[ CourseWikia.com ] Professional Diploma in Cyber Security
~Get Your Files Here !/1. Introduction/1. Introduction.mp4 107.7 MB ~Get Your Files Here !/1. Introduction/1.1 Cyber Security (1)pr (2).mp4 24.1 MB ~Get Your Files Here !/1. Introduction/10. Cyber Security Ideologies.html 4.1 KB ~Get Your Files Here !/1. Introduction/10.1 Cyber Security Analysis.mp4 18.1 MB ~Get Your Files Here !/1. Introduction/11. Cyber Security Perspectives.mp4 74.4 MB ~Get Your Files Here !/1. Introduction/11.1 Cyber Security (1)presentation with notes.pptx 105.6 KB ~Get Your Files Here !/1. Introduction/12. The Importance of Cyber Security.mp4 23.4 MB ~Get Your Files Here !/1. Introduction/12.1 IMPORTANCE+OF+CYBER+SECURITY.pptx 71.5 KB ~Get Your Files Here !/1. Introduction/13. Implications of Cyber Security.mp4 48 MB ~Get Your Files Here !/1. Introduction/13.1 THE IMPLICATIONS OF CYBER SECURITY- fv.pptx 102.4 KB ~Get Your Files Here !/1. Introduction/14. Explain the fundamental principles of Cyber Security.html 153 B ~Get Your Files Here !/1. Introduction/2. Introduction.mp4 8.8 MB ~Get Your Files Here !/1. Introduction/2.1 Cyber Security Concepts.mp4 20.5 MB ~Get Your Files Here !/1. Introduction/3. Cyber Security Fundamentals.mp4 74.4 MB ~Get Your Files Here !/1. Introduction/3.1 Fundamental Principles of Cyber Security (1).pptx 73.4 KB ~Get Your Files Here !/1. Introduction/4. Cyber Security Principles.mp4 43.7 MB ~Get Your Files Here !/1. Introduction/4.1 The Fundamental Principles Of Cyber Security (1).pptx 193 KB ~Get Your Files Here !/1. Introduction/5. Cyber Security Concepts.mp4 60.2 MB ~Get Your Files Here !/1. Introduction/5.1 Cyber Security Concepts BV (1).pptx 103.1 KB ~Get Your Files Here !/1. Introduction/6. Cyber Security Theories.mp4 64.7 MB ~Get Your Files Here !/1. Introduction/6.1 Cyber Security Theor.mp4 21.9 MB ~Get Your Files Here !/1. Introduction/7. Cyber Security Terminologies and Definitions.html 4.5 KB ~Get Your Files Here !/1. Introduction/7.1 Cyber Security Concepts BV (1).pptx 103.1 KB ~Get Your Files Here !/1. Introduction/8. Cyber Security Paradigms.html 3.2 KB ~Get Your Files Here !/1. Introduction/8.1 Cyber Security - An Exploratory Study.pptx 193.1 KB ~Get Your Files Here !/1. Introduction/9. Cyber Security Philosophies.html 3.7 KB ~Get Your Files Here !/1. Introduction/9.1 CYBER SECURITY ESSEN.mp4 16.7 MB ~Get Your Files Here !/10. Stakeholder Analysis in Cyber Security/1. The Various Stakeholders in the Cyber Ecosystem.mp4 36.2 MB ~Get Your Files Here !/10. Stakeholder Analysis in Cyber Security/1.1 The Role Of Stakeholders In Cyber Security (2).pptx 192 KB ~Get Your Files Here !/10. Stakeholder Analysis in Cyber Security/2. The role and importance of the stakeholders.mp4 36.2 MB ~Get Your Files Here !/10. Stakeholder Analysis in Cyber Security/2.1 The Role Of Stakeholders In Cyber Security (2).pptx 192 KB ~Get Your Files Here !/10. Stakeholder Analysis in Cyber Security/3. The Importance of Stakeholders.html 149 B ~Get Your Files Here !/11. The Cyber Security Landscape (environment)/1. The cyber security environment.mp4 47.3 MB ~Get Your Files Here !/11. The Cyber Security Landscape (environment)/1.1 Cyber Security Environment.pptx 194 KB ~Get Your Files Here !