Cybersecurity for Small and Medium Businesses - Essential Training\1.Introduction\01.Welcome.en.srt |
2,065 |
1ABE6DD2 |
Cybersecurity for Small and Medium Businesses - Essential Training\1.Introduction\02.What you should know.mp4
[aa854611eba5a2bd]
|
5,033,601 |
64431210 |
Cybersecurity for Small and Medium Businesses - Essential Training\1.Introduction\02.What you should know.en.srt |
1,508 |
C38662D3 |
Cybersecurity for Small and Medium Businesses - Essential Training\1.Introduction\01.Welcome.mp4
[c72cdf21bc633416]
|
21,906,641 |
491A00A6 |
Cybersecurity for Small and Medium Businesses - Essential Training\6.5. Respond\23.Cybersecurity response plans for business.mp4
[68cf676b8a417897]
|
6,459,915 |
542D554D |
Cybersecurity for Small and Medium Businesses - Essential Training\6.5. Respond\24.Key elements of a cyber incident response.mp4
[abd9ab38211e3b29]
|
13,558,872 |
3FF319B8 |
Cybersecurity for Small and Medium Businesses - Essential Training\6.5. Respond\26.State breach response laws.mp4
[3ebe4baf24e67ddb]
|
9,563,561 |
E58796F1 |
Cybersecurity for Small and Medium Businesses - Essential Training\6.5. Respond\22.Step #4 - Respond to a cyber breach.mp4
[b6405f6c8af8d220]
|
9,348,159 |
581B5E53 |
Cybersecurity for Small and Medium Businesses - Essential Training\6.5. Respond\25.Federal government response support and guidance.mp4
[fb1da25d583212fc]
|
8,202,236 |
EC1A2C2B |
Cybersecurity for Small and Medium Businesses - Essential Training\6.5. Respond\23.Cybersecurity response plans for business.en.srt |
3,775 |
10A4C89D |
Cybersecurity for Small and Medium Businesses - Essential Training\6.5. Respond\25.Federal government response support and guidance.en.srt |
5,060 |
90B11689 |
Cybersecurity for Small and Medium Businesses - Essential Training\6.5. Respond\24.Key elements of a cyber incident response.en.srt |
8,717 |
EB0FF019 |
Cybersecurity for Small and Medium Businesses - Essential Training\6.5. Respond\22.Step #4 - Respond to a cyber breach.en.srt |
2,419 |
2D77413F |
Cybersecurity for Small and Medium Businesses - Essential Training\6.5. Respond\26.State breach response laws.en.srt |
5,112 |
FD7D3367 |
Cybersecurity for Small and Medium Businesses - Essential Training\7.6. Recover\27.Step #5 - How to recover from a cyber incident.mp4
[1eac696c50ed830a]
|
5,808,590 |
E5D6DBE5 |
Cybersecurity for Small and Medium Businesses - Essential Training\7.6. Recover\29.Reputation management.mp4
[97943f86a0f0ac7a]
|
7,161,301 |
93642977 |
Cybersecurity for Small and Medium Businesses - Essential Training\7.6. Recover\28.Cybersecurity insurance.mp4
[a4c2be0c3a8d121b]
|
15,760,571 |
22EDB616 |
Cybersecurity for Small and Medium Businesses - Essential Training\7.6. Recover\29.Reputation management.en.srt |
3,493 |
13D3C763 |
Cybersecurity for Small and Medium Businesses - Essential Training\7.6. Recover\27.Step #5 - How to recover from a cyber incident.en.srt |
1,863 |
CF410DC0 |
Cybersecurity for Small and Medium Businesses - Essential Training\7.6. Recover\28.Cybersecurity insurance.en.srt |
7,119 |
DF95DEE0 |
Cybersecurity for Small and Medium Businesses - Essential Training\4.3. Protect\16.Technology solutions to protect a business.mp4
[9bb1e64c600f4f8]
|
20,158,367 |
4E857811 |
Cybersecurity for Small and Medium Businesses - Essential Training\4.3. Protect\17.Passphrases and authentication.mp4
[3c4ac1529482fe7a]
|
13,299,931 |
9E2E1979 |
Cybersecurity for Small and Medium Businesses - Essential Training\4.3. Protect\14.Humans - Education and awareness is essential.mp4
[539423ac1e179d42]
|
7,349,841 |
90811347 |
Cybersecurity for Small and Medium Businesses - Essential Training\4.3. Protect\15.Sharing online - How to prevent a phish.en.srt |
7,635 |
25A60BB8 |
Cybersecurity for Small and Medium Businesses - Essential Training\4.3. Protect\17.Passphrases and authentication.en.srt |
7,553 |
248F38E1 |
Cybersecurity for Small and Medium Businesses - Essential Training\4.3. Protect\13.Step #2 - Protect data and accounts.en.srt |
1,720 |
80BECA13 |
Cybersecurity for Small and Medium Businesses - Essential Training\4.3. Protect\14.Humans - Education and awareness is essential.en.srt |
5,573 |
27978226 |
Cybersecurity for Small and Medium Businesses - Essential Training\4.3. Protect\13.Step #2 - Protect data and accounts.mp4
[1521dfac1557d0f7]
|
6,657,837 |
DC639171 |
Cybersecurity for Small and Medium Businesses - Essential Training\4.3. Protect\18.Culture of security - Policies, procedures, and attitude.mp4
[256f746ae61479b]
|
14,297,742 |
F32284D0 |
Cybersecurity for Small and Medium Businesses - Essential Training\4.3. Protect\15.Sharing online - How to prevent a phish.mp4
[121ca2032a0b1ca0]
|
15,033,491 |
6AE2CB2F |
Cybersecurity for Small and Medium Businesses - Essential Training\4.3. Protect\18.Culture of security - Policies, procedures, and attitude.en.srt |
7,695 |
F8982F34 |
Cybersecurity for Small and Medium Businesses - Essential Training\4.3. Protect\16.Technology solutions to protect a business.en.srt |
9,668 |
197CF4AF |
Cybersecurity for Small and Medium Businesses - Essential Training\5.4. Detect\19.Step #3 - Detect a breach.en.srt |
3,178 |
5EB4E8F7 |
Cybersecurity for Small and Medium Businesses - Essential Training\5.4. Detect\19.Step #3 - Detect a breach.mp4
[27ee8d7bb58669c7]
|
9,264,732 |
2F9457B0 |
Cybersecurity for Small and Medium Businesses - Essential Training\5.4. Detect\20.Detecting a compromise - The human element.en.srt |
2,629 |
31EBE773 |
Cybersecurity for Small and Medium Businesses - Essential Training\5.4. Detect\21.Cybersecurity assessments and detection technology solutions.mp4
[eb4af34a7debfd18]
|
12,842,757 |
39676A52 |
Cybersecurity for Small and Medium Businesses - Essential Training\5.4. Detect\20.Detecting a compromise - The human element.mp4
[491e50861f17b80f]
|
5,105,780 |
63596A68 |
Cybersecurity for Small and Medium Businesses - Essential Training\5.4. Detect\21.Cybersecurity assessments and detection technology solutions.en.srt |
7,821 |
CEA7E90D |
Cybersecurity for Small and Medium Businesses - Essential Training\8.7. Resources\32.Scam and threat alerts.mp4
[549595327a6a0919]
|
11,749,174 |
61CDE3BC |
Cybersecurity for Small and Medium Businesses - Essential Training\8.7. Resources\32.Scam and threat alerts.en.srt |
5,891 |
41FD59A7 |
Cybersecurity for Small and Medium Businesses - Essential Training\8.7. Resources\31.More cybersecurity resources.en.srt |
5,253 |
A42A56B9 |
Cybersecurity for Small and Medium Businesses - Essential Training\8.7. Resources\30.Technology checklists for small and medium businesses.mp4
[5bd908b81aa7852b]
|
8,183,097 |
3CDB5E64 |
Cybersecurity for Small and Medium Businesses - Essential Training\8.7. Resources\30.Technology checklists for small and medium businesses.en.srt |
3,579 |
9D73B233 |
Cybersecurity for Small and Medium Businesses - Essential Training\8.7. Resources\31.More cybersecurity resources.mp4
[97f46b73bddf309c]
|
11,511,664 |
D336DFC7 |
Cybersecurity for Small and Medium Businesses - Essential Training\3.2. Identify\12.What about the cloud.en.srt |
9,315 |
CF6F2CC5 |
Cybersecurity for Small and Medium Businesses - Essential Training\3.2. Identify\12.What about the cloud.mp4
[5a444f0708e2b7c2]
|
11,283,139 |
0AC2F1AF |
Cybersecurity for Small and Medium Businesses - Essential Training\3.2. Identify\11.Account access best practices.mp4
[448f309e84cc1a90]
|
12,882,165 |
41C594CF |
Cybersecurity for Small and Medium Businesses - Essential Training\3.2. Identify\09.Step #1 - Identify key assets.mp4
[8ab971c880729310]
|
9,491,635 |
2A86B7F3 |
Cybersecurity for Small and Medium Businesses - Essential Training\3.2. Identify\10.Inventory sheet - Data and devices.en.srt |
1,861 |
DA8D5FBB |
Cybersecurity for Small and Medium Businesses - Essential Training\3.2. Identify\10.Inventory sheet - Data and devices.mp4
[24c26477ec7a1436]
|
3,055,816 |
84D21F7B |
Cybersecurity for Small and Medium Businesses - Essential Training\3.2. Identify\11.Account access best practices.en.srt |
5,947 |
49F41D17 |
Cybersecurity for Small and Medium Businesses - Essential Training\3.2. Identify\09.Step #1 - Identify key assets.en.srt |
3,133 |
BBA285C8 |
Cybersecurity for Small and Medium Businesses - Essential Training\2.1. The Basics\05.Anyone can improve the cybersecurity of a business.en.srt |
3,443 |
4712F43C |
Cybersecurity for Small and Medium Businesses - Essential Training\2.1. The Basics\07.What are the cybersecurity threats.mp4
[ea6e182e6ea8404b]
|
14,570,795 |
CB9347CF |
Cybersecurity for Small and Medium Businesses - Essential Training\2.1. The Basics\04.Physical security vs. cybersecurity.mp4
[c16a257698860609]
|
4,794,373 |
B5BFD57F |
Cybersecurity for Small and Medium Businesses - Essential Training\2.1. The Basics\03.Why you should care.en.srt |
6,741 |
8300969D |
Cybersecurity for Small and Medium Businesses - Essential Training\2.1. The Basics\04.Physical security vs. cybersecurity.en.srt |
1,910 |
9599C0E1 |
Cybersecurity for Small and Medium Businesses - Essential Training\2.1. The Basics\08.A five-step process to improve cybersecurity.en.srt |
3,931 |
45FE77DF |
Cybersecurity for Small and Medium Businesses - Essential Training\2.1. The Basics\06.What are the cybersecurity threat actions facing businesses.mp4
[c1a3a709b85ec79]
|
6,940,151 |
C6C212C0 |
Cybersecurity for Small and Medium Businesses - Essential Training\2.1. The Basics\06.What are the cybersecurity threat actions facing businesses.en.srt |
4,522 |
E5075BF1 |
Cybersecurity for Small and Medium Businesses - Essential Training\2.1. The Basics\03.Why you should care.mp4
[5d124ca56146018e]
|
31,637,965 |
9D51D35A |
Cybersecurity for Small and Medium Businesses - Essential Training\2.1. The Basics\08.A five-step process to improve cybersecurity.mp4
[e9bf3f21d1673fe]
|
7,173,077 |
0633A26A |
Cybersecurity for Small and Medium Businesses - Essential Training\2.1. The Basics\07.What are the cybersecurity threats.en.srt |
6,423 |
3B6F16FF |
Cybersecurity for Small and Medium Businesses - Essential Training\2.1. The Basics\05.Anyone can improve the cybersecurity of a business.mp4
[61c4ef9bb5b229da]
|
9,102,308 |
1CA875D2 |
Cybersecurity for Small and Medium Businesses - Essential Training\9.Conclusion\33.Next steps.mp4
[c451c8695e9d236f]
|
8,954,075 |
CBC32FF5 |
Cybersecurity for Small and Medium Businesses - Essential Training\9.Conclusion\33.Next steps.en.srt |
2,168 |
683858C4 |
Cybersecurity for Small and Medium Businesses - Essential Training\1.Introduction |
0 |
00000000 |
Cybersecurity for Small and Medium Businesses - Essential Training\6.5. Respond |
0 |
00000000 |
Cybersecurity for Small and Medium Businesses - Essential Training\7.6. Recover |
0 |
00000000 |
Cybersecurity for Small and Medium Businesses - Essential Training\4.3. Protect |
0 |
00000000 |
Cybersecurity for Small and Medium Businesses - Essential Training\5.4. Detect |
0 |
00000000 |
Cybersecurity for Small and Medium Businesses - Essential Training\8.7. Resources |
0 |
00000000 |
Cybersecurity for Small and Medium Businesses - Essential Training\3.2. Identify |
0 |
00000000 |
Cybersecurity for Small and Medium Businesses - Essential Training\2.1. The Basics |
0 |
00000000 |
Cybersecurity for Small and Medium Businesses - Essential Training\9.Conclusion |
0 |
00000000 |
Cybersecurity for Small and Medium Businesses - Essential Training |
0 |
00000000 |
|
Total size: |
358,302,079 |
|