|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| 1. 100 Multiple Choice Questions on Cyber Security.html |
202б |
| 1. Awareness.mp4 |
7.99Мб |
| 1. Awareness.srt |
1.30Кб |
| 1. Backup and Data Recovery.mp4 |
9.39Мб |
| 1. Backup and Data Recovery.srt |
1.51Кб |
| 1. BluVector.mp4 |
7.72Мб |
| 1. BluVector.srt |
1.39Кб |
| 1. Expensive for businesses.mp4 |
3.90Мб |
| 1. Expensive for businesses.srt |
770б |
| 1. Incident Response Analyst.mp4 |
10.17Мб |
| 1. Incident Response Analyst.srt |
1.67Кб |
| 1. Introduction.mp4 |
25.26Мб |
| 1. Introduction.srt |
3.94Кб |
| 1. Keylogging.mp4 |
5.75Мб |
| 1. Keylogging.srt |
1.02Кб |
| 1. Malware.mp4 |
6.88Мб |
| 1. Malware.srt |
1.14Кб |
| 1. Recap.mp4 |
5.82Мб |
| 1. Recap.srt |
1.15Кб |
| 1. What is Cyber Security.mp4 |
23.83Мб |
| 1. What is Cyber Security.srt |
3.61Кб |
| 1. What is Data Science.mp4 |
24.98Мб |
| 1. What is Data Science.srt |
3.90Кб |
| 10. Vulnerability Assessments and Security Training.mp4 |
5.53Мб |
| 10. Vulnerability Assessments and Security Training.srt |
942б |
| 2. 100 Multiple Choice Questions on Cyber Security.html |
202б |
| 2. Bricata.mp4 |
10.18Мб |
| 2. Bricata.srt |
1.75Кб |
| 2. Complicated for businesses.mp4 |
3.85Мб |
| 2. Complicated for businesses.srt |
684б |
| 2. History of Cyber Security.mp4 |
22.56Мб |
| 2. History of Cyber Security.srt |
3.81Кб |
| 2. History of Data Science.mp4 |
26.27Мб |
| 2. History of Data Science.srt |
3.77Кб |
| 2. Packet Sniffing.mp4 |
9.20Мб |
| 2. Packet Sniffing.srt |
1.62Кб |
| 2. Physical Access Controls.mp4 |
5.09Мб |
| 2. Physical Access Controls.srt |
829б |
| 2. Ransomware Attacks.mp4 |
13.57Мб |
| 2. Ransomware Attacks.srt |
2.40Кб |
| 2. Risk Analyst.mp4 |
9.02Мб |
| 2. Risk Analyst.srt |
1.55Кб |
| 2. Threat Reduction.mp4 |
9.13Мб |
| 2. Threat Reduction.srt |
1.45Кб |
| 3. Avoid Downtime.mp4 |
3.79Мб |
| 3. Avoid Downtime.srt |
700б |
| 3. Benefits of Cyber Security.mp4 |
14.45Мб |
| 3. Benefits of Cyber Security.srt |
2.37Кб |
| 3. Benefits of Data Science.mp4 |
19.96Мб |
| 3. Benefits of Data Science.srt |
3.19Кб |
| 3. Bug Bounties.mp4 |
5.76Мб |
| 3. Bug Bounties.srt |
1.02Кб |
| 3. Cloud Defender.mp4 |
9.69Мб |
| 3. Cloud Defender.srt |
1.69Кб |
| 3. Logical Access Controls.mp4 |
7.96Мб |
| 3. Logical Access Controls.srt |
1.18Кб |
| 3. Man in the Middle Attacks.mp4 |
7.93Мб |
| 3. Man in the Middle Attacks.srt |
1.45Кб |
| 3. Penetration Tester.mp4 |
8.94Мб |
| 3. Penetration Tester.srt |
1.41Кб |
| 3. Requires constant monitoring.mp4 |
2.67Мб |
| 3. Requires constant monitoring.srt |
504б |
| 4. Breaking Caesar Cipher.mp4 |
6.27Мб |
| 4. Breaking Caesar Cipher.srt |
994б |