/11. The Cyber Security Landscape (environment)/1.2 Cyber Security Landscape.mp4 12.8 MB ~Get Your Files Here !/11. The Cyber Security Landscape (environment)/2. What do you understand by the cyber security landscapeenvironment.html 153 B ~Get Your Files Here !/12. Cyber Security Interventions/1. Intervention Strategies to deal with Cyber Threats.mp4 34.3 MB ~Get Your Files Here !/12. Cyber Security Interventions/1.1 Protecting Digital Assets from Cyber Attacks.mp4 9.9 MB ~Get Your Files Here !/12. Cyber Security Interventions/2. Cryptography and Encryption.html 3.7 KB ~Get Your Files Here !/12. Cyber Security Interventions/2.1 Cryptography and Encryption.docx 20.8 KB ~Get Your Files Here !/12. Cyber Security Interventions/3. List and Explain the intervention strategies to deal with cyber threat.html 153 B ~Get Your Files Here !/13. Protecting your Digital Assets/1. Cyber Security Strategy.mp4 34.3 MB ~Get Your Files Here !/13. Protecting your Digital Assets/1.1 Cyber Security (1)pr.jpg 15.2 KB ~Get Your Files Here !/13. Protecting your Digital Assets/1.2 Cyber Security Strategy.pptx 194.5 KB ~Get Your Files Here !/13. Protecting your Digital Assets/2. Protecting your digital assets.html 149 B ~Get Your Files Here !/14. Cyber Threat Landscape/1. Landscape of Cyber Threat.mp4 47.2 MB ~Get Your Files Here !/14. Cyber Threat Landscape/1.1 Cyber Security Landscape.pptx 73.9 KB ~Get Your Files Here !/14. Cyber Threat Landscape/2. Common Types of Cyber Threat and their Impact.mp4 46.1 MB ~Get Your Files Here !/14. Cyber Threat Landscape/2.1 Common Cyber Security Threats.pptx 95.8 KB ~Get Your Files Here !/14. Cyber Threat Landscape/3. Explain the common types of cyber threats and their impact.html 153 B ~Get Your Files Here !/15. Network Security Fundamentals/1. Essential Principles of Securing Networks.mp4 43.6 MB ~Get Your Files Here !/15. Network Security Fundamentals/1.1 The Fundamental Principles Of Cyber Security (1) (1).pptx 193 KB ~Get Your Files Here !/15. Network Security Fundamentals/2. Firewalls.html 3.7 KB ~Get Your Files Here !/15. Network Security Fundamentals/2.1 Cyber Security (1)pr.mp4 20.5 MB ~Get Your Files Here !/15. Network Security Fundamentals/3. Intrusion Detection Systems.html 3.8 KB ~Get Your Files Here !/15. Network Security Fundamentals/3.1 Cyber Security Tools.pptx 192.5 KB ~Get Your Files Here !/15. Network Security Fundamentals/4. VPNs.html 3.5 KB ~Get Your Files Here !/15. Network Security Fundamentals/4.1 VPN.jpg 121.3 KB ~Get Your Files Here !/15. Network Security Fundamentals/5. What are the essential principles of securing networks.html 153 B ~Get Your Files Here !/16. Web Application Security/1. Best Practices for Securing Web Applications.mp4 43.7 MB ~Get Your Files Here !/16. Web Application Security/1.1 Fundamental Principles of Cyber Security.pptx 73.3 KB ~Get Your Files Here !/16. Web Application Security/2. Common Vulnerabilities and Mitigation Strategies.mp4 46.8 MB ~Get Your Files Here !/16. Web Application Security/2.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (1).pptx 102.1 KB ~Get Your Files Here !/16. Web Application Security/3. What are the best practices for securing web applications.html 153 B ~Get Your Files Here !