Общая информация
Название Cybersecurity for Executives
Тип
Размер 286.81Мб

Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
01.Cybersecurity for executives.en.srt 2.10Кб
01.Cybersecurity for executives.mp4 4.11Мб
02.What you should know.en.srt 1.33Кб
02.What you should know.mp4 1.17Мб
03.How this course is organized.en.srt 1.62Кб
03.How this course is organized.mp4 2.15Мб
04.Understand the big picture overview.en.srt 2.08Кб
04.Understand the big picture overview.mp4 4.54Мб
05.Why are you a target.en.srt 3.86Кб
05.Why are you a target.mp4 7.72Мб
06.Example - Organized crime.en.srt 4.37Кб
06.Example - Organized crime.mp4 9.22Мб
07.Why are you in the line of fire.en.srt 3.47Кб
07.Why are you in the line of fire.mp4 6.79Мб
08.Example - Cyberwar cross-fire.en.srt 3.19Кб
08.Example - Cyberwar cross-fire.mp4 7.21Мб
09.Insider threat - Cyber failure.en.srt 4.28Кб
09.Insider threat - Cyber failure.mp4 7.29Мб
10.Think about cybersecurity summary.en.srt 1.62Кб
10.Think about cybersecurity summary.mp4 2.75Мб
11.Not what you buy, how you travel.en.srt 5.88Кб
11.Not what you buy, how you travel.mp4 10.49Мб
12.Germ theory.en.srt 2.63Кб
12.Germ theory.mp4 7.65Мб
13.Where to get IT support.en.srt 6.13Кб
13.Where to get IT support.mp4 10.53Мб
14.Avoid phishing attacks summary.en.srt 1.53Кб
14.Avoid phishing attacks summary.mp4 3.08Мб
15.What are phishing attacks.en.srt 3.61Кб
15.What are phishing attacks.mp4 9.67Мб
16.How to avoid phishing attacks.en.srt 4.27Кб
16.How to avoid phishing attacks.mp4 7.99Мб
17.Organizational response to phishing attacks.en.srt 4.49Кб
17.Organizational response to phishing attacks.mp4 6.35Мб
18.Stop malicious code summary.en.srt 1014б
18.Stop malicious code summary.mp4 1.26Мб
19.What is malicious code.en.srt 4.39Кб
19.What is malicious code.mp4 8.07Мб
20.How to avoid malicious code.en.srt 6.75Кб
20.How to avoid malicious code.mp4 11.88Мб
21.Organizational response to malicious code.en.srt 5.03Кб
21.Organizational response to malicious code.mp4 7.25Мб
22.Avoid identity theft summary.en.srt 1019б
22.Avoid identity theft summary.mp4 2.05Мб
23.What is identity theft.en.srt 4.16Кб
23.What is identity theft.mp4 8.22Мб
24.How to avoid identity theft.en.srt 5.45Кб
24.How to avoid identity theft.mp4 10.87Мб
25.Organizational response to identity theft.en.srt 5.88Кб
25.Organizational response to identity theft.mp4 8.06Мб
26.Avoid financial cybertheft summary.en.srt 1.01Кб
26.Avoid financial cybertheft summary.mp4 1.87Мб
27.What is financial cybertheft.en.srt 4.62Кб
27.What is financial cybertheft.mp4 9.15Мб
28.How to avoid financial cybertheft.en.srt 5.54Кб
28.How to avoid financial cybertheft.mp4 8.14Мб
29.Organizational response to financial cybertheft.en.srt 5.60Кб
29.Organizational response to financial cybertheft.mp4 7.48Мб
30.Avoid cyberattacks summary.en.srt 1.04Кб
30.Avoid cyberattacks summary.mp4 1.87Мб
31.What are cyberattacks on long trips.en.srt 4.06Кб
31.What are cyberattacks on long trips.mp4 8.06Мб
32.How to avoid cyberattacks on long trips.en.srt 4.50Кб
32.How to avoid cyberattacks on long trips.mp4 7.37Мб
33.Organizational response to cyberattacks on long trips.en.srt 4.11Кб
33.Organizational response to cyberattacks on long trips.mp4 5.92Мб
34.Special topics summary.en.srt 3.08Кб
34.Special topics summary.mp4 5.86Мб
35.Reasonable cybersecurity.en.srt 5.69Кб
35.Reasonable cybersecurity.mp4 9.97Мб
36.Cyber insurance.en.srt 4.78Кб
36.Cyber insurance.mp4 8.05Мб
37.Cloud computing.en.srt 5.41Кб
37.Cloud computing.mp4 7.05Мб
38.Internet of Things.en.srt 3.79Кб
38.Internet of Things.mp4 6.09Мб
39.Contractual firewalls.en.srt 5.68Кб
39.Contractual firewalls.mp4 7.16Мб
40.Third-party cyber risk management.en.srt 4.97Кб
40.Third-party cyber risk management.mp4 7.63Мб
41.Cybersecurity-related sales objectives.en.srt 6.03Кб
41.Cybersecurity-related sales objectives.mp4 10.92Мб
42.Active defense.en.srt 4.79Кб
42.Active defense.mp4 5.74Мб
43.Next steps.en.srt 1.66Кб
43.Next steps.mp4 1.96Мб
Статистика распространения по странам
США (US) 3
Беларусь (BY) 2
Великобритания (GB) 1
Греция (GR) 1
Россия (RU) 1
Украина (UA) 1
Польша (PL) 1
Уганда (UG) 1
Всего 11
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент