Archived
files |
01. Welcome - 66s.mp4 |
1,934,902 |
0ABF2DE6 |
02. Understanding phishing - 175s.mp4 |
5,696,135 |
6CC6525E |
03. Advanced phishing methods - 143s.mp4 |
4,725,857 |
803CC9F2 |
04. Types of phishing - 284s.mp4 |
8,124,876 |
53C08CA3 |
05. Impacts of successful phishing attacks - 137s.mp4 |
4,111,399 |
B2B3788D |
06. Phishing methodologies - 120s.mp4 |
3,954,591 |
BE217745 |
07. Phishing examples - 430s.mp4 |
12,653,816 |
D73C5C93 |
08. How to reduce phishing - 88s.mp4 |
2,564,389 |
A42A3EB2 |
09. Use of technology in phishing attacks - 222s.mp4 |
6,463,880 |
1D7DC598 |
10. Learn never to take the bait - 120s.mp4 |
3,292,073 |
2CC78EE5 |
11. Understanding whaling - 164s.mp4 |
5,059,482 |
2BBE407C |
12. How hacktivists plan whaling attacks - 499s.mp4 |
13,854,061 |
13FDF581 |
13. Examples of whaling - 485s.mp4 |
14,561,707 |
A03B1864 |
14. Solutions to reduce whaling - 193s.mp4 |
5,513,953 |
8DED78A5 |
15. Summary - 146s.mp4 |
4,237,935 |
A49ED019 |
|
Total size: |
96,749,056 |
|
|