[ CourseWikia Com ] Professional Diploma In Cyber Security


Category:Other
Torrent Name:[ CourseWikia.com ] Professional Diploma in Cyber Security
Torrent Hash:e2ff42fa3a5f7a0e1ca0d27f1d76044b4db73700
Date Added:2024-05-12 03:03:03
Size3.14 GB
Seeders:20
Leechers:0
Uploader:autonomous-prime

[ CourseWikia.com ] Professional Diploma in Cyber Security
 |-- Get Bonus Downloads Here.url - 181 Bytes
 | ~Get Your Files Here ! | 1. Introduction |-- 1. Introduction.mp4 - 107.66 MB
 | ~Get Your Files Here ! | 1. Introduction |-- 1.1 Cyber Security (1)pr (2).mp4 - 24.14 MB
 | ~Get Your Files Here ! | 1. Introduction |-- 10. Cyber Security Ideologies.html - 4.13 KB
 | ~Get Your Files Here ! | 1. Introduction |-- 10.1 Cyber Security Analysis.mp4 - 18.07 MB
 | ~Get Your Files Here ! | 1. Introduction |-- 11. Cyber Security Perspectives.mp4 - 74.4 MB
 | ~Get Your Files Here ! | 1. Introduction |-- 11.1 Cyber Security (1)presentation with notes.pptx - 105.63 KB
 | ~Get Your Files Here ! | 1. Introduction |-- 12. The Importance of Cyber Security.mp4 - 23.42 MB
 | ~Get Your Files Here ! | 1. Introduction |-- 12.1 IMPORTANCE+OF+CYBER+SECURITY.pptx - 71.48 KB
 | ~Get Your Files Here ! | 1. Introduction |-- 13. Implications of Cyber Security.mp4 - 48 MB
 | ~Get Your Files Here ! | 1. Introduction |-- 13.1 THE IMPLICATIONS OF CYBER SECURITY- fv.pptx - 102.39 KB
 | ~Get Your Files Here ! | 1. Introduction |-- 14. Explain the fundamental principles of Cyber Security.html - 153 Bytes
 | ~Get Your Files Here ! | 1. Introduction |-- 2. Introduction.mp4 - 8.85 MB
 | ~Get Your Files Here ! | 1. Introduction |-- 2.1 Cyber Security Concepts.mp4 - 20.5 MB
 | ~Get Your Files Here ! | 1. Introduction |-- 3. Cyber Security Fundamentals.mp4 - 74.44 MB
 | ~Get Your Files Here ! | 1. Introduction |-- 3.1 Fundamental Principles of Cyber Security (1).pptx - 73.36 KB
 | ~Get Your Files Here ! | 1. Introduction |-- 4. Cyber Security Principles.mp4 - 43.68 MB
 | ~Get Your Files Here ! | 1. Introduction |-- 4.1 The Fundamental Principles Of Cyber Security (1).pptx - 193 KB
 | ~Get Your Files Here ! | 1. Introduction |-- 5. Cyber Security Concepts.mp4 - 60.23 MB
 | ~Get Your Files Here ! | 1. Introduction |-- 5.1 Cyber Security Concepts BV (1).pptx - 103.07 KB
 | ~Get Your Files Here ! | 1. Introduction |-- 6. Cyber Security Theories.mp4 - 64.71 MB
 | ~Get Your Files Here ! | 1. Introduction |-- 6.1 Cyber Security Theor.mp4 - 21.87 MB
 | ~Get Your Files Here ! | 1. Introduction |-- 7. Cyber Security Terminologies and Definitions.html - 4.46 KB
 | ~Get Your Files Here ! | 1. Introduction |-- 7.1 Cyber Security Concepts BV (1).pptx - 103.07 KB
 | ~Get Your Files Here ! | 1. Introduction |-- 8. Cyber Security Paradigms.html - 3.23 KB
 | ~Get Your Files Here ! | 1. Introduction |-- 8.1 Cyber Security - An Exploratory Study.pptx - 193.08 KB
 | ~Get Your Files Here ! | 1. Introduction |-- 9. Cyber Security Philosophies.html - 3.68 KB
 | ~Get Your Files Here ! | 1. Introduction |-- 9.1 CYBER SECURITY ESSEN.mp4 - 16.67 MB
 | ~Get Your Files Here ! | 10. Stakeholder Analysis in Cyber Security |-- 1. The Various Stakeholders in the Cyber Ecosystem.mp4 - 36.24 MB
 | ~Get Your Files Here ! | 10. Stakeholder Analysis in Cyber Security |-- 1.1 The Role Of Stakeholders In Cyber Security (2).pptx - 192.05 KB
 | ~Get Your Files Here ! | 10. Stakeholder Analysis in Cyber Security |-- 2. The role and importance of the stakeholders.mp4 - 36.23 MB
 | ~Get Your Files Here ! | 10. Stakeholder Analysis in Cyber Security |-- 2.1 The Role Of Stakeholders In Cyber Security (2).pptx - 192.05 KB
 | ~Get Your Files Here ! | 10. Stakeholder Analysis in Cyber Security |-- 3. The Importance of Stakeholders.html - 149 Bytes
 | ~Get Your Files Here ! | 11. The Cyber Security Landscape (environment) |-- 1. The cyber security environment.mp4 - 47.25 MB
 | ~Get Your Files Here ! | 11. The Cyber Security Landscape (environment) |-- 1.1 Cyber Security Environment.pptx - 194.04 KB
 | ~Get Your Files Here ! | 11. The Cyber Security Landscape (environment) |-- 1.2 Cyber Security Landscape.mp4 - 12.76 MB
 | ~Get Your Files Here ! | 11. The Cyber Security Landscape (environment) |-- 2. What do you understand by the cyber security landscapeenvironment.html - 153 Bytes
 | ~Get Your Files Here ! | 12. Cyber Security Interventions |-- 1. Intervention Strategies to deal with Cyber Threats.mp4 - 34.32 MB
 | ~Get Your Files Here ! | 12. Cyber Security Interventions |-- 1.1 Protecting Digital Assets from Cyber Attacks.mp4 - 9.86 MB
 | ~Get Your Files Here ! | 12. Cyber Security Interventions |-- 2. Cryptography and Encryption.html - 3.67 KB
 | ~Get Your Files Here ! | 12. Cyber Security Interventions |-- 2.1 Cryptography and Encryption.docx - 20.79 KB
 | ~Get Your Files Here ! | 12. Cyber Security Interventions |-- 3. List and Explain the intervention strategies to deal with cyber threat.html - 153 Bytes
 | ~Get Your Files Here ! | 13. Protecting your Digital Assets |-- 1. Cyber Security Strategy.mp4 - 34.3 MB
 | ~Get Your Files Here ! | 13. Protecting your Digital Assets |-- 1.1 Cyber Security (1)pr.jpg - 15.17 KB
 | ~Get Your Files Here ! | 13. Protecting your Digital Assets |-- 1.2 Cyber Security Strategy.pptx - 194.5 KB
 | ~Get Your Files Here ! | 13. Protecting your Digital Assets |-- 2. Protecting your digital assets.html - 149 Bytes
 | ~Get Your Files Here ! | 14. Cyber Threat Landscape |-- 1. Landscape of Cyber Threat.mp4 - 47.22 MB
 | ~Get Your Files Here ! | 14. Cyber Threat Landscape |-- 1.1 Cyber Security Landscape.pptx - 73.89 KB
 | ~Get Your Files Here ! | 14. Cyber Threat Landscape |-- 2. Common Types of Cyber Threat and their Impact.mp4 - 46.14 MB
 | ~Get Your Files Here ! | 14. Cyber Threat Landscape |-- 2.1 Common Cyber Security Threats.pptx - 95.82 KB
 | ~Get Your Files Here ! | 14. Cyber Threat Landscape |-- 3. Explain the common types of cyber threats and their impact.html - 153 Bytes
 | ~Get Your Files Here ! | 15. Network Security Fundamentals |-- 1. Essential Principles of Securing Networks.mp4 - 43.6 MB
 | ~Get Your Files Here ! | 15. Network Security Fundamentals |-- 1.1 The Fundamental Principles Of Cyber Security (1) (1).pptx - 193 KB
 | ~Get Your Files Here ! | 15. Network Security Fundamentals |-- 2. Firewalls.html - 3.74 KB
 | ~Get Your Files Here ! | 15. Network Security Fundamentals |-- 2.1 Cyber Security (1)pr.mp4 - 20.46 MB
 | ~Get Your Files Here ! | 15. Network Security Fundamentals |-- 3. Intrusion Detection Systems.html - 3.78 KB
 | ~Get Your Files Here ! | 15. Network Security Fundamentals |-- 3.1 Cyber Security Tools.pptx - 192.45 KB
 | ~Get Your Files Here ! | 15. Network Security Fundamentals |-- 4. VPNs.html - 3.54 KB
 | ~Get Your Files Here ! | 15. Network Security Fundamentals |-- 4.1 VPN.jpg - 121.3 KB
 | ~Get Your Files Here ! | 15. Network Security Fundamentals |-- 5. What are the essential principles of securing networks.html - 153 Bytes
 | ~Get Your Files Here ! | 16. Web Application Security |-- 1. Best Practices for Securing Web Applications.mp4 - 43.65 MB
 | ~Get Your Files Here ! | 16. Web Application Security |-- 1.1 Fundamental Principles of Cyber Security.pptx - 73.34 KB
 | ~Get Your Files Here ! | 16. Web Application Security |-- 2. Common Vulnerabilities and Mitigation Strategies.mp4 - 46.79 MB
 | ~Get Your Files Here ! | 16. Web Application Security |-- 2.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (1).pptx - 102.12 KB
 | ~Get Your Files Here ! | 16. Web Application Security |-- 3. What are the best practices for securing web applications.html - 153 Bytes
 | ~Get Your Files Here ! | 17. Cloud Security |-- 1. Unique challenges of Cloud Security.html - 4.65 KB
 | ~Get Your Files Here ! | 17. Cloud Security |-- 1.1 Common Cyber Security Threats BV.pptx - 104.3 KB
