RAR-files |
skillshare.cyber.security.training.for.employees-skilledhares.rar |
150,000,000 |
8BF8C7CD |
skillshare.cyber.security.training.for.employees-skilledhares.r00 |
150,000,000 |
8B72F931 |
skillshare.cyber.security.training.for.employees-skilledhares.r01 |
150,000,000 |
3401960B |
skillshare.cyber.security.training.for.employees-skilledhares.r02 |
150,000,000 |
C937A154 |
skillshare.cyber.security.training.for.employees-skilledhares.r03 |
150,000,000 |
BFEA98E6 |
skillshare.cyber.security.training.for.employees-skilledhares.r04 |
150,000,000 |
ECEC38B7 |
skillshare.cyber.security.training.for.employees-skilledhares.r05 |
150,000,000 |
66E44FEF |
skillshare.cyber.security.training.for.employees-skilledhares.r06 |
150,000,000 |
E050602C |
skillshare.cyber.security.training.for.employees-skilledhares.r07 |
150,000,000 |
970A155B |
skillshare.cyber.security.training.for.employees-skilledhares.r08 |
105,857,710 |
F54D5B63 |
|
Total size: |
1,455,857,710 |
|
|
Archived
files |
01-presentation_of_the_course.mkv
[bd0b8f406dee2b2b]
|
19,348,276 |
71096CCD |
02-welcome_to_the_course.mkv
[86c99f66cf3d240]
|
19,972,754 |
7F503C1F |
03-what_is_cybersecurity_and_why_it_is_important.mkv
[8a49caf1b3b762c6]
|
70,444,971 |
9025CDE9 |
04-introduction_to_social_engineering.mkv
[50672a3fe337579e]
|
16,568,744 |
4F803885 |
05-social_engineering_and_its_examples.mkv
[193c7676bf72cdba]
|
111,621,881 |
DF878DF0 |
06-how_to_avoid_social_engineering.mkv
[88985f44788576f7]
|
53,429,599 |
3BB252E5 |
07-introduction_to_phishing.mkv
[c8bb0166321a9126]
|
20,261,498 |
85A0F54A |
08-phishing_and_its_other_forms.mkv
[817b2e585d634525]
|
65,120,513 |
D4572939 |
09-recognizing_and_avoiding_phishing_attacks.mkv
[ad484f3911e13c1a]
|
38,226,947 |
A296D771 |
10-simulation_identifying_phishing_emails.mkv
[aba2c493572537f2]
|
59,211,148 |
59EC5FA9 |
11-introduction_to_malware.mkv
[cece5ea96c0356]
|
16,893,196 |
01619C5D |
12-how_to_protect_devices_against_malware.mkv
[cbcfc58b537f1f80]
|
30,900,304 |
77C7D4F6 |
13-how_to_remove_malware_from_your_pc.mkv
[ac74ad2694209525]
|
41,088,490 |
1D82AEDE |
14-simulation_how_to_remove_malware.mkv
[de195cd109e2edf]
|
125,597,124 |
382EF38A |
15-introduction_to_keep_your_account_safe.mkv
[1675ea8e1e9d9da7]
|
16,440,852 |
8EAFA4FB |
16-choosing_strong_passwords.mkv
[8ab1ce6cf374d0d0]
|
55,350,855 |
65B4B674 |
17-keeping_your_account_safe_using_password_management_tools.mkv
[a46261a6ed2f08d5]
|
39,732,140 |
B73FB72F |
18-using_two-factor_authentication.mkv
[31f701e4e6cc372f]
|
66,905,677 |
4A8031D5 |
19-introduction_to_secure_internet_usage.mkv
[6658eb4d2a65f110]
|
18,979,337 |
28A60BFC |
20-using_secured_wireless_devices.mkv
[384f846667c3285a]
|
74,651,408 |
86794C1B |
21-avoiding_unsecured_websites.mkv
[93c46284d5c976dc]
|
52,992,798 |
9E266C16 |
22-using_vpn_(virtual_private_network).mkv
[15048bb5e2820d6f]
|
41,761,262 |
16F5E899 |
23-simulation_identify_legitimate_websites.mkv
[faa05595df69d9e4]
|
35,172,144 |
CB754810 |
24-introduction_to_cyber_threat_free_environment.mkv
[689ae9472df8ab73]
|
20,042,495 |
87F70857 |
25-visual_hacking.mkv
[dc092b5701f0980c]
|
42,426,448 |
6B8B443F |
26-access_control_system.mkv
[baeeadad5bd202cb]
|
54,193,847 |
06F10B36 |
27-keeping_a_workstation_clean.mkv
[c759286d3ef94931]
|
43,497,546 |
297469BC |
28-encrypting_sensitive_data.mkv
[192ec400e74d4c7a]
|
44,886,639 |
60C69764 |
29-locking_the_server_room.mkv
[7308922e1a2f331a]
|
48,037,669 |
0F394413 |
30-introduction_to_cloud_security.mkv
[81944a3f3d064e90]
|
17,860,643 |
D3DB6815 |
31-cloud_security.mkv
[cfcda80ff7ef13da]
|
69,551,899 |
E81A3CFC |
32-conclusion.mkv
[e203d7f21104331d]
|
24,614,852 |
B2044FCF |
SIA - Final Assessment.pdf.pdf |
70,235 |
07294164 |
|
Total size: |
1,455,854,191 |
|
|