Archived
files |
01. Welcome - 98s.mp4 |
3,195,204 |
FF43914E |
02. The nature of cyber threats today - 78s.mp4 |
2,311,821 |
CE308DDC |
03. The seriousness of cyber attacks - 214s.mp4 |
6,784,963 |
A049F08A |
04. Data theft and email - 427s.mp4 |
13,672,224 |
79DCDAFE |
05. From ancient times until now - 115s.mp4 |
4,052,549 |
A0D26B51 |
06. The sieve - 289s.mp4 |
8,979,461 |
00F3D009 |
07. The gateway - 126s.mp4 |
3,874,751 |
A9F15709 |
08. Lipstick on a pig - 297s.mp4 |
8,855,861 |
5E8A8426 |
09. The root cause - 239s.mp4 |
8,596,685 |
EA489A79 |
10. Securing files by default - 253s.mp4 |
8,070,000 |
4C216C26 |
11. Controllable by design - 128s.mp4 |
4,731,621 |
8DCC98C4 |
12. There are still limits - 66s.mp4 |
2,238,732 |
C784AF1C |
13. Why and when - 120s.mp4 |
3,853,384 |
B624F11B |
14. Problem vs. Solution - 364s.mp4 |
14,043,738 |
7F64A462 |
15. Parting thoughts - 170s.mp4 |
5,845,191 |
A18A64BC |
|
Total size: |
99,106,185 |
|
|