RAR-files |
ilearn-tbocs2020.rar |
15,000,000 |
B44A32B2 |
ilearn-tbocs2020.r00 |
15,000,000 |
74816003 |
ilearn-tbocs2020.r01 |
15,000,000 |
E35DEF3A |
ilearn-tbocs2020.r02 |
15,000,000 |
42C3C921 |
ilearn-tbocs2020.r03 |
15,000,000 |
41CE4D2F |
ilearn-tbocs2020.r04 |
15,000,000 |
716F8F9A |
ilearn-tbocs2020.r05 |
15,000,000 |
DF08B6EF |
ilearn-tbocs2020.r06 |
15,000,000 |
44E79B5A |
ilearn-tbocs2020.r07 |
15,000,000 |
FBA836DF |
ilearn-tbocs2020.r08 |
15,000,000 |
9BE39E32 |
ilearn-tbocs2020.r09 |
15,000,000 |
5B5F12F4 |
ilearn-tbocs2020.r10 |
15,000,000 |
9928B37E |
ilearn-tbocs2020.r11 |
15,000,000 |
BCF8FBF2 |
ilearn-tbocs2020.r12 |
15,000,000 |
AA2D035B |
ilearn-tbocs2020.r13 |
15,000,000 |
12A3D9EC |
ilearn-tbocs2020.r14 |
15,000,000 |
83F80613 |
ilearn-tbocs2020.r15 |
15,000,000 |
8B5B1671 |
ilearn-tbocs2020.r16 |
15,000,000 |
77084B36 |
ilearn-tbocs2020.r17 |
15,000,000 |
597DA7D8 |
ilearn-tbocs2020.r18 |
15,000,000 |
92D534DF |
ilearn-tbocs2020.r19 |
15,000,000 |
41C04B71 |
ilearn-tbocs2020.r20 |
15,000,000 |
EA347718 |
ilearn-tbocs2020.r21 |
15,000,000 |
3CEAF1D6 |
ilearn-tbocs2020.r22 |
15,000,000 |
897A6AE8 |
ilearn-tbocs2020.r23 |
15,000,000 |
F92E5D81 |
ilearn-tbocs2020.r24 |
10,384,965 |
E404EB47 |
|
Total size: |
385,384,965 |
|
|
Archived
files |
8. Risk Management (Definition and Function).mp4
[cbcf1b373afe06d4]
|
4,588,081 |
5B36676E |
9. Risk Management Methodology.mp4
[f4bb730b0900137e]
|
24,871,891 |
8772583C |
10. Responding to Risk.mp4
[49b861c9f8fcb56c]
|
8,037,625 |
C5A5DB3E |
11. Risk Reporting.mp4
[c5efa86317cf20e7]
|
20,016,363 |
C37B40E8 |
12. What is Cryptography.mp4
[c5533f53648f88ae]
|
13,175,090 |
0CA09889 |
13. Encryption Elements and Types.mp4
[4cde244db0379859]
|
18,019,638 |
CF450319 |
14. What is Business Continuity.mp4
[591f0f4938109884]
|
14,780,845 |
7F7D4187 |
15. Business Continuity Components.mp4
[4ea5cbe5a79ed5fa]
|
19,587,615 |
BA95A499 |
16. Business Continuity Planning.mp4
[bc4d3b924759396]
|
21,494,017 |
0FBEF360 |
1. Introduction.mp4
[b16a732bb38f1889]
|
19,518,190 |
FDED0923 |
2. What is Cyber Security.mp4
[426f10fbf9efb9ae]
|
41,528,723 |
38D7050B |
3. Information Assets.mp4
[c1e224f2d1d2c127]
|
24,822,739 |
4718645D |
4. Introduction.mp4
[679061886e76a592]
|
3,252,807 |
BAF53328 |
5. Personal Information and Protection.mp4
[b445de53db45bccc]
|
47,571,181 |
7A41E962 |
6. Top Cyber Threats Faced by Organizations.mp4
[cfe9d75949d5cd01]
|
54,661,651 |
FC97416C |
7. Most Important Risks and Cyber Threats.mp4
[42c56ae1559383b6]
|
49,454,523 |
AB0DABEF |
|
Total size: |
385,380,979 |
|
|