physical Access Controls.srt |
829б |
2. Ransomware Attacks.mp4 |
13.57Мб |
2. Ransomware Attacks.srt |
2.40Кб |
2. Risk Analyst.mp4 |
9.02Мб |
2. Risk Analyst.srt |
1.55Кб |
2. Threat Reduction.mp4 |
9.13Мб |
2. Threat Reduction.srt |
1.45Кб |
3. Avoid Downtime.mp4 |
3.79Мб |
3. Avoid Downtime.srt |
700б |
3. Benefits of Cyber Security.mp4 |
14.45Мб |
3. Benefits of Cyber Security.srt |
2.37Кб |
3. Benefits of Data Science.mp4 |
19.96Мб |
3. Benefits of Data Science.srt |
3.19Кб |
3. Bug Bounties.mp4 |
5.76Мб |
3. Bug Bounties.srt |
1.02Кб |
3. Cloud Defender.mp4 |
9.69Мб |
3. Cloud Defender.srt |
1.69Кб |
3. Logical Access Controls.mp4 |
7.96Мб |
3. Logical Access Controls.srt |
1.18Кб |
3. Man in the Middle Attacks.mp4 |
7.93Мб |
3. Man in the Middle Attacks.srt |
1.45Кб |
3. Penetration Tester.mp4 |
8.94Мб |
3. Penetration Tester.srt |
1.41Кб |
3. Requires constant monitoring.mp4 |
2.67Мб |
3. Requires constant monitoring.srt |
504б |
4. Breaking Caesar Cipher.mp4 |
6.27Мб |
4. Breaking Caesar Cipher.srt |
994б |
4. Careers in Cyber Security.mp4 |
20.19Мб |
4. Careers in Cyber Security.srt |
3.29Кб |
4. Careers in Data Science.mp4 |
25.09Мб |
4. Careers in Data Science.srt |
4.07Кб |
4. Cofense Triage.mp4 |
11.06Мб |
4. Cofense Triage.srt |
1.69Кб |
4. Compliance.mp4 |
9.54Мб |
4. Compliance.srt |
1.52Кб |
4. Distributed Denial of Service (DDoS).mp4 |
10.44Мб |
4. Distributed Denial of Service (DDoS).srt |
1.42Кб |
4. Not a one-time thing.mp4 |
3.76Мб |
4. Not a one-time thing.srt |
693б |
4. Securely Configured and Encrypted Devices.mp4 |
7.49Мб |
4. Securely Configured and Encrypted Devices.srt |
1.14Кб |
4. Security Engineer.mp4 |
8.62Мб |
4. Security Engineer.srt |
1.51Кб |
5. Contrast Security.mp4 |
6.73Мб |
5. Contrast Security.srt |
1.14Кб |
5. Forensics Analyst.mp4 |
10.60Мб |
5. Forensics Analyst.srt |
1.70Кб |
5. Future of Cyber Security.mp4 |
28.91Мб |
5. Future of Cyber Security.srt |
4.43Кб |
5. Future of Data Science.mp4 |
20.54Мб |
5. Future of Data Science.srt |
3.32Кб |
5. Increase Customer Confidence.mp4 |
10.29Мб |
5. Increase Customer Confidence.srt |
1.56Кб |
5. Password Attacks.mp4 |
15.67Мб |
5. Password Attacks.srt |
2.32Кб |
5. Risky for businesses.mp4 |
2.95Мб |
5. Risky for businesses.srt |
583б |
5. Securely Configured Network Components.mp4 |
3.87Мб |
5. Securely Configured Network Components.srt |
661б |
5. SQL Injection.mp4 |
5.99Мб |
5. SQL Injection.srt |
1.07Кб |
6. Chief information security officer (CISO).mp4 |
12.45Мб |
6. Chief information security officer (CISO).srt |
1.85Кб |
6. Digital Gaurdian.mp4 |
10.60Мб |
6. Digital Gaurdian.srt |
1.69Кб |
6. Drive-By Download Attacks.mp4 |
10.19Мб |
6. Drive-By Download Attacks.srt |
1.82Кб |
6. Network segmentation.mp4 |
3.10Мб |
6. Network segmentation.srt |
607б |
6. Removing and Retrieving Files.mp4 |
5.20Мб |
6. Removing and Retrieving Files.srt |
946б |
7. Chief Information Officers (CIO).mp4 |
13.17Мб |
7. Chief Information Officers (CIO).srt |
2.12Кб |
7. Email and Online Protection.mp4 |
7.44Мб |
7. Email and Online Protection.srt |
1.32Кб |
7. Mantix4.mp4 |
6.31Мб |
7. Mantix4.srt |
1.03Кб |
7. Password Strength.mp4 |
6.64Мб |
7. Password Strength.srt |
1.12Кб |
8. Blocking RFID.mp4 |
5.71Мб |
8. Blocking RFID.srt |
978б |
8. SecBI.mp4 |
9.90Мб |
8. SecBI.srt |
1.64Кб |
8. Wireless security.mp4 |
4.14Мб |
8. Wireless security.srt |
810б |
9. Maintenance, Monitoring and Patching.mp4 |
7.94Мб |
9. Maintenance, Monitoring and Patching.srt |
1.27Кб |
Bonus Resources.txt |
386б |
Get Bonus Downloads Here.url |
182б |