 | ~Get Your Files Here ! | 17. Cloud Security |-- 2. Solutions for securing data and applications in cloud environments.html - 4.25 KB
 | ~Get Your Files Here ! | 17. Cloud Security |-- 2.1 Cyber Security Attacks and Recommended Solutions.docx - 18.34 KB
 | ~Get Your Files Here ! | 17. Cloud Security |-- 3. Cloud Security.html - 149 Bytes
 | ~Get Your Files Here ! | 18. Mobile Security |-- 1. Specific Security Considerations for Mobile Devices.mp4 - 45.75 MB
 | ~Get Your Files Here ! | 18. Mobile Security |-- 1.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4 - 11.81 MB
 | ~Get Your Files Here ! | 18. Mobile Security |-- 2. Specific security considerations for mobile applications and mobile devices.mp4 - 34.33 MB
 | ~Get Your Files Here ! | 18. Mobile Security |-- 2.1 Protecting Digital Assets from Cyber Attacks.mp4 - 9.86 MB
 | ~Get Your Files Here ! | 18. Mobile Security |-- 3. Mobile Device management.html - 2.88 KB
 | ~Get Your Files Here ! | 18. Mobile Security |-- 3.1 Protecting Digital Assets from Cyber Attacks.mp4 - 9.86 MB
 | ~Get Your Files Here ! | 18. Mobile Security |-- 4. Secure App Development.mp4 - 43.61 MB
 | ~Get Your Files Here ! | 18. Mobile Security |-- 4.1 Cyber Security Polic(1).mp4 - 13.98 MB
 | ~Get Your Files Here ! | 18. Mobile Security |-- 5. Mobile Security.html - 149 Bytes
 | ~Get Your Files Here ! | 19. IoT Security |-- 1. IoT Security Challenges.html - 3.56 KB
 | ~Get Your Files Here ! | 19. IoT Security |-- 1.1 Cyber Security Threat Intelligence Sharing And Collaboration (1).pptx - 192.9 KB
 | ~Get Your Files Here ! | 19. IoT Security |-- 2. IoT Associated Risks.mp4 - 46.15 MB
 | ~Get Your Files Here ! | 19. IoT Security |-- 2.1 Cyber Security Risks.mp4 - 18.31 MB
 | ~Get Your Files Here ! | 19. IoT Security |-- 3. How to Mitigate IoT Associated Risks.mp4 - 34.32 MB
 | ~Get Your Files Here ! | 19. IoT Security |-- 3.1 Protecting Your Digital Resources From Cyber Attacks.pptx - 72.7 KB
 | ~Get Your Files Here ! | 19. IoT Security |-- 4. IoT Security.html - 149 Bytes
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 1. Cyber Security as an Ecosystem.mp4 - 54.66 MB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 1.1 Cyber Security Ecosy(2).mp4 - 13.87 MB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 1.2 Cyber Security Ecosystem (1).pptx - 103.17 KB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 1.3 CYBER SECURITY ECOSYSTEM.docx - 18.13 MB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 2. How the Cyber Security Ecosystem Works.mp4 - 54.66 MB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 3. Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4 - 46.81 MB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 3.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4 - 11.81 MB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 4. Types of Risks in the Cyber Ecosystem.mp4 - 46.12 MB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 4.1 Cyber Security Risks BV.pptx - 73.93 KB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 4.2 Cyber Security Risks BV.pptx - 73.93 KB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 4.3 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4 - 11.81 MB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 4.4 Cyber Security Risks.docx - 20.36 KB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 5. Malware.html - 4.28 KB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 5.1 Malware 2.jpg - 159.83 KB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 5.2 Malware 4.jpg - 139.96 KB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 5.3 Malware.jpg - 902.51 KB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 6. Spyware.html - 3.2 KB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 6.1 SW1.jpg - 24.07 KB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 6.2 SW2.jpg - 188.4 KB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 6.3 SW3.jpg - 24.53 KB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 6.4 SW4.jpg - 388.94 KB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 6.5 SW5.jpg - 137.23 KB
 | ~Get Your Files Here ! | 2. Cyber Security Ecosystem |-- 7. Explain Cyber Security as an Ecosystem.html - 153 Bytes
 | ~Get Your Files Here ! | 20. Social Engineering and Phishing |-- 1. Social Engineering Attacks.html - 3.77 KB
 | ~Get Your Files Here ! | 20. Social Engineering and Phishing |-- 1.1 Cyber Security Risks.mp4 - 18.31 MB
 | ~Get Your Files Here ! | 20. Social Engineering and Phishing |-- 2. Phishing.html - 3.77 KB
 | ~Get Your Files Here ! | 20. Social Engineering and Phishing |-- 2.1 Common Cyber Security Threats (1).pptx - 194.54 KB
 | ~Get Your Files Here ! | 20. Social Engineering and Phishing |-- 3. Effective Strategies for recognizing and preventing phishing attempts.mp4 - 34.33 MB
 | ~Get Your Files Here ! | 20. Social Engineering and Phishing |-- 3.1 Protecting Digital Assets from Cyber Attacks.mp4 - 9.85 MB
 | ~Get Your Files Here ! | 20. Social Engineering and Phishing |-- 4. The Psychology behind Social Engineering Attacks.html - 3.93 KB
 | ~Get Your Files Here ! | 20. Social Engineering and Phishing |-- 4.1 Cyber Security (1)pr.jpg - 15.17 KB
 | ~Get Your Files Here ! | 20. Social Engineering and Phishing |-- 5. Social Engineering and Phishing.html - 149 Bytes
 | ~Get Your Files Here ! | 21. Incidence Response and Management |-- 1. Essential steps for responding to cyber security incidents.mp4 - 34.34 MB
 | ~Get Your Files Here ! | 21. Incidence Response and Management |-- 1.1 Protecting Your Digital Resources From Cyber Attacks.pptx - 72.7 KB
 | ~Get Your Files Here ! | 21. Incidence Response and Management |-- 2. Essential steps for managing cyber securing incidents.mp4 - 43.62 MB
 | ~Get Your Files Here ! | 21. Incidence Response and Management |-- 2.1 Protecting Digital Assets from Cyber Attacks.mp4 - 9.86 MB
 | ~Get Your Files Here ! | 21. Incidence Response and Management |-- 3. Best practices for responding to cyber security incidents.mp4 - 46.63 MB
 | ~Get Your Files Here ! | 21. Incidence Response and Management |-- 3.1 Protecting Your Digital Resources From Cyber Attacks.pptx - 72.7 KB
 | ~Get Your Files Here ! | 21. Incidence Response and Management |-- 4. Best practices for managing cyber security incidents.mp4 - 46.8 MB
 | ~Get Your Files Here ! | 21. Incidence Response and Management |-- 4.1 Protecting Digital Assets from Cyber Attacks.mp4 - 9.86 MB
 | ~Get Your Files Here ! | 21. Incidence Response and Management |-- 5. Incidence Response and Management.html - 149 Bytes
 | ~Get Your Files Here ! | 22. Cryptographic Principles |-- 1. The fundamental principles of Cryptography.html - 3.03 KB
 | ~Get Your Files Here ! | 22. Cryptographic Principles |-- 1.1 The Fundamental Principles Of Cyber Security (1) (1).pptx - 193 KB
 | ~Get Your Files Here ! | 22. Cryptographic Principles |-- 2. Fundamental principles of Encryption.html - 2.67 KB
 | ~Get Your Files Here ! | 22. Cryptographic Principles |-- 2.1 The Fundamental Principles Of Cyber Security (1).pptx - 193 KB
 | ~Get Your Files Here ! | 22. Cryptographic Principles |-- 3. Fundamental principles of Algorithms.html - 2.89 KB
 | ~Get Your Files Here ! | 22. Cryptographic Principles |-- 3.1 The Fundamental Principles Of Cyber Security (1) (1).pptx - 193 KB
 | ~Get Your Files Here ! | 22. Cryptographic Principles |-- 4. Fundamental principles of Digital Signatures.html - 2.28 KB
 | ~Get Your Files Here ! | 22. Cryptographic Principles |-- 4.1 Fundamental Principles of Cyber Security.pptx - 73.36 KB
 | ~Get Your Files Here ! | 22. Cryptographic Principles |-- 5. Fundamental principles of Key management.html - 1.64 KB
 | ~Get Your Files Here ! | 22. Cryptographic Principles |-- 5.1 The Fundamental Principles Of Cyber Security (1) (1).pptx - 193 KB
