[ TutPig.com ] Linkedin - Cybersecurity Awareness - Cybersecurity Terminology
File List
- ~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.mp4 10.0 MB
- ~Get Your Files Here !/05 - 4. Technology/01 - Secure practices, terms, and exercises.mp4 9.6 MB
- ~Get Your Files Here !/06 - 5. Threat Actors and Risks/02 - Technical risks.mp4 8.4 MB
- ~Get Your Files Here !/03 - 2. People/01 - Security awareness and leadership.mp4 8.2 MB
- ~Get Your Files Here !/03 - 2. People/04 - Understanding privacy.mp4 7.9 MB
- ~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.mp4 7.4 MB
- ~Get Your Files Here !/04 - 3. Process/02 - Technical controls.mp4 6.9 MB
- ~Get Your Files Here !/05 - 4. Technology/02 - Network controls.mp4 6.8 MB
- ~Get Your Files Here !/05 - 4. Technology/03 - Advancements in technology.mp4 6.8 MB
- ~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.mp4 6.7 MB
- ~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/01 - What is cybersecurity.mp4 5.7 MB
- ~Get Your Files Here !/01 - Introduction/01 - Welcome to Cybersecurity Terminology 101.mp4 5.4 MB
- ~Get Your Files Here !/03 - 2. People/02 - Red vs. blue vs. purple teams.mp4 4.8 MB
- ~Get Your Files Here !/03 - 2. People/03 - Who are the adversaries.mp4 4.5 MB
- ~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/02 - People, process, and technology.mp4 2.8 MB
- ~Get Your Files Here !/07 - Conclusion/01 - Apply cybersecurity terminology.mp4 2.7 MB
- ~Get Your Files Here !/04 - 3. Process/01 - Understanding processes and documentation.srt 6.1 KB
- ~Get Your Files Here !/06 - 5. Threat Actors and Risks/01 - Threat actors and definitions.srt 5.9 KB
- ~Get Your Files Here !/06 - 5. Threat Actors and Risks/03 - Threats that target the human element.srt 5.6 KB
- ~Get Your Files Here !/04 - 3. Process/02 - Technical controls.srt 5.5 KB
- ~Get Your Files Here !/06 - 5. Threat Actors and Risks/02 - Technical risks.srt 5.3 KB
- ~Get Your Files Here !/05 - 4. Technology/02 - Network controls.srt 5.2 KB
- ~Get Your Files Here !/03 - 2. People/01 - Security awareness and leadership.srt 5.1 KB
- ~Get Your Files Here !/03 - 2. People/04 - Understanding privacy.srt 4.9 KB
- ~Get Your Files Here !/05 - 4. Technology/01 - Secure practices, terms, and exercises.srt 4.6 KB
- ~Get Your Files Here !/03 - 2. People/03 - Who are the adversaries.srt 4.4 KB
- ~Get Your Files Here !/05 - 4. Technology/03 - Advancements in technology.srt 4.3 KB
- ~Get Your Files Here !/03 - 2. People/02 - Red vs. blue vs. purple teams.srt 4.2 KB
- ~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/01 - What is cybersecurity.srt 4.2 KB
- ~Get Your Files Here !/02 - 1. Defining Cybersecurity and People, Process, and Technology/02 - People, process, and technology.srt 2.4 KB
- ~Get Your Files Here !/07 - Conclusion/01 - Apply cybersecurity terminology.srt 2.3 KB
- ~Get Your Files Here !/01 - Introduction/01 - Welcome to Cybersecurity Terminology 101.srt 1.9 KB
- ~Get Your Files Here !/Bonus Resources.txt 386 bytes
- Get Bonus Downloads Here.url 176 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.