Details for:

Type:
Files:
Size:

Uploaded On:
Added By:
Not Trusted

Seeders:
Leechers:
Info Hash:
E961F195FFD9D7BC176B856F01DB9B1EFC725CF8
  1. Course/1. Introduction/1. Introduction - Getting Startaed.mp4 17.5 MB
  2. Course/1. Introduction/1. Introduction - Getting Startaed.srt 7.1 KB
  3. Course/1. Introduction/2. Exercise Mapping out your personal digital hygiene goals.html 173 bytes
  4. Course/1. Introduction/1.2 Data Breach statistics.html 118 bytes
  5. Course/1. Introduction/1.1 Data Breach statistics.html 113 bytes
  6. Course/2. Mindset of Cybersecurity Professional/3. Convenience vs Friction.mp4 21.5 MB
  7. Course/2. Mindset of Cybersecurity Professional/5. Classifying your data.mp4 21.3 MB
  8. Course/2. Mindset of Cybersecurity Professional/1. Why is this course important.mp4 8.6 MB
  9. Course/2. Mindset of Cybersecurity Professional/2. How to think about risk.mp4 7.6 MB
  10. Course/2. Mindset of Cybersecurity Professional/5. Classifying your data.srt 6.6 KB
  11. Course/2. Mindset of Cybersecurity Professional/3. Convenience vs Friction.srt 4.8 KB
  12. Course/2. Mindset of Cybersecurity Professional/1. Why is this course important.srt 2.9 KB
  13. Course/2. Mindset of Cybersecurity Professional/2. How to think about risk.srt 2.0 KB
  14. Course/2. Mindset of Cybersecurity Professional/1.1 Resource on Operational Security.html 175 bytes
  15. Course/2. Mindset of Cybersecurity Professional/8. Personal Risk Audit.html 173 bytes
  16. Course/2. Mindset of Cybersecurity Professional/7. Exercise Check if your email has been apart of a breach.html 173 bytes
  17. Course/2. Mindset of Cybersecurity Professional/6. Quiz 2.html 169 bytes
  18. Course/2. Mindset of Cybersecurity Professional/4. Quiz 1.html 169 bytes
  19. Course/2. Mindset of Cybersecurity Professional/5.1 Protecting your data.html 105 bytes
  20. Course/3. Cyber Attacks/2. PhishingWhaling.mp4 23.4 MB
  21. Course/3. Cyber Attacks/4. Ransomware.mp4 22.9 MB
  22. Course/3. Cyber Attacks/3. Walkthrough Phishing.mp4 14.1 MB
  23. Course/3. Cyber Attacks/5. Malware.mp4 13.4 MB
  24. Course/3. Cyber Attacks/1. Cyber Attack Trends.mp4 2.4 MB
  25. Course/3. Cyber Attacks/2. PhishingWhaling.srt 8.4 KB
  26. Course/3. Cyber Attacks/4. Ransomware.srt 6.1 KB
  27. Course/3. Cyber Attacks/3. Walkthrough Phishing.srt 4.0 KB
  28. Course/3. Cyber Attacks/5. Malware.srt 3.5 KB
  29. Course/3. Cyber Attacks/1. Cyber Attack Trends.srt 1.2 KB
  30. Course/3. Cyber Attacks/6. Quiz 3.html 169 bytes
  31. Course/3. Cyber Attacks/1.1 Web attacks blocked per day.html 142 bytes
  32. Course/3. Cyber Attacks/4.1 How to prevent ransomware.html 116 bytes
  33. Course/4. Securing your Phone/4. Walkthrough Steps to take when downloading an app.mp4 39.7 MB
  34. Course/4. Securing your Phone/9. Phishing attacks on your phone.mp4 27.9 MB
  35. Course/4. Securing your Phone/3. Downloading Apps.mp4 22.1 MB
  36. Course/4. Securing your Phone/7. Mobile Carrier Security.mp4 20.9 MB
  37. Course/4. Securing your Phone/6. Two Factor Authentication.mp4 18.3 MB
  38. Course/4. Securing your Phone/2. Android vs iOS.mp4 16.7 MB
  39. Course/4. Securing your Phone/1. The Basics.mp4 11.5 MB
  40. Course/4. Securing your Phone/5. Location Services.mp4 11.1 MB
  41. Course/4. Securing your Phone/9. Phishing attacks on your phone.srt 9.7 KB
  42. Course/4. Securing your Phone/7. Mobile Carrier Security.srt 7.4 KB
  43. Course/4. Securing your Phone/6. Two Factor Authentication.srt 7.4 KB
  44. Course/4. Securing your Phone/4. Walkthrough Steps to take when downloading an app.srt 6.1 KB
  45. Course/4. Securing your Phone/5. Location Services.srt 6.0 KB
  46. Course/4. Securing your Phone/3. Downloading Apps.srt 6.0 KB
  47. Course/4. Securing your Phone/2. Android vs iOS.srt 5.5 KB
  48. Course/4. Securing your Phone/1. The Basics.srt 4.0 KB
  49. Course/4. Securing your Phone/10. Exercise Enroll into the Do Not Call list (if you're in the US).html 173 bytes
  50. Course/4. Securing your Phone/8. Quiz 4.html 169 bytes
  51. Course/4. Securing your Phone/11. Quiz 5.html 169 bytes
  52. Course/4. Securing your Phone/9.2 iCloud breach scam.html 157 bytes
  53. Course/4. Securing your Phone/9.1 Block spam calls.html 131 bytes
  54. Course/4. Securing your Phone/7.2 Cell phone account fraud.html 130 bytes
  55. Course/4. Securing your Phone/7.1 Porting.html 115 bytes
  56. Course/4. Securing your Phone/7.3 Security expert that learns the hardway.html 95 bytes