 | ~Get Your Files Here ! | 22. Cryptographic Principles |-- 6. Cryptographic Principles.html - 149 Bytes
 | ~Get Your Files Here ! | 23. Cyber Security Compliance and Regulations |-- 1. Cyber Security Compliance Standards that organisations must adhere to.mp4 - 43.63 MB
 | ~Get Your Files Here ! | 23. Cyber Security Compliance and Regulations |-- 1.1 Cyber Security Policy BV.pptx - 101.19 KB
 | ~Get Your Files Here ! | 23. Cyber Security Compliance and Regulations |-- 2. Cyber Security Regulation Standards that organisations must adhere to.mp4 - 43.65 MB
 | ~Get Your Files Here ! | 23. Cyber Security Compliance and Regulations |-- 2.1 Cyber Security Policy BV.pptx - 101.19 KB
 | ~Get Your Files Here ! | 23. Cyber Security Compliance and Regulations |-- 3. GDPR.html - 1.49 KB
 | ~Get Your Files Here ! | 23. Cyber Security Compliance and Regulations |-- 3.1 Cyber Security Policy BV.pptx - 101.19 KB
 | ~Get Your Files Here ! | 23. Cyber Security Compliance and Regulations |-- 4. HIPAA.html - 1.63 KB
 | ~Get Your Files Here ! | 23. Cyber Security Compliance and Regulations |-- 4.1 Cyber Security Policy BV.pptx - 101.19 KB
 | ~Get Your Files Here ! | 23. Cyber Security Compliance and Regulations |-- 5. PCI DSS.html - 2.02 KB
 | ~Get Your Files Here ! | 23. Cyber Security Compliance and Regulations |-- 5.1 Cyber Security Policy BV.pptx - 101.19 KB
 | ~Get Your Files Here ! | 23. Cyber Security Compliance and Regulations |-- 6. Cyber Security Compliance and Regulations.html - 149 Bytes
 | ~Get Your Files Here ! | 24. Cyber Security Risk Assessment |-- 1. The process of identifying cyber security risks.mp4 - 46.11 MB
 | ~Get Your Files Here ! | 24. Cyber Security Risk Assessment |-- 1.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (2).pptx - 192.92 KB
 | ~Get Your Files Here ! | 24. Cyber Security Risk Assessment |-- 2. Assessing Cyber Security Risks.html - 4.4 KB
 | ~Get Your Files Here ! | 24. Cyber Security Risk Assessment |-- 2.1 Cyber Security Risks.mp4 - 18.3 MB
 | ~Get Your Files Here ! | 24. Cyber Security Risk Assessment |-- 3. Mitigating Cyber Security Risks.mp4 - 52.39 MB
 | ~Get Your Files Here ! | 24. Cyber Security Risk Assessment |-- 3.1 Protecting Digital Assets from Cyber Attacks.mp4 - 9.86 MB
 | ~Get Your Files Here ! | 24. Cyber Security Risk Assessment |-- 4. Cyber Security Risk Assessment.html - 149 Bytes
 | ~Get Your Files Here ! | 25. Security Operations and Monitoring |-- 1. The principles of secure software development.mp4 - 43.69 MB
 | ~Get Your Files Here ! | 25. Security Operations and Monitoring |-- 1.1 Fundamental Principles of Cyber Security (1).pptx - 73.36 KB
 | ~Get Your Files Here ! | 25. Security Operations and Monitoring |-- 2. The integration of security into software development lifecycle.html - 3.75 KB
 | ~Get Your Files Here ! | 25. Security Operations and Monitoring |-- 2.1 The Fundamental Principles Of Cyber Security (1) (1).pptx - 193 KB
 | ~Get Your Files Here ! | 25. Security Operations and Monitoring |-- 3. Security Operations and Monitoring.html - 149 Bytes
 | ~Get Your Files Here ! | 26. Ethical Hacking and Penetration Testing |-- 1. Ethical Hacking.html - 4.63 KB
 | ~Get Your Files Here ! | 26. Ethical Hacking and Penetration Testing |-- 1.1 Cyber Security Polic(1) (2).mp4 - 13.98 MB
 | ~Get Your Files Here ! | 26. Ethical Hacking and Penetration Testing |-- 2. The role of Ethical Hacking.html - 4.4 KB
 | ~Get Your Files Here ! | 26. Ethical Hacking and Penetration Testing |-- 2.1 Cyber Security Polic(1).mp4 - 13.98 MB
 | ~Get Your Files Here ! | 26. Ethical Hacking and Penetration Testing |-- 3. The role of penetration testing.html - 4.65 KB
 | ~Get Your Files Here ! | 26. Ethical Hacking and Penetration Testing |-- 3.1 Cyber Security Polic(1).mp4 - 13.97 MB
 | ~Get Your Files Here ! | 26. Ethical Hacking and Penetration Testing |-- 4. Identifying and Addressing vulnerabilities.html - 4.73 KB
 | ~Get Your Files Here ! | 26. Ethical Hacking and Penetration Testing |-- 4.1 Cyber Security Polic(1) (1).mp4 - 13.98 MB
 | ~Get Your Files Here ! | 26. Ethical Hacking and Penetration Testing |-- 5. Ethical Hacking and Prevention Testing.html - 149 Bytes
 | ~Get Your Files Here ! | 27. Cyber Security for Small Businesses |-- 1. Tailored Cyber Security Strategies for small businesses.html - 3.54 KB
 | ~Get Your Files Here ! | 27. Cyber Security for Small Businesses |-- 1.1 Protecting Your Digital Resources From Cyber Attacks.pptx - 72.7 KB
 | ~Get Your Files Here ! | 27. Cyber Security for Small Businesses |-- 2. Best cyber security best practices for small businesses.html - 3.38 KB
 | ~Get Your Files Here ! | 27. Cyber Security for Small Businesses |-- 2.1 Protecting Digital Assets from Cyber Attacks.mp4 - 9.86 MB
 | ~Get Your Files Here ! | 27. Cyber Security for Small Businesses |-- 3. Tailored Cyber security strategies for businesses with limited resources.html - 3.5 KB
 | ~Get Your Files Here ! | 27. Cyber Security for Small Businesses |-- 3.1 Cyber Security Polic(1).mp4 - 13.97 MB
 | ~Get Your Files Here ! | 27. Cyber Security for Small Businesses |-- 4. Best cyber security practices for businesses with limited resources.html - 3.14 KB
 | ~Get Your Files Here ! | 27. Cyber Security for Small Businesses |-- 4.1 Fundamental Principles of Cyber Security.pptx - 73.36 KB
 | ~Get Your Files Here ! | 27. Cyber Security for Small Businesses |-- 5. Cyber Security for Small Businesses.html - 149 Bytes
 | ~Get Your Files Here ! | 28. Cyber Security for Remote Workforce |-- 1. Unique security challenges for organisations with remotedistributed workforce.html - 3.51 KB
 | ~Get Your Files Here ! | 28. Cyber Security for Remote Workforce |-- 1.1 The Fundamental Principles Of Cyber Security (1) (1).pptx - 193 KB
 | ~Get Your Files Here ! | 28. Cyber Security for Remote Workforce |-- 2. Unique solutions for organisations with remote or distributed workforces.html - 2.59 KB
 | ~Get Your Files Here ! | 28. Cyber Security for Remote Workforce |-- 2.1 Protecting Your Digital Resources From Cyber Attacks.pptx - 72.7 KB
 | ~Get Your Files Here ! | 28. Cyber Security for Remote Workforce |-- 3. Cyber Security for Remote Workforce.html - 149 Bytes
 | ~Get Your Files Here ! | 29. Cyber Security for Critical Infrastructure |-- 1. Specific security considerations for protecting critical infrastructure.html - 3.19 KB
 | ~Get Your Files Here ! | 29. Cyber Security for Critical Infrastructure |-- 1.1 Fundamental Principles of Cyber Security (1).pptx - 73.36 KB
 | ~Get Your Files Here ! | 29. Cyber Security for Critical Infrastructure |-- 2. Critical infrastructure Energy, transportation and healthcare systems.html - 3.25 KB
 | ~Get Your Files Here ! | 29. Cyber Security for Critical Infrastructure |-- 2.1 Fundamental Principles of Cyber Security (1).pptx - 73.36 KB
 | ~Get Your Files Here ! | 29. Cyber Security for Critical Infrastructure |-- 3. Cyber Security for Critical Infrastructure.html - 149 Bytes
 | ~Get Your Files Here ! | 3. Understanding Cyber Security - An Critical Overview |-- 1. A critical overview of cyber security.mp4 - 63.47 MB
 | ~Get Your Files Here ! | 3. Understanding Cyber Security - An Critical Overview |-- 1.1 Cyber Security Essentials.pptx - 102.95 KB
 | ~Get Your Files Here ! | 3. Understanding Cyber Security - An Critical Overview |-- 2. A holistic view of cyber security.mp4 - 45.75 MB
 | ~Get Your Files Here ! | 3. Understanding Cyber Security - An Critical Overview |-- 2.1 Cyber Security Landscape.mp4 - 12.75 MB
 | ~Get Your Files Here ! | 3. Understanding Cyber Security - An Critical Overview |-- 3. Give a critical overview of cyber security from your own perspective.html - 153 Bytes
 | ~Get Your Files Here ! | 30. Cyber Security for financial institutions |-- 1. Unique cyber security challenges faced by financial institutions.html - 2.71 KB
