Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
01.Cybersecurity for executives.en.srt |
2.10Кб |
01.Cybersecurity for executives.mp4 |
4.11Мб |
02.What you should know.en.srt |
1.33Кб |
02.What you should know.mp4 |
1.17Мб |
03.How this course is organized.en.srt |
1.62Кб |
03.How this course is organized.mp4 |
2.15Мб |
04.Understand the big picture overview.en.srt |
2.08Кб |
04.Understand the big picture overview.mp4 |
4.54Мб |
05.Why are you a target.en.srt |
3.86Кб |
05.Why are you a target.mp4 |
7.72Мб |
06.Example - Organized crime.en.srt |
4.37Кб |
06.Example - Organized crime.mp4 |
9.22Мб |
07.Why are you in the line of fire.en.srt |
3.47Кб |
07.Why are you in the line of fire.mp4 |
6.79Мб |
08.Example - Cyberwar cross-fire.en.srt |
3.19Кб |
08.Example - Cyberwar cross-fire.mp4 |
7.21Мб |
09.Insider threat - Cyber failure.en.srt |
4.28Кб |
09.Insider threat - Cyber failure.mp4 |
7.29Мб |
10.Think about cybersecurity summary.en.srt |
1.62Кб |
10.Think about cybersecurity summary.mp4 |
2.75Мб |
11.Not what you buy, how you travel.en.srt |
5.88Кб |
11.Not what you buy, how you travel.mp4 |
10.49Мб |
12.Germ theory.en.srt |
2.63Кб |
12.Germ theory.mp4 |
7.65Мб |
13.Where to get IT support.en.srt |
6.13Кб |
13.Where to get IT support.mp4 |
10.53Мб |
14.Avoid phishing attacks summary.en.srt |
1.53Кб |
14.Avoid phishing attacks summary.mp4 |
3.08Мб |
15.What are phishing attacks.en.srt |
3.61Кб |
15.What are phishing attacks.mp4 |
9.67Мб |
16.How to avoid phishing attacks.en.srt |
4.27Кб |
16.How to avoid phishing attacks.mp4 |
7.99Мб |
17.Organizational response to phishing attacks.en.srt |
4.49Кб |
17.Organizational response to phishing attacks.mp4 |
6.35Мб |
18.Stop malicious code summary.en.srt |
1014б |
18.Stop malicious code summary.mp4 |
1.26Мб |
19.What is malicious code.en.srt |
4.39Кб |
19.What is malicious code.mp4 |
8.07Мб |
20.How to avoid malicious code.en.srt |
6.75Кб |
20.How to avoid malicious code.mp4 |
11.88Мб |
21.Organizational response to malicious code.en.srt |
5.03Кб |
21.Organizational response to malicious code.mp4 |
7.25Мб |
22.Avoid identity theft summary.en.srt |
1019б |
22.Avoid identity theft summary.mp4 |
2.05Мб |
23.What is identity theft.en.srt |
4.16Кб |
23.What is identity theft.mp4 |
8.22Мб |
24.How to avoid identity theft.en.srt |
5.45Кб |
24.How to avoid identity theft.mp4 |
10.87Мб |
25.Organizational response to identity theft.en.srt |
5.88Кб |
25.Organizational response to identity theft.mp4 |
8.06Мб |
26.Avoid financial cybertheft summary.en.srt |
1.01Кб |
26.Avoid financial cybertheft summary.mp4 |
1.87Мб |
27.What is financial cybertheft.en.srt |
4.62Кб |
27.What is financial cybertheft.mp4 |
9.15Мб |
28.How to avoid financial cybertheft.en.srt |
5.54Кб |
28.How to avoid financial cybertheft.mp4 |
8.14Мб |
29.Organizational response to financial cybertheft.en.srt |
5.60Кб |
29.Organizational response to financial cybertheft.mp4 |
7.48Мб |
30.Avoid cyberattacks summary.en.srt |
1.04Кб |
30.Avoid cyberattacks summary.mp4 |
1.87Мб |
31.What are cyberattacks on long trips.en.srt |
4.06Кб |
31.What are cyberattacks on long trips.mp4 |
8.06Мб |
32.How to avoid cyberattacks on long trips.en.srt |
4.50Кб |
32.How to avoid cyberattacks on long trips.mp4 |
7.37Мб |
33.Organizational response to cyberattacks on long trips.en.srt |
4.11Кб |
33.Organizational response to cyberattacks on long trips.mp4 |
5.92Мб |
34.Special topics summary.en.srt |
3.08Кб |
34.Special topics summary.mp4 |
5.86Мб |
35.Reasonable cybersecurity.en.srt |
5.69Кб |
35.Reasonable cybersecurity.mp4 |
9.97Мб |
36.Cyber insurance.en.srt |
4.78Кб |
36.Cyber insurance.mp4 |
8.05Мб |
37.Cloud computing.en.srt |
5.41Кб |
37.Cloud computing.mp4 |
7.05Мб |
38.Internet of Things.en.srt |
3.79Кб |
38.Internet of Things.mp4 |
6.09Мб |
39.Contractual firewalls.en.srt |
5.68Кб |
39.Contractual firewalls.mp4 |
7.16Мб |
40.Third-party cyber risk management.en.srt |
4.97Кб |
40.Third-party cyber risk management.mp4 |
7.63Мб |
41.Cybersecurity-related sales objectives.en.srt |
6.03Кб |
41.Cybersecurity-related sales objectives.mp4 |
10.92Мб |
42.Active defense.en.srt |
4.79Кб |
42.Active defense.mp4 |
5.74Мб |
43.Next steps.en.srt |
1.66Кб |
43.Next steps.mp4 |
1.96Мб |