[ CourseWikia.com ] Professional Diploma in Cyber Security

Photo unavailable
Category:
Date:
04/25/24 at 5:24pm GMT+1
Submitter:
Seeders:
27
Leechers:
1
File size:
3.1 GB in 98 files

Torrent Status:
  This torrent has been verified.

Infohash:
e2ff42fa3a5f7a0e1ca0d27f1d76044b4db73700


File list

  • [ CourseWikia.com ] Professional Diploma in Cyber Security
  • icon ~Get Your Files Here !/1. Introduction/1. Introduction.mp4 107.7 MB
    icon ~Get Your Files Here !/1. Introduction/1.1 Cyber Security (1)pr (2).mp4 24.1 MB
    icon ~Get Your Files Here !/1. Introduction/10. Cyber Security Ideologies.html 4.1 KB
    icon ~Get Your Files Here !/1. Introduction/10.1 Cyber Security Analysis.mp4 18.1 MB
    icon ~Get Your Files Here !/1. Introduction/11. Cyber Security Perspectives.mp4 74.4 MB
    icon ~Get Your Files Here !/1. Introduction/11.1 Cyber Security (1)presentation with notes.pptx 105.6 KB
    icon ~Get Your Files Here !/1. Introduction/12. The Importance of Cyber Security.mp4 23.4 MB
    icon ~Get Your Files Here !/1. Introduction/12.1 IMPORTANCE+OF+CYBER+SECURITY.pptx 71.5 KB
    icon ~Get Your Files Here !/1. Introduction/13. Implications of Cyber Security.mp4 48 MB
    icon ~Get Your Files Here !/1. Introduction/13.1 THE IMPLICATIONS OF CYBER SECURITY- fv.pptx 102.4 KB
    icon ~Get Your Files Here !/1. Introduction/14. Explain the fundamental principles of Cyber Security.html 153 B
    icon ~Get Your Files Here !/1. Introduction/2. Introduction.mp4 8.8 MB
    icon ~Get Your Files Here !/1. Introduction/2.1 Cyber Security Concepts.mp4 20.5 MB
    icon ~Get Your Files Here !/1. Introduction/3. Cyber Security Fundamentals.mp4 74.4 MB
    icon ~Get Your Files Here !/1. Introduction/3.1 Fundamental Principles of Cyber Security (1).pptx 73.4 KB
    icon ~Get Your Files Here !/1. Introduction/4. Cyber Security Principles.mp4 43.7 MB
    icon ~Get Your Files Here !/1. Introduction/4.1 The Fundamental Principles Of Cyber Security (1).pptx 193 KB
    icon ~Get Your Files Here !/1. Introduction/5. Cyber Security Concepts.mp4 60.2 MB
    icon ~Get Your Files Here !/1. Introduction/5.1 Cyber Security Concepts BV (1).pptx 103.1 KB
    icon ~Get Your Files Here !/1. Introduction/6. Cyber Security Theories.mp4 64.7 MB
    icon ~Get Your Files Here !/1. Introduction/6.1 Cyber Security Theor.mp4 21.9 MB
    icon ~Get Your Files Here !/1. Introduction/7. Cyber Security Terminologies and Definitions.html 4.5 KB
    icon ~Get Your Files Here !/1. Introduction/7.1 Cyber Security Concepts BV (1).pptx 103.1 KB
    icon ~Get Your Files Here !/1. Introduction/8. Cyber Security Paradigms.html 3.2 KB
    icon ~Get Your Files Here !/1. Introduction/8.1 Cyber Security - An Exploratory Study.pptx 193.1 KB
    icon ~Get Your Files Here !/1. Introduction/9. Cyber Security Philosophies.html 3.7 KB
    icon ~Get Your Files Here !/1. Introduction/9.1 CYBER SECURITY ESSEN.mp4 16.7 MB
    icon ~Get Your Files Here !/10. Stakeholder Analysis in Cyber Security/1. The Various Stakeholders in the Cyber Ecosystem.mp4 36.2 MB
    icon ~Get Your Files Here !/10. Stakeholder Analysis in Cyber Security/1.1 The Role Of Stakeholders In Cyber Security (2).pptx 192 KB
    icon ~Get Your Files Here !/10. Stakeholder Analysis in Cyber Security/2. The role and importance of the stakeholders.mp4 36.2 MB
    icon ~Get Your Files Here !/10. Stakeholder Analysis in Cyber Security/2.1 The Role Of Stakeholders In Cyber Security (2).pptx 192 KB
    icon ~Get Your Files Here !/10. Stakeholder Analysis in Cyber Security/3. The Importance of Stakeholders.html 149 B