 | ~Get Your Files Here ! | 30. Cyber Security for financial institutions |-- 1.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (2).pptx - 192.92 KB
 | ~Get Your Files Here ! | 30. Cyber Security for financial institutions |-- 2. Cyber Security Regulatory requirements that must be met by financial institution.html - 3.07 KB
 | ~Get Your Files Here ! | 30. Cyber Security for financial institutions |-- 2.1 Cyber Security Laws In The USA, UK, FRANCE, CANADA, GERMANY, THE NETHERLANDS, AFRICA AFRICA AND NIGE (2).pptx - 117.49 KB
 | ~Get Your Files Here ! | 30. Cyber Security for financial institutions |-- 2.2 Regulatory Compliance And Data Protection Laws On Cyber Security.pptx - 195.37 KB
 | ~Get Your Files Here ! | 30. Cyber Security for financial institutions |-- 3. Cyber Security for financial institutions.html - 149 Bytes
 | ~Get Your Files Here ! | 31. Emerging trends for cyber security |-- 1. Latest Trends and Advancements in Cyber Security.html - 2.89 KB
 | ~Get Your Files Here ! | 31. Emerging trends for cyber security |-- 1.1 Machine Learning And AI In Cyber Security (1) (1).pptx - 119.64 KB
 | ~Get Your Files Here ! | 31. Emerging trends for cyber security |-- 2. Latest Trends in AI-Driven security.html - 3.14 KB
 | ~Get Your Files Here ! | 31. Emerging trends for cyber security |-- 2.1 Machine Learning And AI In Cyber Security (1) (1).pptx - 119.64 KB
 | ~Get Your Files Here ! | 31. Emerging trends for cyber security |-- 2.2 Machine Learning And AI In Cyber Security (2).pptx - 119.64 KB
 | ~Get Your Files Here ! | 31. Emerging trends for cyber security |-- 3. Latest trends in zero-trust architecture.html - 2.81 KB
 | ~Get Your Files Here ! | 31. Emerging trends for cyber security |-- 3.1 Machine Learning And AI In Cyber Security (1).pptx - 119.64 KB
 | ~Get Your Files Here ! | 31. Emerging trends for cyber security |-- 4. Latest trends in quantum-safe cryptography.html - 3.07 KB
 | ~Get Your Files Here ! | 31. Emerging trends for cyber security |-- 4.1 Machine Learning And AI In Cyber Security (2).pptx - 119.64 KB
 | ~Get Your Files Here ! | 31. Emerging trends for cyber security |-- 5. Latest trends in cyber security software and hardware.html - 2.93 KB
 | ~Get Your Files Here ! | 31. Emerging trends for cyber security |-- 5.1 Machine Learning And AI In Cyber Security (2).pptx - 119.64 KB
 | ~Get Your Files Here ! | 31. Emerging trends for cyber security |-- 6. Emerging trends for cyber security.html - 149 Bytes
 | ~Get Your Files Here ! | 32. Cyber Security for Smart Cities |-- 1. Security implications of interconnected IoT devices in urban environments.html - 3.02 KB
 | ~Get Your Files Here ! | 32. Cyber Security for Smart Cities |-- 1.1 Fundamental Principles of Cyber Security (1).pptx - 73.36 KB
 | ~Get Your Files Here ! | 32. Cyber Security for Smart Cities |-- 2. Strategies for securing smart city infrastructure.html - 3.46 KB
 | ~Get Your Files Here ! | 32. Cyber Security for Smart Cities |-- 2.1 The Fundamental Principles Of Cyber Security (1) (1).pptx - 193 KB
 | ~Get Your Files Here ! | 32. Cyber Security for Smart Cities |-- 3. Cyber Security for Smart Cities.html - 149 Bytes
 | ~Get Your Files Here ! | 33. Cyber Security for Healthcare |-- 1. Unique challenges of securing sensitive patient data in the healthcare industry.html - 3.23 KB
 | ~Get Your Files Here ! | 33. Cyber Security for Healthcare |-- 1.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (2).pptx - 192.92 KB
 | ~Get Your Files Here ! | 33. Cyber Security for Healthcare |-- 2. Unique challenges of securing sensitive medical devices in healthcare Industry.html - 2.86 KB
 | ~Get Your Files Here ! | 33. Cyber Security for Healthcare |-- 2.1 Common Cyber Security Threats.pptx - 95.82 KB
 | ~Get Your Files Here ! | 33. Cyber Security for Healthcare |-- 3. Cyber Security for HealthCare.html - 149 Bytes
 | ~Get Your Files Here ! | 34. Cyber security for autonomous vehicle |-- 1. Security considerations for autonomous and connected vehicles.html - 3.23 KB
 | ~Get Your Files Here ! | 34. Cyber security for autonomous vehicle |-- 1.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4 - 11.8 MB
 | ~Get Your Files Here ! | 34. Cyber security for autonomous vehicle |-- 2. Cyber Threats for autonomous and connected vehicles.html - 3.07 KB
 | ~Get Your Files Here ! | 34. Cyber security for autonomous vehicle |-- 2.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4 - 11.81 MB
 | ~Get Your Files Here ! | 34. Cyber security for autonomous vehicle |-- 3. Cyber protective measures for autonomous and connected vehicles.html - 3.2 KB
 | ~Get Your Files Here ! | 34. Cyber security for autonomous vehicle |-- 3.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (1).pptx - 192.92 KB
 | ~Get Your Files Here ! | 34. Cyber security for autonomous vehicle |-- 4. Cyber Security for Autonomous Vehicle.html - 149 Bytes
 | ~Get Your Files Here ! | 35. Cyber Security for the Supply Chain |-- 1. Importance of securing the supply chain against cyber attacks.html - 2.75 KB
 | ~Get Your Files Here ! | 35. Cyber Security for the Supply Chain |-- 1.1 IMPORTANCE OF CYBER (1).mp4 - 7.86 MB
 | ~Get Your Files Here ! | 35. Cyber Security for the Supply Chain |-- 2. The impact of supply chain breaches on the organisation.html - 2.7 KB
 | ~Get Your Files Here ! | 35. Cyber Security for the Supply Chain |-- 2.1 The Implications Of Cyber Security (1).pptx - 193.07 KB
 | ~Get Your Files Here ! | 35. Cyber Security for the Supply Chain |-- 3. Cyber Security for the Supply Chain.html - 149 Bytes
 | ~Get Your Files Here ! | 36. Cyber Security for AI and Machine Learning |-- 1. Security challenges related to the use of AI in cyber security.html - 2.79 KB
 | ~Get Your Files Here ! | 36. Cyber Security for AI and Machine Learning |-- 1.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (2).pptx - 192.92 KB
 | ~Get Your Files Here ! | 36. Cyber Security for AI and Machine Learning |-- 2. Ethical considerations related to the use of AI in cyber security.html - 2.64 KB
 | ~Get Your Files Here ! | 36. Cyber Security for AI and Machine Learning |-- 2.1 Cyber Security Ethics And Privacy.pptx - 194.1 KB
 | ~Get Your Files Here ! | 36. Cyber Security for AI and Machine Learning |-- 3. Security challenges related to the use of machine learning in cyber security.html - 2.5 KB
 | ~Get Your Files Here ! | 36. Cyber Security for AI and Machine Learning |-- 3.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (1).pptx - 192.92 KB
 | ~Get Your Files Here ! | 36. Cyber Security for AI and Machine Learning |-- 4. Ethical considerations relating to the use of machine learning in cyber security.html - 2.57 KB
 | ~Get Your Files Here ! | 36. Cyber Security for AI and Machine Learning |-- 4.1 Cyber Security Ethics And Privacy.pptx - 194.1 KB
 | ~Get Your Files Here ! | 36. Cyber Security for AI and Machine Learning |-- 4.2 THE IMPLICATIONS OF (2).mp4 - 18 MB
 | ~Get Your Files Here ! | 36. Cyber Security for AI and Machine Learning |-- 5. Cyber Security for AI and Machine Learning.html - 149 Bytes
 | ~Get Your Files Here ! | 37. Cyber security for 5G Networks |-- 1. Cyber Security Implications of 5G Networks.html - 2.8 KB
 | ~Get Your Files Here ! | 37. Cyber security for 5G Networks |-- 1.1 The Fundamental Principles Of Cyber Security (1) (1).pptx - 193 KB
 | ~Get Your Files Here ! | 37. Cyber security for 5G Networks |-- 2. Measures needed to protect against emerging threats in the era of 5Gconnectivity.html - 2.56 KB
 | ~Get Your Files Here ! | 37. Cyber security for 5G Networks |-- 2.1 Protecting Digital Assets from Cyber Attacks.mp4 - 9.86 MB
 | ~Get Your Files Here ! | 37. Cyber security for 5G Networks |-- 3. Cyber Security for 5G Networks.html - 149 Bytes