| 4. Careers in Cyber Security.mp4 |
20.19Мб |
| 4. Careers in Cyber Security.srt |
3.29Кб |
| 4. Careers in Data Science.mp4 |
25.09Мб |
| 4. Careers in Data Science.srt |
4.07Кб |
| 4. Cofense Triage.mp4 |
11.06Мб |
| 4. Cofense Triage.srt |
1.69Кб |
| 4. Compliance.mp4 |
9.54Мб |
| 4. Compliance.srt |
1.52Кб |
| 4. Distributed Denial of Service (DDoS).mp4 |
10.44Мб |
| 4. Distributed Denial of Service (DDoS).srt |
1.42Кб |
| 4. Not a one-time thing.mp4 |
3.76Мб |
| 4. Not a one-time thing.srt |
693б |
| 4. Securely Configured and Encrypted Devices.mp4 |
7.49Мб |
| 4. Securely Configured and Encrypted Devices.srt |
1.14Кб |
| 4. Security Engineer.mp4 |
8.62Мб |
| 4. Security Engineer.srt |
1.51Кб |
| 5. Contrast Security.mp4 |
6.73Мб |
| 5. Contrast Security.srt |
1.14Кб |
| 5. Forensics Analyst.mp4 |
10.60Мб |
| 5. Forensics Analyst.srt |
1.70Кб |
| 5. Future of Cyber Security.mp4 |
28.91Мб |
| 5. Future of Cyber Security.srt |
4.43Кб |
| 5. Future of Data Science.mp4 |
20.54Мб |
| 5. Future of Data Science.srt |
3.32Кб |
| 5. Increase Customer Confidence.mp4 |
10.29Мб |
| 5. Increase Customer Confidence.srt |
1.56Кб |
| 5. Password Attacks.mp4 |
15.67Мб |
| 5. Password Attacks.srt |
2.32Кб |
| 5. Risky for businesses.mp4 |
2.95Мб |
| 5. Risky for businesses.srt |
583б |
| 5. Securely Configured Network Components.mp4 |
3.87Мб |
| 5. Securely Configured Network Components.srt |
661б |
| 5. SQL Injection.mp4 |
5.99Мб |
| 5. SQL Injection.srt |
1.07Кб |
| 6. Chief information security officer (CISO).mp4 |
12.45Мб |
| 6. Chief information security officer (CISO).srt |
1.85Кб |
| 6. Digital Gaurdian.mp4 |
10.60Мб |
| 6. Digital Gaurdian.srt |
1.69Кб |
| 6. Drive-By Download Attacks.mp4 |
10.19Мб |
| 6. Drive-By Download Attacks.srt |
1.82Кб |
| 6. Network segmentation.mp4 |
3.10Мб |
| 6. Network segmentation.srt |
607б |
| 6. Removing and Retrieving Files.mp4 |
5.20Мб |
| 6. Removing and Retrieving Files.srt |
946б |
| 7. Chief Information Officers (CIO).mp4 |
13.17Мб |
| 7. Chief Information Officers (CIO).srt |
2.12Кб |
| 7. Email and Online Protection.mp4 |
7.44Мб |
| 7. Email and Online Protection.srt |
1.32Кб |
| 7. Mantix4.mp4 |
6.31Мб |
| 7. Mantix4.srt |
1.03Кб |
| 7. Password Strength.mp4 |
6.64Мб |
| 7. Password Strength.srt |
1.12Кб |
| 8. Blocking RFID.mp4 |
5.71Мб |
| 8. Blocking RFID.srt |
978б |
| 8. SecBI.mp4 |
9.90Мб |
| 8. SecBI.srt |
1.64Кб |
| 8. Wireless security.mp4 |
4.14Мб |
| 8. Wireless security.srt |
810б |
| 9. Maintenance, Monitoring and Patching.mp4 |
7.94Мб |
| 9. Maintenance, Monitoring and Patching.srt |
1.27Кб |
| Bonus Resources.txt |
386б |
| Get Bonus Downloads Here.url |
182б |