    icon ~Get Your Files Here !/11. The Cyber Security Landscape (environment)/1. The cyber security environment.mp4 47.3 MB
    icon ~Get Your Files Here !/11. The Cyber Security Landscape (environment)/1.1 Cyber Security Environment.pptx 194 KB
    icon ~Get Your Files Here !/11. The Cyber Security Landscape (environment)/1.2 Cyber Security Landscape.mp4 12.8 MB
    icon ~Get Your Files Here !/11. The Cyber Security Landscape (environment)/2. What do you understand by the cyber security landscapeenvironment.html 153 B
    icon ~Get Your Files Here !/12. Cyber Security Interventions/1. Intervention Strategies to deal with Cyber Threats.mp4 34.3 MB
    icon ~Get Your Files Here !/12. Cyber Security Interventions/1.1 Protecting Digital Assets from Cyber Attacks.mp4 9.9 MB
    icon ~Get Your Files Here !/12. Cyber Security Interventions/2. Cryptography and Encryption.html 3.7 KB
    icon ~Get Your Files Here !/12. Cyber Security Interventions/2.1 Cryptography and Encryption.docx 20.8 KB
    icon ~Get Your Files Here !/12. Cyber Security Interventions/3. List and Explain the intervention strategies to deal with cyber threat.html 153 B
    icon ~Get Your Files Here !/13. Protecting your Digital Assets/1. Cyber Security Strategy.mp4 34.3 MB
    icon ~Get Your Files Here !/13. Protecting your Digital Assets/1.1 Cyber Security (1)pr.jpg 15.2 KB
    icon ~Get Your Files Here !/13. Protecting your Digital Assets/1.2 Cyber Security Strategy.pptx 194.5 KB
    icon ~Get Your Files Here !/13. Protecting your Digital Assets/2. Protecting your digital assets.html 149 B
    icon ~Get Your Files Here !/14. Cyber Threat Landscape/1. Landscape of Cyber Threat.mp4 47.2 MB
    icon ~Get Your Files Here !/14. Cyber Threat Landscape/1.1 Cyber Security Landscape.pptx 73.9 KB
    icon ~Get Your Files Here !/14. Cyber Threat Landscape/2. Common Types of Cyber Threat and their Impact.mp4 46.1 MB
    icon ~Get Your Files Here !/14. Cyber Threat Landscape/2.1 Common Cyber Security Threats.pptx 95.8 KB
    icon ~Get Your Files Here !/14. Cyber Threat Landscape/3. Explain the common types of cyber threats and their impact.html 153 B
    icon ~Get Your Files Here !/15. Network Security Fundamentals/1. Essential Principles of Securing Networks.mp4 43.6 MB
    icon ~Get Your Files Here !/15. Network Security Fundamentals/1.1 The Fundamental Principles Of Cyber Security (1) (1).pptx 193 KB
    icon ~Get Your Files Here !/15. Network Security Fundamentals/2. Firewalls.html 3.7 KB
    icon ~Get Your Files Here !/15. Network Security Fundamentals/2.1 Cyber Security (1)pr.mp4 20.5 MB
    icon ~Get Your Files Here !/15. Network Security Fundamentals/3. Intrusion Detection Systems.html 3.8 KB
    icon ~Get Your Files Here !/15. Network Security Fundamentals/3.1 Cyber Security Tools.pptx 192.5 KB
    icon ~Get Your Files Here !/15. Network Security Fundamentals/4. VPNs.html 3.5 KB
    icon ~Get Your Files Here !/15. Network Security Fundamentals/4.1 VPN.jpg 121.3 KB
    icon ~Get Your Files Here !/15. Network Security Fundamentals/5. What are the essential principles of securing networks.html 153 B
    icon ~Get Your Files Here !/16. Web Application Security/1. Best Practices for Securing Web Applications.mp4 43.7 MB
    icon ~Get Your Files Here !/16. Web Application Security/1.1 Fundamental Principles of Cyber Security.pptx 73.3 KB
    icon ~Get Your Files Here !/16. Web Application Security/2. Common Vulnerabilities and Mitigation Strategies.mp4 46.8 MB
    icon ~Get Your Files Here !/16. Web Application Security/2.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (1).pptx 102.1 KB
    icon ~Get Your Files Here !/16. Web Application Security/3. What are the best practices for securing web applications.html 153 B