 | ~Get Your Files Here ! | 38. Cyber security for industrial control systems (ICS) |-- 1. Unique cyber security considerations for protecting industrial control systems.html - 2.78 KB
 | ~Get Your Files Here ! | 38. Cyber security for industrial control systems (ICS) |-- 1.1 The Fundamental Principles Of Cyber Security (1).pptx - 193 KB
 | ~Get Your Files Here ! | 38. Cyber security for industrial control systems (ICS) |-- 2. Unique cyber security considerations in critical infrastructures.html - 2.86 KB
 | ~Get Your Files Here ! | 38. Cyber security for industrial control systems (ICS) |-- 2.1 The Fundamental Principles Of Cyber Security (1) (1).pptx - 193 KB
 | ~Get Your Files Here ! | 38. Cyber security for industrial control systems (ICS) |-- 3. Unique cyber security considerations in manufacturing environments.html - 2.56 KB
 | ~Get Your Files Here ! | 38. Cyber security for industrial control systems (ICS) |-- 3.1 Fundamental Principles of Cyber Security.pptx - 73.36 KB
 | ~Get Your Files Here ! | 38. Cyber security for industrial control systems (ICS) |-- 4. Cyber Security for industrial control systems (ICS).html - 149 Bytes
 | ~Get Your Files Here ! | 39. Cyber security for blockchain and cryptocurrency |-- 1. Blockchain networks.html - 2.91 KB
 | ~Get Your Files Here ! | 39. Cyber security for blockchain and cryptocurrency |-- 1.1 Fundamental Principles of Cyber Security (1).pptx - 73.36 KB
 | ~Get Your Files Here ! | 39. Cyber security for blockchain and cryptocurrency |-- 2. Cryptocurrency transactions.html - 2.14 KB
 | ~Get Your Files Here ! | 39. Cyber security for blockchain and cryptocurrency |-- 2.1 The Fundamental Principles Of Cyber Security (1) (1).pptx - 193 KB
 | ~Get Your Files Here ! | 39. Cyber security for blockchain and cryptocurrency |-- 3. Security challenges for securing blockchain networks.html - 2.88 KB
 | ~Get Your Files Here ! | 39. Cyber security for blockchain and cryptocurrency |-- 3.1 Cyber Security Landscape.pptx - 73.89 KB
 | ~Get Your Files Here ! | 39. Cyber security for blockchain and cryptocurrency |-- 4. Security challenges for securing cryptocurrency transactions.html - 2.87 KB
 | ~Get Your Files Here ! | 39. Cyber security for blockchain and cryptocurrency |-- 4.1 Cyber Security Environment.pptx - 194.04 KB
 | ~Get Your Files Here ! | 39. Cyber security for blockchain and cryptocurrency |-- 5. Best practices for securing blockchain networks.html - 2.79 KB
 | ~Get Your Files Here ! | 39. Cyber security for blockchain and cryptocurrency |-- 5.1 Fundamental Principles of Cyber Security (1).pptx - 73.36 KB
 | ~Get Your Files Here ! | 39. Cyber security for blockchain and cryptocurrency |-- 6. Best practices for securing Cryptocurrency transactions.html - 2.54 KB
 | ~Get Your Files Here ! | 39. Cyber security for blockchain and cryptocurrency |-- 6.1 Fundamental Principles of Cyber Security (1).pptx - 73.36 KB
 | ~Get Your Files Here ! | 39. Cyber security for blockchain and cryptocurrency |-- 7. Cyber Security for blockchain and cryptocurrency.html - 149 Bytes
 | ~Get Your Files Here ! | 4. Causes, Consequence and prevention of Cyber criminality |-- 1. Causes, Consequences and prevention of Cyber Criminality.mp4 - 46.62 MB
 | ~Get Your Files Here ! | 4. Causes, Consequence and prevention of Cyber criminality |-- 1.1 Causes, Consequences and Prevention of Cyber Criminality.mp4 - 11.83 MB
 | ~Get Your Files Here ! | 4. Causes, Consequence and prevention of Cyber criminality |-- 2. What are the causes of cyber criminality.html - 153 Bytes
 | ~Get Your Files Here ! | 4. Causes, Consequence and prevention of Cyber criminality |-- 3. What are the consequences of cyber criminality.html - 153 Bytes
 | ~Get Your Files Here ! | 4. Causes, Consequence and prevention of Cyber criminality |-- 4. How can cyber criminality be prevented.html - 153 Bytes
 | ~Get Your Files Here ! | 40. Cyber Security Virtualization and Containerization |-- 1. Security considerations for virtualized environments.html - 2.69 KB
 | ~Get Your Files Here ! | 40. Cyber Security Virtualization and Containerization |-- 1.1 The Fundamental Principles Of Cyber Security (1) (1).pptx - 193 KB
 | ~Get Your Files Here ! | 40. Cyber Security Virtualization and Containerization |-- 2. Security considerations for containerized applications.html - 2.35 KB
 | ~Get Your Files Here ! | 40. Cyber Security Virtualization and Containerization |-- 2.1 Fundamental Principles of Cyber Security (1).pptx - 73.36 KB
 | ~Get Your Files Here ! | 40. Cyber Security Virtualization and Containerization |-- 3. Hypervisor security.html - 2.41 KB
 | ~Get Your Files Here ! | 40. Cyber Security Virtualization and Containerization |-- 3.1 Fundamental Principles of Cyber Security.pptx - 73.36 KB
 | ~Get Your Files Here ! | 40. Cyber Security Virtualization and Containerization |-- 4. Container Isolation.html - 2.59 KB
 | ~Get Your Files Here ! | 40. Cyber Security Virtualization and Containerization |-- 4.1 Fundamental Principles of Cyber Security.mp4 - 12.02 MB
 | ~Get Your Files Here ! | 40. Cyber Security Virtualization and Containerization |-- 5. Security considerations for Hypervisor Security.html - 2.31 KB
 | ~Get Your Files Here ! | 40. Cyber Security Virtualization and Containerization |-- 5.1 Protecting Digital Assets from Cyber Attacks.mp4 - 9.85 MB
 | ~Get Your Files Here ! | 40. Cyber Security Virtualization and Containerization |-- 6. Security considerations for Container Isolation.html - 2.7 KB
 | ~Get Your Files Here ! | 40. Cyber Security Virtualization and Containerization |-- 6.1 Protecting Digital Assets from Cyber Attacks.mp4 - 9.86 MB
 | ~Get Your Files Here ! | 40. Cyber Security Virtualization and Containerization |-- 7. Security considerations for Virtualization and Containerization.html - 149 Bytes
 | ~Get Your Files Here ! | 41. Cyber security for Quantum Computing |-- 1. Potential Impact of Quantum Computing on current encryption methods.html - 2.5 KB
 | ~Get Your Files Here ! | 41. Cyber security for Quantum Computing |-- 1.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (1).pptx - 192.92 KB
 | ~Get Your Files Here ! | 41. Cyber security for Quantum Computing |-- 2. Strategies for preparing for the era of quantum-safe cryptography.html - 3.24 KB
 | ~Get Your Files Here ! | 41. Cyber security for Quantum Computing |-- 2.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4 - 11.81 MB
 | ~Get Your Files Here ! | 41. Cyber security for Quantum Computing |-- 3. Cyber Security for Quantum Computing.html - 149 Bytes
 | ~Get Your Files Here ! | 42. Cyber security for election systems |-- 1. Cyber Security challenges for securing election systems.html - 3.47 KB
 | ~Get Your Files Here ! | 42. Cyber security for election systems |-- 1.1 Protecting Digital Assets from Cyber Attacks.mp4 - 9.86 MB
 | ~Get Your Files Here ! | 42. Cyber security for election systems |-- 2. Cyber security best practices for security election systems.html - 2.48 KB
 | ~Get Your Files Here ! | 42. Cyber security for election systems |-- 2.1 Fundamental Principles of Cyber Security.pptx - 73.36 KB
 | ~Get Your Files Here ! | 42. Cyber security for election systems |-- 3. Cyber security strategies for protecting against cyber threats to democracy.html - 2.95 KB
 | ~Get Your Files Here ! | 42. Cyber security for election systems |-- 3.1 Protecting Digital Assets from Cyber Attacks.mp4 - 9.86 MB
 | ~Get Your Files Here ! | 42. Cyber security for election systems |-- 4. Cyber Security for Elections Systems.html - 149 Bytes
 | ~Get Your Files Here ! | 43. Cyber security for wearable technology |-- 1. Wearable Technology.html - 1.91 KB
 | ~Get Your Files Here ! | 43. Cyber security for wearable technology |-- 1.1 Fundamental Principles of Cyber Security (1).pptx - 73.36 KB
