Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
01.Cybersecurity for executives.en.srt |
2.10KB |
01.Cybersecurity for executives.mp4 |
4.11MB |
02.What you should know.en.srt |
1.33KB |
02.What you should know.mp4 |
1.17MB |
03.How this course is organized.en.srt |
1.62KB |
03.How this course is organized.mp4 |
2.15MB |
04.Understand the big picture overview.en.srt |
2.08KB |
04.Understand the big picture overview.mp4 |
4.54MB |
05.Why are you a target.en.srt |
3.86KB |
05.Why are you a target.mp4 |
7.72MB |
06.Example - Organized crime.en.srt |
4.37KB |
06.Example - Organized crime.mp4 |
9.22MB |
07.Why are you in the line of fire.en.srt |
3.47KB |
07.Why are you in the line of fire.mp4 |
6.79MB |
08.Example - Cyberwar cross-fire.en.srt |
3.19KB |
08.Example - Cyberwar cross-fire.mp4 |
7.21MB |
09.Insider threat - Cyber failure.en.srt |
4.28KB |
09.Insider threat - Cyber failure.mp4 |
7.29MB |
10.Think about cybersecurity summary.en.srt |
1.62KB |
10.Think about cybersecurity summary.mp4 |
2.75MB |
11.Not what you buy, how you travel.en.srt |
5.88KB |
11.Not what you buy, how you travel.mp4 |
10.49MB |
12.Germ theory.en.srt |
2.63KB |
12.Germ theory.mp4 |
7.65MB |
13.Where to get IT support.en.srt |
6.13KB |
13.Where to get IT support.mp4 |
10.53MB |
14.Avoid phishing attacks summary.en.srt |
1.53KB |
14.Avoid phishing attacks summary.mp4 |
3.08MB |
15.What are phishing attacks.en.srt |
3.61KB |
15.What are phishing attacks.mp4 |
9.67MB |
16.How to avoid phishing attacks.en.srt |
4.27KB |
16.How to avoid phishing attacks.mp4 |
7.99MB |
17.Organizational response to phishing attacks.en.srt |
4.49KB |
17.Organizational response to phishing attacks.mp4 |
6.35MB |
18.Stop malicious code summary.en.srt |
1014B |
18.Stop malicious code summary.mp4 |
1.26MB |
19.What is malicious code.en.srt |
4.39KB |
19.What is malicious code.mp4 |
8.07MB |
20.How to avoid malicious code.en.srt |
6.75KB |
20.How to avoid malicious code.mp4 |
11.88MB |
21.Organizational response to malicious code.en.srt |
5.03KB |
21.Organizational response to malicious code.mp4 |
7.25MB |
22.Avoid identity theft summary.en.srt |
1019B |
22.Avoid identity theft summary.mp4 |
2.05MB |
23.What is identity theft.en.srt |
4.16KB |
23.What is identity theft.mp4 |
8.22MB |
24.How to avoid identity theft.en.srt |
5.45KB |
24.How to avoid identity theft.mp4 |
10.87MB |
25.Organizational response to identity theft.en.srt |
5.88KB |
25.Organizational response to identity theft.mp4 |
8.06MB |
26.Avoid financial cybertheft summary.en.srt |
1.01KB |
26.Avoid financial cybertheft summary.mp4 |
1.87MB |
27.What is financial cybertheft.en.srt |
4.62KB |
27.What is financial cybertheft.mp4 |
9.15MB |
28.How to avoid financial cybertheft.en.srt |
5.54KB |
28.How to avoid financial cybertheft.mp4 |
8.14MB |
29.Organizational response to financial cybertheft.en.srt |
5.60KB |
29.Organizational response to financial cybertheft.mp4 |
7.48MB |
30.Avoid cyberattacks summary.en.srt |
1.04KB |
30.Avoid cyberattacks summary.mp4 |
1.87MB |
31.What are cyberattacks on long trips.en.srt |
4.06KB |
31.What are cyberattacks on long trips.mp4 |
8.06MB |
32.How to avoid cyberattacks on long trips.en.srt |
4.50KB |
32.How to avoid cyberattacks on long trips.mp4 |
7.37MB |
33.Organizational response to cyberattacks on long trips.en.srt |
4.11KB |
33.Organizational response to cyberattacks on long trips.mp4 |
5.92MB |
34.Special topics summary.en.srt |
3.08KB |
34.Special topics summary.mp4 |
5.86MB |
35.Reasonable cybersecurity.en.srt |
5.69KB |
35.Reasonable cybersecurity.mp4 |
9.97MB |
36.Cyber insurance.en.srt |
4.78KB |
36.Cyber insurance.mp4 |
8.05MB |
37.Cloud computing.en.srt |
5.41KB |
37.Cloud computing.mp4 |
7.05MB |
38.Internet of Things.en.srt |
3.79KB |
38.Internet of Things.mp4 |
6.09MB |
39.Contractual firewalls.en.srt |
5.68KB |
39.Contractual firewalls.mp4 |
7.16MB |
40.Third-party cyber risk management.en.srt |
4.97KB |
40.Third-party cyber risk management.mp4 |
7.63MB |
41.Cybersecurity-related sales objectives.en.srt |
6.03KB |
41.Cybersecurity-related sales objectives.mp4 |
10.92MB |
42.Active defense.en.srt |
4.79KB |
42.Active defense.mp4 |
5.74MB |
43.Next steps.en.srt |
1.66KB |
43.Next steps.mp4 |
1.96MB |