    icon ~Get Your Files Here !/17. Cloud Security/1. Unique challenges of Cloud Security.html 4.7 KB
    icon ~Get Your Files Here !/17. Cloud Security/1.1 Common Cyber Security Threats BV.pptx 104.3 KB
    icon ~Get Your Files Here !/17. Cloud Security/2. Solutions for securing data and applications in cloud environments.html 4.3 KB
    icon ~Get Your Files Here !/17. Cloud Security/2.1 Cyber Security Attacks and Recommended Solutions.docx 18.3 KB
    icon ~Get Your Files Here !/17. Cloud Security/3. Cloud Security.html 149 B
    icon ~Get Your Files Here !/18. Mobile Security/1. Specific Security Considerations for Mobile Devices.mp4 45.8 MB
    icon ~Get Your Files Here !/18. Mobile Security/1.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4 11.8 MB
    icon ~Get Your Files Here !/18. Mobile Security/2. Specific security considerations for mobile applications and mobile devices.mp4 34.3 MB
    icon ~Get Your Files Here !/18. Mobile Security/2.1 Protecting Digital Assets from Cyber Attacks.mp4 9.9 MB
    icon ~Get Your Files Here !/18. Mobile Security/3. Mobile Device management.html 2.9 KB
    icon ~Get Your Files Here !/18. Mobile Security/3.1 Protecting Digital Assets from Cyber Attacks.mp4 9.9 MB
    icon ~Get Your Files Here !/18. Mobile Security/4. Secure App Development.mp4 43.6 MB
    icon ~Get Your Files Here !/18. Mobile Security/4.1 Cyber Security Polic(1).mp4 14 MB
    icon ~Get Your Files Here !/18. Mobile Security/5. Mobile Security.html 149 B
    icon ~Get Your Files Here !/19. IoT Security/1. IoT Security Challenges.html 3.6 KB
    icon ~Get Your Files Here !/19. IoT Security/1.1 Cyber Security Threat Intelligence Sharing And Collaboration (1).pptx 192.9 KB
    icon ~Get Your Files Here !/19. IoT Security/2. IoT Associated Risks.mp4 46.1 MB
    icon ~Get Your Files Here !/19. IoT Security/2.1 Cyber Security Risks.mp4 18.3 MB
    icon ~Get Your Files Here !/19. IoT Security/3. How to Mitigate IoT Associated Risks.mp4 34.3 MB
    icon ~Get Your Files Here !/19. IoT Security/3.1 Protecting Your Digital Resources From Cyber Attacks.pptx 72.7 KB
    icon ~Get Your Files Here !/19. IoT Security/4. IoT Security.html 149 B
    icon ~Get Your Files Here !/2. Cyber Security Ecosystem/1. Cyber Security as an Ecosystem.mp4 54.7 MB
    icon ~Get Your Files Here !/2. Cyber Security Ecosystem/1.1 Cyber Security Ecosy(2).mp4 13.9 MB
    icon ~Get Your Files Here !/2. Cyber Security Ecosystem/1.2 Cyber Security Ecosystem (1).pptx 103.2 KB
    icon ~Get Your Files Here !/2. Cyber Security Ecosystem/1.3 CYBER SECURITY ECOSYSTEM.docx 18.1 MB
    icon ~Get Your Files Here !/2. Cyber Security Ecosystem/2. How the Cyber Security Ecosystem Works.mp4 54.7 MB
    icon ~Get Your Files Here !/2. Cyber Security Ecosystem/3. Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4 46.8 MB
    icon ~Get Your Files Here !/2. Cyber Security Ecosystem/3.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4 11.8 MB
    icon ~Get Your Files Here !/2. Cyber Security Ecosystem/4. Types of Risks in the Cyber Ecosystem.mp4 46.1 MB
    icon ~Get Your Files Here !/2. Cyber Security Ecosystem/4.1 Cyber Security Risks BV.pptx 73.9 KB
    icon ~Get Your Files Here !/2. Cyber Security Ecosystem/4.2 Cyber Security Risks BV.pptx 73.9 KB
    icon ~Get Your Files Here !/2. Cyber Security Ecosystem/4.3 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4 11.8 MB
    icon ~Get Your Files Here !/2. Cyber Security Ecosystem/4.4 Cyber Security Risks.docx 20.4 KB
    icon ~Get Your Files Here !/2. Cyber Security Ecosystem/5. Malware.html 4.3 KB