  57. Course/5. Securing your computer/1. The basics of securing your computer.mp4 44.2 MB
  58. Course/5. Securing your computer/4. Non-obvious basic essentials for securing your computer.mp4 32.4 MB
  59. Course/5. Securing your computer/3. Protecting your home internet.mp4 24.8 MB
  60. Course/5. Securing your computer/1. The basics of securing your computer.srt 15.2 KB
  61. Course/5. Securing your computer/4. Non-obvious basic essentials for securing your computer.srt 10.2 KB
  62. Course/5. Securing your computer/3. Protecting your home internet.srt 5.5 KB
  63. Course/5. Securing your computer/2. Quiz 6.html 169 bytes
  64. Course/5. Securing your computer/5. Quiz 7.html 169 bytes
  65. Course/5. Securing your computer/1.1 VPN.html 135 bytes
  66. Course/5. Securing your computer/1.2 VPN comparison.html 114 bytes
  67. Course/5. Securing your computer/3.1 Router Password.html 92 bytes
  68. Course/6. Password and Accounts/4. Security questions & Birthday for your accounts.mp4 32.2 MB
  69. Course/6. Password and Accounts/1. Rules for creating passwords.mp4 22.7 MB
  70. Course/6. Password and Accounts/2. Passphrases and Password Managers.mp4 11.9 MB
  71. Course/6. Password and Accounts/5. Summary of Password Management.mp4 5.9 MB
  72. Course/6. Password and Accounts/4. Security questions & Birthday for your accounts.srt 9.5 KB
  73. Course/6. Password and Accounts/1. Rules for creating passwords.srt 6.5 KB
  74. Course/6. Password and Accounts/2. Passphrases and Password Managers.srt 2.8 KB
  75. Course/6. Password and Accounts/5. Summary of Password Management.srt 2.2 KB
  76. Course/6. Password and Accounts/3. Quiz 7.html 169 bytes
  77. Course/6. Password and Accounts/2.1 Lastpass.html 123 bytes
  78. Course/6. Password and Accounts/2.2 1password - password manager.html 110 bytes
  79. Course/7. Surfing the Internet Securely/2. Google, Search, and Cookies.mp4 33.2 MB
  80. Course/7. Surfing the Internet Securely/3. Drive by downloads, HTTPs, and Internet Trackers.mp4 30.3 MB
  81. Course/7. Surfing the Internet Securely/5. Google Maps and Child Filters.mp4 24.4 MB
  82. Course/7. Surfing the Internet Securely/1. Internet Browsers.mp4 11.2 MB
  83. Course/7. Surfing the Internet Securely/2. Google, Search, and Cookies.srt 10.4 KB
  84. Course/7. Surfing the Internet Securely/5. Google Maps and Child Filters.srt 8.9 KB
  85. Course/7. Surfing the Internet Securely/3. Drive by downloads, HTTPs, and Internet Trackers.srt 8.8 KB
  86. Course/7. Surfing the Internet Securely/1. Internet Browsers.srt 3.8 KB
  87. Course/7. Surfing the Internet Securely/4. Quiz 8.html 169 bytes
  88. Course/7. Surfing the Internet Securely/5.3 Parental Control Software.html 123 bytes
  89. Course/7. Surfing the Internet Securely/2.1 Google Privacy Policy.html 105 bytes
  90. Course/7. Surfing the Internet Securely/3.1 Download HTTPS everywhere.html 97 bytes
  91. Course/7. Surfing the Internet Securely/2.2 How Google Tracks your data.html 95 bytes
  92. Course/7. Surfing the Internet Securely/5.1 Youtube for Kids.html 89 bytes
  93. Course/7. Surfing the Internet Securely/2.3 Download Privacy Badger.html 87 bytes
  94. Course/7. Surfing the Internet Securely/5.2 Net Nanny.html 86 bytes
  95. Course/7. Surfing the Internet Securely/1.1 Brave browser.html 79 bytes
  96. Course/8. Email/2. Creating your email.mp4 55.9 MB
  97. Course/8. Email/4. Email activity.mp4 27.2 MB
  98. Course/8. Email/1. Introduction - review cyber attacks.mp4 7.5 MB
  99. Course/8. Email/2. Creating your email.srt 14.1 KB
  100. Course/8. Email/4. Email activity.srt 9.0 KB
  101. Course/8. Email/1. Introduction - review cyber attacks.srt 3.6 KB
  102. Course/8. Email/3. Quiz 8.html 169 bytes
  103. [TGx]Downloaded from torrentgalaxy.to .txt 642 bytes
  104. [UdemyLibrary.com] Join for free courses and tutorials.txt 265 bytes
  105. Torrent downloaded from Demonoid.is.txt 112 bytes
  106. Torrent downloaded from ettvcentral.com.txt 110 bytes
  107. Torrent downloaded from 1337x.to.txt 100 bytes

Similar Posts:

  1. Other Udemy - Microsoft Cybersecurity Pro Track: Managing Identity Jan. 31, 2023, 6:03 p.m.
  2. Other Udemy- Microsoft Cybersecurity Pro Track: Security in Office 365 Jan. 31, 2023, 7:31 p.m.
  3. Other Udemy - MS Cybersecurity Pro Track: Windows 10 Security Features Jan. 31, 2023, 10:01 p.m.
  4. Other Udemy - Microsoft Cybersecurity Pro Track: PowerShell Security Feb. 1, 2023, 6:28 a.m.
  5. Other Udemy - A Hacker's Guide to Internet Safety and Cybersecurity Feb. 3, 2023, 1:08 a.m.