RAR-files |
linkedin.learning.cybersecurity.awareness.cybersecurity.terminology-xqzt.rar |
50,000,000 |
FBA70770 |
linkedin.learning.cybersecurity.awareness.cybersecurity.terminology-xqzt.r00 |
50,000,000 |
8F4A40C2 |
linkedin.learning.cybersecurity.awareness.cybersecurity.terminology-xqzt.r01 |
6,582,418 |
52F803B7 |
|
Total size: |
106,582,418 |
|
|
Archived
files |
01.01-welcome_to_cybersecurity_terminology_101.mkv
[63cc49bb53fe6a03]
|
5,585,245 |
2A47D600 |
02.01-what_is_cybersecurity.mkv
[6b71f4688573d2c]
|
5,801,682 |
97890A7C |
02.02-people_process_and_technology.mkv
[20d960a90815d356]
|
2,793,397 |
A7F1C67E |
03.01-security_awareness_and_leadership.mkv
[2e800e953eb4de93]
|
8,331,443 |
2776975D |
03.02-red_vs._blue_vs._purple_teams.mkv
[1163a3f5977b921e]
|
4,859,820 |
39812D6E |
03.03-who_are_the_adversaries.mkv
[ff6b5a095f2f309]
|
4,522,035 |
CC94D118 |
03.04-understanding_privacy.mkv
[a3af6a871602cfb6]
|
8,042,864 |
FE841819 |
04.01-understanding_processes_and_documentation.mkv
[3fe8ec2108fa5781]
|
10,196,687 |
8BDF133D |
04.02-technical_controls.mkv
[2f68d7033be4ce4a]
|
7,047,188 |
9CB9C6E9 |
05.01-secure_practices_terms_and_exercises.mkv
[36b54d45d59f0ff7]
|
9,919,978 |
FD37C213 |
05.02-network_controls.mkv
[978897e4d4b21e7e]
|
6,920,522 |
27873668 |
05.03-advancements_in_technology.mkv
[9afce7ab95fa25a1]
|
6,921,069 |
5845A48C |
06.01-threat_actors_and_definitions.mkv
[9506b02f5de5d053]
|
6,836,225 |
9C0DB05A |
06.02-technical_risks.mkv
[c3195123e9244bcb]
|
8,591,592 |
63C235AA |
06.03-threats_that_target_the_human_element.mkv
[474d2b3724039241]
|
7,477,716 |
C631DEF6 |
07.01-apply_cybersecurity_terminology.mkv
[1bc4083538df1c91]
|
2,733,466 |
8468BDCA |
|
Total size: |
106,580,929 |
|
|