RAR-files |
ilearn-csf.rar |
15,000,000 |
8D008FC6 |
ilearn-csf.r00 |
15,000,000 |
FB574293 |
ilearn-csf.r01 |
15,000,000 |
9C528EA3 |
ilearn-csf.r02 |
15,000,000 |
72699299 |
ilearn-csf.r03 |
15,000,000 |
32BEC45F |
ilearn-csf.r04 |
15,000,000 |
BCFE565F |
ilearn-csf.r05 |
15,000,000 |
FF117911 |
ilearn-csf.r06 |
15,000,000 |
3E1D85F5 |
ilearn-csf.r07 |
15,000,000 |
4911608D |
ilearn-csf.r08 |
15,000,000 |
4BBF0506 |
ilearn-csf.r09 |
15,000,000 |
DEFF7BDE |
ilearn-csf.r10 |
15,000,000 |
3371CC29 |
ilearn-csf.r11 |
15,000,000 |
0FD904AD |
ilearn-csf.r12 |
15,000,000 |
963B5808 |
ilearn-csf.r13 |
15,000,000 |
A47CA2C6 |
ilearn-csf.r14 |
15,000,000 |
C50FF162 |
ilearn-csf.r15 |
15,000,000 |
90359944 |
ilearn-csf.r16 |
15,000,000 |
772ADB85 |
ilearn-csf.r17 |
15,000,000 |
2DDA1AF2 |
ilearn-csf.r18 |
15,000,000 |
E64F12AA |
ilearn-csf.r19 |
15,000,000 |
4B89D1DD |
ilearn-csf.r20 |
15,000,000 |
EAB71708 |
ilearn-csf.r21 |
15,000,000 |
DC1F12D8 |
ilearn-csf.r22 |
15,000,000 |
9D6E408B |
ilearn-csf.r23 |
15,000,000 |
22CB6763 |
ilearn-csf.r24 |
15,000,000 |
FE751EBB |
ilearn-csf.r25 |
15,000,000 |
07765915 |
ilearn-csf.r26 |
15,000,000 |
3C4BDA2B |
ilearn-csf.r27 |
15,000,000 |
3674E304 |
ilearn-csf.r28 |
15,000,000 |
6AC741C5 |
ilearn-csf.r29 |
15,000,000 |
9815EBBC |
ilearn-csf.r30 |
15,000,000 |
9D9D220E |
ilearn-csf.r31 |
15,000,000 |
BB08D67E |
ilearn-csf.r32 |
15,000,000 |
28CF1AF6 |
ilearn-csf.r33 |
15,000,000 |
095A9489 |
ilearn-csf.r34 |
15,000,000 |
841F8FB8 |
ilearn-csf.r35 |
15,000,000 |
D93177F1 |
ilearn-csf.r36 |
15,000,000 |
7A5EA73E |
ilearn-csf.r37 |
10,915,397 |
913547EC |
|
Total size: |
580,915,397 |
|
|
Archived
files |
5. Cybersecurity market size.mp4
[3644b2658c364cab]
|
11,361,139 |
80047518 |
6. Cybersecurity vs Cyber Security.mp4
[cfdea562c39ce44f]
|
13,087,645 |
6C64BBD0 |
7. Cybersecurity vs information security.mp4
[e1b47218fa75fd1b]
|
21,584,099 |
2F4D05D0 |
8. Cybersecurity pathway.mp4
[f102cf4528ea7dd2]
|
24,582,108 |
7DBC0615 |
9. Roadmap & salary expectation.mp4
[73427be7c04401a3]
|
30,913,734 |
557DA5A0 |
10. Top cybersecurity certifications.mp4
[8e69658488a77ef3]
|
26,895,782 |
5DC68885 |
11. Section introduction.mp4
[1c246540fa764405]
|
6,312,066 |
4726E509 |
12. Hackers categories.mp4
[f5f269555860a798]
|
33,964,991 |
D81767A9 |
13. Hackers motivations.mp4
[fc658e1b4ae2202f]
|
11,377,049 |
92A33B31 |
14. Why hackers hack.mp4
[cf12678827b1f808]
|
24,203,405 |
948DE562 |
15. Cybersecurity killchain - Part 01.mp4
[bb39a1585b16f4df]
|
16,320,309 |
1A0E77FA |
16. Cybersecurity killchain - Part 02.mp4
[50fdc4431284e5e0]
|
19,625,463 |
2F1CBB17 |
17. Social engineering.mp4
[6b3a2499252c0866]
|
47,671,041 |
A1EFA12B |
18. Hacking techniques.mp4
[8d196d7a3dc51ac9]
|
12,844,575 |
AD661137 |
19. Malwares - Part 01.mp4
[eabbb5fcdbac9c34]
|
26,241,819 |
CF8F94F5 |
20. Malwares - Part 02.mp4
[97dfb1ab14a5e5c]
|
26,610,656 |
41751DCF |
21. Section introduction.mp4
[d82d4a6125305582]
|
9,514,128 |
96CBFD62 |
22. ISO 27001.mp4
[a4f27dfaae6f856a]
|
17,682,411 |
F8CEEF35 |
23. NIST.mp4
[3d49900345efc06f]
|
24,783,997 |
B3A5F7F1 |
24. PCI-DSS.mp4
[5b7c96a29a32e457]
|
12,761,266 |
AF0854A4 |
25. How to become PCI-DSS compliant.mp4
[fd3816102d538860]
|
9,223,829 |
9018C548 |
26. Cybersecurity laws.mp4
[3804e48c44979413]
|
15,067,985 |
BD28EFB9 |
27. Cybersecurity laws examples (US, EU & Australia).mp4
[d4ec8093f0167b51]
|
29,870,795 |
7DFFE99B |
28. Conclusion.mp4
[9d89ed98f42475dc]
|
13,534,083 |
859C11A5 |
1. Course introduction.mp4
[230aa1b104cb992c]
|
42,599,060 |
51F76785 |
2. Section introduction.mp4
[ea7f3f7e432dd4a4]
|
9,795,650 |
AC8CFA20 |
3. What is cybersecurity.mp4
[7365945bd23c2ecc]
|
15,416,509 |
A27324CB |
4. Cybersecurity statistics.mp4
[165402bbbe365675]
|
27,063,800 |
466FB9B9 |
|
Total size: |
580,909,394 |
|
|