/17. Cloud Security/1. Unique challenges of Cloud Security.html 4.7 KB ~Get Your Files Here !/17. Cloud Security/1.1 Common Cyber Security Threats BV.pptx 104.3 KB ~Get Your Files Here !/17. Cloud Security/2. Solutions for securing data and applications in cloud environments.html 4.3 KB ~Get Your Files Here !/17. Cloud Security/2.1 Cyber Security Attacks and Recommended Solutions.docx 18.3 KB ~Get Your Files Here !/17. Cloud Security/3. Cloud Security.html 149 B ~Get Your Files Here !/18. Mobile Security/1. Specific Security Considerations for Mobile Devices.mp4 45.8 MB ~Get Your Files Here !/18. Mobile Security/1.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4 11.8 MB ~Get Your Files Here !/18. Mobile Security/2. Specific security considerations for mobile applications and mobile devices.mp4 34.3 MB ~Get Your Files Here !/18. Mobile Security/2.1 Protecting Digital Assets from Cyber Attacks.mp4 9.9 MB ~Get Your Files Here !/18. Mobile Security/3. Mobile Device management.html 2.9 KB ~Get Your Files Here !/18. Mobile Security/3.1 Protecting Digital Assets from Cyber Attacks.mp4 9.9 MB ~Get Your Files Here !/18. Mobile Security/4. Secure App Development.mp4 43.6 MB ~Get Your Files Here !/18. Mobile Security/4.1 Cyber Security Polic(1).mp4 14 MB ~Get Your Files Here !/18. Mobile Security/5. Mobile Security.html 149 B ~Get Your Files Here !/19. IoT Security/1. IoT Security Challenges.html 3.6 KB ~Get Your Files Here !/19. IoT Security/1.1 Cyber Security Threat Intelligence Sharing And Collaboration (1).pptx 192.9 KB ~Get Your Files Here !/19. IoT Security/2. IoT Associated Risks.mp4 46.1 MB ~Get Your Files Here !/19. IoT Security/2.1 Cyber Security Risks.mp4 18.3 MB ~Get Your Files Here !/19. IoT Security/3. How to Mitigate IoT Associated Risks.mp4 34.3 MB ~Get Your Files Here !/19. IoT Security/3.1 Protecting Your Digital Resources From Cyber Attacks.pptx 72.7 KB ~Get Your Files Here !/19. IoT Security/4. IoT Security.html 149 B ~Get Your Files Here !/2. Cyber Security Ecosystem/1. Cyber Security as an Ecosystem.mp4 54.7 MB ~Get Your Files Here !/2. Cyber Security Ecosystem/1.1 Cyber Security Ecosy(2).mp4 13.9 MB ~Get Your Files Here !/2. Cyber Security Ecosystem/1.2 Cyber Security Ecosystem (1).pptx 103.2 KB ~Get Your Files Here !/2. Cyber Security Ecosystem/1.3 CYBER SECURITY ECOSYSTEM.docx 18.1 MB ~Get Your Files Here !/2. Cyber Security Ecosystem/2. How the Cyber Security Ecosystem Works.mp4 54.7 MB ~Get Your Files Here !/2. Cyber Security Ecosystem/3. Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4 46.8 MB ~Get Your Files Here !/2. Cyber Security Ecosystem/3.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4 11.8 MB ~Get Your Files Here !/2. Cyber Security Ecosystem/4. Types of Risks in the Cyber Ecosystem.mp4 46.1 MB ~Get Your Files Here !/2. Cyber Security Ecosystem/4.1 Cyber Security Risks BV.pptx 73.9 KB ~Get Your Files Here !/2. Cyber Security Ecosystem/4.2 Cyber Security Risks BV.pptx 73.9 KB ~Get Your Files Here !/2. Cyber Security Ecosystem/4.3 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4 11.8 MB ~Get Your Files Here !/2. Cyber Security Ecosystem/4.4 Cyber Security Risks.docx 20.4 KB ~Get Your Files Here !/2. Cyber Security Ecosystem/5. Malware.html 4.3 KB