Torrent Info
Title Cybersecurity for Executives
Category
Size 286.81MB

Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
01.Cybersecurity for executives.en.srt 2.10KB
01.Cybersecurity for executives.mp4 4.11MB
02.What you should know.en.srt 1.33KB
02.What you should know.mp4 1.17MB
03.How this course is organized.en.srt 1.62KB
03.How this course is organized.mp4 2.15MB
04.Understand the big picture overview.en.srt 2.08KB
04.Understand the big picture overview.mp4 4.54MB
05.Why are you a target.en.srt 3.86KB
05.Why are you a target.mp4 7.72MB
06.Example - Organized crime.en.srt 4.37KB
06.Example - Organized crime.mp4 9.22MB
07.Why are you in the line of fire.en.srt 3.47KB
07.Why are you in the line of fire.mp4 6.79MB
08.Example - Cyberwar cross-fire.en.srt 3.19KB
08.Example - Cyberwar cross-fire.mp4 7.21MB
09.Insider threat - Cyber failure.en.srt 4.28KB
09.Insider threat - Cyber failure.mp4 7.29MB
10.Think about cybersecurity summary.en.srt 1.62KB
10.Think about cybersecurity summary.mp4 2.75MB
11.Not what you buy, how you travel.en.srt 5.88KB
11.Not what you buy, how you travel.mp4 10.49MB
12.Germ theory.en.srt 2.63KB
12.Germ theory.mp4 7.65MB
13.Where to get IT support.en.srt 6.13KB
13.Where to get IT support.mp4 10.53MB
14.Avoid phishing attacks summary.en.srt 1.53KB
14.Avoid phishing attacks summary.mp4 3.08MB
15.What are phishing attacks.en.srt 3.61KB
15.What are phishing attacks.mp4 9.67MB
16.How to avoid phishing attacks.en.srt 4.27KB
16.How to avoid phishing attacks.mp4 7.99MB
17.Organizational response to phishing attacks.en.srt 4.49KB
17.Organizational response to phishing attacks.mp4 6.35MB
18.Stop malicious code summary.en.srt 1014B
18.Stop malicious code summary.mp4 1.26MB
19.What is malicious code.en.srt 4.39KB
19.What is malicious code.mp4 8.07MB
20.How to avoid malicious code.en.srt 6.75KB
20.How to avoid malicious code.mp4 11.88MB
21.Organizational response to malicious code.en.srt 5.03KB
21.Organizational response to malicious code.mp4 7.25MB
22.Avoid identity theft summary.en.srt 1019B
22.Avoid identity theft summary.mp4 2.05MB
23.What is identity theft.en.srt 4.16KB
23.What is identity theft.mp4 8.22MB
24.How to avoid identity theft.en.srt 5.45KB
24.How to avoid identity theft.mp4 10.87MB
25.Organizational response to identity theft.en.srt 5.88KB
25.Organizational response to identity theft.mp4 8.06MB
26.Avoid financial cybertheft summary.en.srt 1.01KB
26.Avoid financial cybertheft summary.mp4 1.87MB
27.What is financial cybertheft.en.srt 4.62KB
27.What is financial cybertheft.mp4 9.15MB
28.How to avoid financial cybertheft.en.srt 5.54KB
28.How to avoid financial cybertheft.mp4 8.14MB
29.Organizational response to financial cybertheft.en.srt 5.60KB
29.Organizational response to financial cybertheft.mp4 7.48MB
30.Avoid cyberattacks summary.en.srt 1.04KB
30.Avoid cyberattacks summary.mp4 1.87MB
31.What are cyberattacks on long trips.en.srt 4.06KB
31.What are cyberattacks on long trips.mp4 8.06MB
32.How to avoid cyberattacks on long trips.en.srt 4.50KB
32.How to avoid cyberattacks on long trips.mp4 7.37MB
33.Organizational response to cyberattacks on long trips.en.srt 4.11KB
33.Organizational response to cyberattacks on long trips.mp4 5.92MB
34.Special topics summary.en.srt 3.08KB
34.Special topics summary.mp4 5.86MB
35.Reasonable cybersecurity.en.srt 5.69KB
35.Reasonable cybersecurity.mp4 9.97MB
36.Cyber insurance.en.srt 4.78KB
36.Cyber insurance.mp4 8.05MB
37.Cloud computing.en.srt 5.41KB
37.Cloud computing.mp4 7.05MB
38.Internet of Things.en.srt 3.79KB
38.Internet of Things.mp4 6.09MB
39.Contractual firewalls.en.srt 5.68KB
39.Contractual firewalls.mp4 7.16MB
40.Third-party cyber risk management.en.srt 4.97KB
40.Third-party cyber risk management.mp4 7.63MB
41.Cybersecurity-related sales objectives.en.srt 6.03KB
41.Cybersecurity-related sales objectives.mp4 10.92MB
42.Active defense.en.srt 4.79KB
42.Active defense.mp4 5.74MB
43.Next steps.en.srt 1.66KB
43.Next steps.mp4 1.96MB
Distribution statistics by country
Germany (DE) 2
Japan (JP) 1
United Kingdom (GB) 1
Poland (PL) 1
Kenya (KE) 1
Republic of Korea (KR) 1
United States (US) 1
Romania (RO) 1
Total 9
IP List List of IP addresses which were distributed this torrent