 | ~Get Your Files Here ! | 43. Cyber security for wearable technology |-- 2. Cyber Security challenges of Wearable technology.html - 2.87 KB
 | ~Get Your Files Here ! | 43. Cyber security for wearable technology |-- 2.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (2).pptx - 192.92 KB
 | ~Get Your Files Here ! | 43. Cyber security for wearable technology |-- 3. Cyber security implications of wearable devices.html - 2.93 KB
 | ~Get Your Files Here ! | 43. Cyber security for wearable technology |-- 3.1 THE IMPLICATIONS OF (2).mp4 - 17.99 MB
 | ~Get Your Files Here ! | 43. Cyber security for wearable technology |-- 4. Cyber security privacy concerns for wearable devices personal data collection.html - 2.87 KB
 | ~Get Your Files Here ! | 43. Cyber security for wearable technology |-- 4.1 Cyber Security Ethics And Privacy.pptx - 194.1 KB
 | ~Get Your Files Here ! | 43. Cyber security for wearable technology |-- 5. Wearable Technology and Cyber Security Challenges and Implications.html - 149 Bytes
 | ~Get Your Files Here ! | 44. Cyber security for artificial intelligence ethics |-- 1. Ethical considerations in AI driven cyber security solutions and decision making.html - 3.22 KB
 | ~Get Your Files Here ! | 44. Cyber security for artificial intelligence ethics |-- 1.1 Cyber Security Tools.pptx - 192.45 KB
 | ~Get Your Files Here ! | 44. Cyber security for artificial intelligence ethics |-- 2. Potential Biases in AI-driven cyber security solutions and decision-making.html - 2.75 KB
 | ~Get Your Files Here ! | 44. Cyber security for artificial intelligence ethics |-- 2.1 Cyber+Security+(1)presentation+with+notes.pptx - 105.63 KB
 | ~Get Your Files Here ! | 44. Cyber security for artificial intelligence ethics |-- 3. Ethical Consideration is not very important in Cyber Security.html - 149 Bytes
 | ~Get Your Files Here ! | 45. Cyber security for space systems |-- 1. Unique challenges of securing satellite communication systems from cyber threat.html - 3.25 KB
 | ~Get Your Files Here ! | 45. Cyber security for space systems |-- 1.1 Cyber Security Analysis RV.pptx - 102.97 KB
 | ~Get Your Files Here ! | 45. Cyber security for space systems |-- 2. Unique challenges of securing space-based assets against cyber threats.html - 2.93 KB
 | ~Get Your Files Here ! | 45. Cyber security for space systems |-- 2.1 Protecting Your Digital Resources From Cyber Attacks.pptx - 72.7 KB
 | ~Get Your Files Here ! | 45. Cyber security for space systems |-- 3. Cyber Security Challenges for Space Systems.html - 149 Bytes
 | ~Get Your Files Here ! | 46. Cyber security for DevOps |-- 1. Integration of security practices into the DevOps workflow.html - 3.04 KB
 | ~Get Your Files Here ! | 46. Cyber security for DevOps |-- 1.1 Protecting Digital Assets from Cyber Attacks.mp4 - 9.86 MB
 | ~Get Your Files Here ! | 46. Cyber security for DevOps |-- 2. The role of DevSecOps in ensuring secure software delivery.html - 2.81 KB
 | ~Get Your Files Here ! | 46. Cyber security for DevOps |-- 2.1 IMPORTANCE+OF+CYBER+SECURITY.pptx - 71.48 KB
 | ~Get Your Files Here ! | 46. Cyber security for DevOps |-- 3. Cyber Security Practices for DevOps workflow.html - 149 Bytes
 | ~Get Your Files Here ! | 47. Cyber Security for Aviation and Aerospace |-- 1. Security considerations for aviation.html - 3 KB
 | ~Get Your Files Here ! | 47. Cyber Security for Aviation and Aerospace |-- 1.1 Fundamental Principles of Cyber Security.pptx - 73.36 KB
 | ~Get Your Files Here ! | 47. Cyber Security for Aviation and Aerospace |-- 2. Security considerations for aerospace.html - 2.75 KB
 | ~Get Your Files Here ! | 47. Cyber Security for Aviation and Aerospace |-- 2.1 The Fundamental Principles Of Cyber Security (1).pptx - 193 KB
 | ~Get Your Files Here ! | 47. Cyber Security for Aviation and Aerospace |-- 3. Cyber security for aircraft communication and navigation systems.html - 2.71 KB
 | ~Get Your Files Here ! | 47. Cyber Security for Aviation and Aerospace |-- 3.1 Fundamental Principles of Cyber Security.pptx - 73.36 KB
 | ~Get Your Files Here ! | 47. Cyber Security for Aviation and Aerospace |-- 4. The importance of Cyber Security for Aviation and Aerospace.html - 149 Bytes
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1. Security challenges for securing smart grid infrastructure in the energy sector.html - 2.79 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1.1 SG.jpg - 10.71 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1.10 SG21.jpg - 7.36 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1.11 SG22.jpg - 9.93 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1.12 SG23.jpg - 593.66 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1.13 SG24.png - 103.65 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1.14 SG25.jpg - 6.79 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1.15 SG34.jpg - 5.5 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1.16 SG35.png - 233.73 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1.17 SG9.jpg - 7.84 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1.2 SG10.jpg - 12.25 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1.3 SG11.jpg - 12.99 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1.4 SG12.jpg - 9.6 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1.5 SG14.jpg - 14.75 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1.6 SG15.jpg - 7.62 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1.7 SG19.jpg - 9.11 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1.8 SG2.png - 322.06 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 1.9 SG20.jpg - 10.46 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2. Resilience strategies for securing smart grid infrastructure in the energysector.html - 2.86 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2.1 SG13.webp - 18.61 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2.10 SG30.jpg - 9.57 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2.11 SG31.webp - 24.11 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2.12 SG33.png - 295.64 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2.13 SG4.jpg - 176.53 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2.14 SG5.jpg - 89.61 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2.15 SG6.jpg - 7.41 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2.16 SG7.png - 314.43 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2.17 SG8.jpg - 6.61 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2.2 SG16.jpg - 10.66 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2.3 SG17.avif - 50.76 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2.4 SG18.jpg - 167.62 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2.5 SG26.jpg - 125.82 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2.6 SG27.jpg - 10.47 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2.7 SG28.ppm - 213.59 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2.8 SG29.jpg - 277.62 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 2.9 SG3.jpg - 341.03 KB
 | ~Get Your Files Here ! | 48. Cyber security for Smart Grids |-- 3. The importance of securing Smart Grid Infrastructure in the energy sector.html - 149 Bytes
