RAR-files |
pcsed-5f1f-xqzt.rar |
50,000,000 |
7F889E20 |
pcsed-5f1f-xqzt.r00 |
50,000,000 |
651D7017 |
pcsed-5f1f-xqzt.r01 |
50,000,000 |
8DEC4E63 |
pcsed-5f1f-xqzt.r02 |
50,000,000 |
05EE6DD4 |
pcsed-5f1f-xqzt.r03 |
50,000,000 |
512ECE69 |
pcsed-5f1f-xqzt.r04 |
50,000,000 |
1534C592 |
pcsed-5f1f-xqzt.r05 |
50,000,000 |
B22E8238 |
pcsed-5f1f-xqzt.r06 |
29,144,466 |
CBD82490 |
|
Total size: |
379,144,466 |
|
|
Archived
files |
Cyber Security - Endpoint Defense [Video]\3.Protecting Users\14.Malware.mp4
[d36c5111566bd17d]
|
39,031,486 |
F4F1C225 |
Cyber Security - Endpoint Defense [Video]\3.Protecting Users\15.Disaster Recovery.mp4
[3db7f3f9051d2e4f]
|
21,256,681 |
2FD700A8 |
Cyber Security - Endpoint Defense [Video]\3.Protecting Users\11.Social Engineering Attacks.mp4
[23f4bc8176bd1ec3]
|
21,453,370 |
391F269B |
Cyber Security - Endpoint Defense [Video]\3.Protecting Users\13.Incident Response.mp4
[62d4accb3240effc]
|
17,518,770 |
2D284C67 |
Cyber Security - Endpoint Defense [Video]\3.Protecting Users\12.BYOD - Bring Your Own Device.mp4
[53d2d2ad272d8c60]
|
12,047,391 |
B0A258E9 |
Cyber Security - Endpoint Defense [Video]\2.Securing Applications and Data\10.Backing Up Data.mp4
[95db5424849dd75d]
|
28,611,714 |
87F39F61 |
Cyber Security - Endpoint Defense [Video]\2.Securing Applications and Data\08.Data Loss Prevention.mp4
[df0444875dbc6c2a]
|
12,027,046 |
342C64A8 |
Cyber Security - Endpoint Defense [Video]\2.Securing Applications and Data\07.Data Encryption.mp4
[c81e80948842d83a]
|
53,347,418 |
0802B1C0 |
Cyber Security - Endpoint Defense [Video]\2.Securing Applications and Data\06.Data Classification.mp4
[4fc4243a3cb3b0cb]
|
9,788,634 |
88B5B27F |
Cyber Security - Endpoint Defense [Video]\2.Securing Applications and Data\09.Application Vulnerability Assessment and Patching.mp4
[ce9a11819aab1f7c]
|
49,209,011 |
8BEC077B |
Cyber Security - Endpoint Defense [Video]\1.Protecting Computer and Network Infrastructure\05.Securing Wireless Networks.mp4
[7dc587a730a1a7df]
|
21,217,303 |
02E5BDF7 |
Cyber Security - Endpoint Defense [Video]\1.Protecting Computer and Network Infrastructure\02.Security Posture.mp4
[57fc9c24945217b3]
|
6,461,964 |
67F769B7 |
Cyber Security - Endpoint Defense [Video]\1.Protecting Computer and Network Infrastructure\03.Firewalls and IDS - Secure Your Network and Hosts.mp4
[30c34ad06ed83463]
|
46,950,655 |
F50BB8F0 |
Cyber Security - Endpoint Defense [Video]\1.Protecting Computer and Network Infrastructure\01.The Course Overview.mp4
[1a92f71a1ee6647d]
|
15,102,538 |
5B590819 |
Cyber Security - Endpoint Defense [Video]\1.Protecting Computer and Network Infrastructure\04.Server Hardening.mp4
[94253ad19509fc38]
|
25,116,686 |
41B6AD6C |
Cyber Security - Endpoint Defense [Video]\3.Protecting Users |
0 |
00000000 |
Cyber Security - Endpoint Defense [Video]\2.Securing Applications and Data |
0 |
00000000 |
Cyber Security - Endpoint Defense [Video]\1.Protecting Computer and Network Infrastructure |
0 |
00000000 |
Cyber Security - Endpoint Defense [Video] |
0 |
00000000 |
|
Total size: |
379,140,667 |
|
|