Similar Torrents

Category
Name
Size
Date
 [ CourseWikia.com ] Udemy - ChatGPT Masterclass - A Complete ChatGPT Guide for Beginners! 2.6 GB01/18/23607
 [ CourseWikia com ] Curry Cookbook - 60 Authentic Recipes To Prepare At Home Traditiona ...39 MB04/22/24361
 [ CourseWikia.com ] Professional Diploma in Cyber Security 3.1 GB04/25/24271
 [ CourseWikia com ] Easy Greek Cookbook - From Moussaka To Souvlaki The 25 Essential Gr ... 27 MB04/22/24260
 [ CourseWikia com ] WIRING FOR BEGINNERS - A Comprehensive, Step-by-step Guide to Maste ... 7 MB03/18/24220
 [ CourseWikia com ] Homestyle Kitchen - Fresh & Timeless Comfort Food for Sharing (Home ... 47 MB04/22/24211
 [ CourseWikia.com ] Udemy - Hydroponic Farming 621 MB11/13/23200
 [ CourseWikia com ] ChatGPT Plugins Handbook - Understand the features and usage of eac ... 1 MB04/22/24200
 [ CourseWikia com ] Lebanese And Italian Culinary Traditions - 2 Books In 1 - Explore T ... 110 MB04/22/24201
 [ CourseWikia com ] Pickling and Fermenting Cookbook for Preppers - 1000 Days of Recipe ... 2 MB08/29/23190
 [ CourseWikia.com ] Udemy - How To Create Videos Contents Using Ai Free Ai Tools 1016 MB03/21/24192
 [ CourseWikia com ] HECK! Recipes You Can Swear By - 75 Recipes for Sausages, Burgers a ... 39 MB04/22/24191
 [ CourseWikia.com ] Skillshare - Let's Exercise! Play Guitar Faster in 30 minutes 659 MB04/25/24191
 [ CourseWikia com ] Solar Power - How To Setup Your Personal Solar Power System And Sup ... 1 MB07/20/23181
 [ CourseWikia.com ] Udemy - Earn From Youtube Using Chatgpt In 2023 1.2 GB10/30/23170