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 1. Security implications of biometric authentication methods.html - 2.42 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 1.1 BA.jpg - 154.29 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 1.2 BA10.webp - 10.29 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 1.3 BA11.jpg - 293.62 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 1.4 BA12.webp - 19.2 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 1.5 BA12.webp - 19.2 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 1.6 BA21.png - 87.14 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 1.7 BA6.png - 44.44 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 1.8 BA7.png - 73 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 1.9 BA8.webp - 31.01 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 2. Privacy implications of biometric authentication methods.html - 2.52 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 2.1 BA13.jpg - 424.01 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 2.10 BA30.jpg - 25.77 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 2.11 BA5.jpg - 175.31 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 2.12 BA9.webp - 36.49 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 2.2 BA14.jpg - 15.62 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 2.3 BA15.png - 139.35 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 2.4 BA16.jpg - 112.49 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 2.5 BA19.jpg - 76.36 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 2.6 BA2.jpg - 202.81 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 2.7 BA20.jpg - 83.88 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 2.8 BA22.jpg - 132.07 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 2.9 BA23.png - 45.92 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 3. Potential Vulnerabilities associated with biometric data.html - 2.12 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 3.1 BA17.jpg - 47.4 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 3.2 BA24.jpg - 46.16 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 3.3 BA25.webp - 215.31 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 3.4 BA26.png - 31.17 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 3.5 BA27.jpg - 136.1 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 3.6 BA28.jpg - 416.1 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 3.7 BA29.jpg - 15.73 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 3.8 BA3.jpg - 108.62 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 3.9 BA4.jpg - 86.53 KB
 | ~Get Your Files Here ! | 49. Cyber Security for Biometric Authentication |-- 4. Explain the potential vulnerabilities associated with biometric data.html - 153 Bytes
 | ~Get Your Files Here ! | 5. Cyber Security Tools, functions, and implications |-- 1. Cyber Security Tools, functions and implications.mp4 - 42.09 MB
 | ~Get Your Files Here ! | 5. Cyber Security Tools, functions, and implications |-- 1.1 Cyber Security Tools.pptx - 192.45 KB
 | ~Get Your Files Here ! | 5. Cyber Security Tools, functions, and implications |-- 1.2 IMPORTANCE OF CYBER (1).mp4 - 7.86 MB
 | ~Get Your Files Here ! | 5. Cyber Security Tools, functions, and implications |-- 1.3 THE IMPLICATIONS OF (2).mp4 - 18 MB
 | ~Get Your Files Here ! | 5. Cyber Security Tools, functions, and implications |-- 2. Describe some cyber security tools, their functions and implications.html - 153 Bytes
 | ~Get Your Files Here ! | 50. Cyber Security for Augmented Reality and Virtual Reality |-- 1. Security considerations for ARVR technologies.html - 2.53 KB
 | ~Get Your Files Here ! | 50. Cyber Security for Augmented Reality and Virtual Reality |-- 1.1 OP.webp - 41.04 KB
 | ~Get Your Files Here ! | 50. Cyber Security for Augmented Reality and Virtual Reality |-- 1.2 OP10.jpg - 178.49 KB
 | ~Get Your Files Here ! | 50. Cyber Security for Augmented Reality and Virtual Reality |-- 1.3 OP3.png - 351.25 KB
 | ~Get Your Files Here ! | 50. Cyber Security for Augmented Reality and Virtual Reality |-- 1.4 OP4.png - 346.5 KB
 | ~Get Your Files Here ! | 50. Cyber Security for Augmented Reality and Virtual Reality |-- 1.5 OP9.jpg - 38.64 KB
 | ~Get Your Files Here ! | 50. Cyber Security for Augmented Reality and Virtual Reality |-- 2. Potential Privacy risks associated with immersive experiences.html - 2.27 KB
 | ~Get Your Files Here ! | 50. Cyber Security for Augmented Reality and Virtual Reality |-- 2.1 OP2.webp - 588.02 KB
 | ~Get Your Files Here ! | 50. Cyber Security for Augmented Reality and Virtual Reality |-- 2.2 OP5.jpg - 81.52 KB
 | ~Get Your Files Here ! | 50. Cyber Security for Augmented Reality and Virtual Reality |-- 2.3 OP6.webp - 36.04 KB
 | ~Get Your Files Here ! | 50. Cyber Security for Augmented Reality and Virtual Reality |-- 2.4 OP7.jpg - 21.26 KB
 | ~Get Your Files Here ! | 50. Cyber Security for Augmented Reality and Virtual Reality |-- 2.5 OP8.jpeg - 23.27 KB
 | ~Get Your Files Here ! | 50. Cyber Security for Augmented Reality and Virtual Reality |-- 3. Discuss Cyber Security Strategies for augmented and virtual reality technology.html - 153 Bytes
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 1. Security challenges presented by the development of a quantum internet.html - 2.88 KB
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 1.1 QC3.jpg - 93.87 KB
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 2. Security challenges presented by developing quantum communication protocol.html - 2.85 KB
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 2.1 QC2.gif - 8.58 KB
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 3. Security opportunities presented by the development of a quantum internet.html - 2.77 KB
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 3.1 QC.jpg - 17.5 KB
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 4. Security Opportunities presented by developing quantum communication protocol.html - 3.15 KB
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 4.1 QC.jpg - 17.5 KB
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 4.10 QC9.png - 66.73 KB
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 4.2 QC10.jpg - 21.13 KB
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 4.3 QC2.gif - 8.58 KB
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 4.4 QC3.jpg - 93.87 KB
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 4.5 QC4.jpg - 32.21 KB
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 4.6 QC5.jpg - 64.26 KB
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 4.7 QC6.png - 40.94 KB
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 4.8 QC7.jpg - 29.64 KB
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 4.9 QC8.png - 37.44 KB
 | ~Get Your Files Here ! | 51. Cyber Security for Quantum Internet |-- 5. Explain the security challenges that can occur in quantum internet development.html - 153 Bytes
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1. Summary, Conclusion, and Recommendation.mp4 - 43.63 MB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.1 Biometric Authentication And Identity Management.pptx - 193.72 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.10 Cyber Security (1)presentation with notes.pptx - 105.63 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.11 Cyber Security Analysis RV.pptx - 102.97 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.12 Cyber Security Analysis.mp4 - 18.07 MB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.13 Cyber Security Awareness Training.pptx - 192.86 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.14 Cyber Security Concepts BV (1).pptx - 103.07 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.15 Cyber Security Concepts.mp4 - 20.49 MB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.16 Cyber Security Ecosy(2).mp4 - 13.87 MB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.17 Cyber Security Ecosystem.pptx - 193.58 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.18 Cyber Security Environment.pptx - 194.04 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.19 CYBER SECURITY ESSEN.mp4 - 16.67 MB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.2 Causes, Consequences And Prevention Of Cyber Criminality (1) (2).pptx - 192.83 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.20 Cyber Security Ethics And Privacy.pptx - 194.1 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.21 Cyber Security In Critical Infrastructure.pptx - 171.88 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.22 Cyber Security In The Cloud.pptx - 193.39 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.23 Cyber Security Intelligence.pptx - 193.23 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.24 Cyber Security Landscape.mp4 - 12.76 MB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.25 Cyber Security Landscape.pptx - 73.89 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.26 Cyber Security Laws In The USA, UK, FRANCE, CANADA, GERMANY, THE NETHERLANDS, AFRICA AFRICA AND NIGE (2).pptx - 117.49 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.27 Cyber Security Polic(1) (2).mp4 - 13.98 MB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.28 Cyber Security Policy BV.pptx - 101.19 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.29 Cyber Security Research (1).pptx - 194.79 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.3 Causes, Consequences and Prevention of Cyber Criminality.mp4 - 11.82 MB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.30 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4 - 11.81 MB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.31 Cyber Security Risks.mp4 - 18.31 MB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.32 Cyber Security Theor.mp4 - 21.88 MB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.33 Cyber Security Threat Intelligence Sharing And Collaboration.pptx - 192.9 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.34 Cyber Security Tools.mp4 - 16.18 MB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.35 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment.pptx - 192.92 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.36 Cyber+Security+(1)presentation+with+notes.pptx - 105.63 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.37 Fundamental Principles of Cyber Security (1).pptx - 73.36 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.38 Hacking Simulation.pptx - 146.9 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.39 How Can I Be Hacked By Cyber Criminals.pptx - 193.51 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.4 Common Cyber Securit.mp4 - 15.69 MB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.40 How Do Cyber Criminals Operate.pptx - 192.62 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.41 IMPORTANCE+OF+CYBER+SECURITY.pptx - 71.48 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.42 International Laws On Cyber Security.pptx - 119.24 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.43 Internet Of Things.pptx - 194.92 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.44 Machine Learning And AI In Cyber Security.pptx - 119.64 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.45 Machine Learning In Cyber Security.pptx - 104.71 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.46 Operationalisation Of Cyber Criminality.pptx - 195.66 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.47 Protecting Digital Assets from Cyber Attacks.mp4 - 9.85 MB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.48 Protecting Your Digital Resources From Cyber Attacks.pptx - 72.7 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.49 Quantum Computing And Post Quantum Cryptography.pptx - 126.65 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.5 Conducting Cyber Criminality Investigation (1).pptx - 194.1 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.50 Questions And Answers On Cyber Security (1) (1).pptx - 190.24 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.51 Regulatory Compliance And Data Protection Laws On Cyber Security.pptx - 195.37 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.52 Supply Chain Cyber Security.pptx - 192.86 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.53 THE IMPLICATIONS OF .mp4 - 18 MB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.54 The Mind Of A Cyber Criminal (1).pptx - 191.79 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.55 The Mind Of A Cyber Criminal.pptx - 191.79 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.56 The Role Of Stakehol.mp4 - 14.41 MB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.57 The Role Of Stakeholders In Cyber Security (2).pptx - 192.05 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.58 The Use Of Artificial Intelligence In Cyber Security.pptx - 192.91 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.59 The Use Of Machine Learning In Cyber Security.pptx - 191.21 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.6 Cyber Criminality Simulation.pptx - 192.31 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.60 The Use Of Technology In Cyber Security.pptx - 192.98 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.61 Who Is A Cyber Criminal.pptx - 193.79 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.62 Zero Trust Security Model In Cyber Security (2).pptx - 193.88 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.7 Cyber Security - An Exploratory Study.pptx - 193.08 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.8 Cyber Security (1).pptx - 194.9 KB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 1.9 Cyber Security (1)pr (2).mp4 - 24.14 MB
 | ~Get Your Files Here ! | 52. Summary, Conclusion and Recommendation |-- 2. Summary, Conclusion and Recommendation.html - 149 Bytes
 | ~Get Your Files Here ! | 6. Cyber Security Analysis |-- 1. Cyber Security Analysis.mp4 - 52.38 MB
 | ~Get Your Files Here ! | 6. Cyber Security Analysis |-- 1.1 Cyber Security Analysis RV.pptx - 102.97 KB
 | ~Get Your Files Here ! | 6. Cyber Security Analysis |-- 2. Discuss the implications of cyber security.html - 153 Bytes
 | ~Get Your Files Here ! | 7. Cyber Security Policy |-- 1. Cyber Seurity Policy.mp4 - 36.04 MB
 | ~Get Your Files Here ! | 7. Cyber Security Policy |-- 1.1 Cyber Security Policy BV.pptx - 101.19 KB
 | ~Get Your Files Here ! | 7. Cyber Security Policy |-- 2. Cyber Security Policy.html - 149 Bytes
 | ~Get Your Files Here ! | 8. Cyber Security Essentials |-- 1. Cyber Security Essentials.mp4 - 44.66 MB
 | ~Get Your Files Here ! | 8. Cyber Security Essentials |-- 1.1 CYBER SECURITY ESSEN.mp4 - 16.67 MB
 | ~Get Your Files Here ! | 8. Cyber Security Essentials |-- 2. Discuss why cyber security is essential for every stakeholder.html - 153 Bytes
 | ~Get Your Files Here ! | 9. Operationalization and Conceptualization of Cyber Security |-- 1. Cyber Security Operationalisation.mp4 - 74.35 MB
 | ~Get Your Files Here ! | 9. Operationalization and Conceptualization of Cyber Security |-- 1.1 Cyber Security Concepts BV (1).pptx - 103.07 KB
 | ~Get Your Files Here ! | 9. Operationalization and Conceptualization of Cyber Security |-- 1.2 Operationalisation Of Cyber Criminality.pptx - 195.66 KB
 | ~Get Your Files Here ! | 9. Operationalization and Conceptualization of Cyber Security |-- 2. Cyber Security Conceptualisation.mp4 - 60.25 MB
 | ~Get Your Files Here ! | 9. Operationalization and Conceptualization of Cyber Security |-- 2.1 Cyber Security Concepts.mp4 - 20.5 MB
 | ~Get Your Files Here ! | 9. Operationalization and Conceptualization of Cyber Security |-- 3. Explain some of the concepts of Cyber Security giving examples.html - 153 Bytes
 | ~Get Your Files Here ! |-- Bonus Resources.txt - 386 Bytes

udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
udp://open.tracker.cl:1337/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.cyberia.is:6969/announce
udp://open.demonii.si:1337/announce
udp://open.stealth.si/announce
udp://exodus.desync.com:6969/announce
udp://tracker.moeking.me:6969/announce
udp://explodie.org:6969/announce
udp://9.rarbg.me:2740/announce
udp://9.rarbg.to:2790/announce

Torrent Download

Magnet Download