Filename Size ~Get Your Files Here !/01 - Introduction/01 - Examine the cybersecurity threat landscape.mp4 8.9 MB ~Get Your Files Here !/01 - Introduction/01 - Examine the cybersecurity threat landscape.srt 2.7 KB ~Get Your Files Here !/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.mp4 11.1 MB ~Get Your Files Here !/02 - 1. Malware and Ransomware/01 - Explore the threat of malware and ransomware.srt 5.8 KB ~Get Your Files Here !/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.mp4 11.1 MB ~Get Your Files Here !/02 - 1. Malware and Ransomware/02 - Protect against malware and ransomware.srt 4.5 KB ~Get Your Files Here !/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.mp4 10.7 MB ~Get Your Files Here !/03 - 2. Phishing and Smishing/01 - Explore the threat of phishing and smishing.srt 6.6 KB ~Get Your Files Here !/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.mp4 11.5 MB ~Get Your Files Here !/03 - 2. Phishing and Smishing/02 - Protect against phishing and smishing.srt 5.9 KB ~Get Your Files Here !/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.mp4 9 MB ~Get Your Files Here !/04 - 3. Business Email Compromise/01 - Explore the threat of business email compromise.srt 5.2 KB ~Get Your Files Here !/04 - 3. Business Email Compromise/02 - Protect against business email compromise.mp4 8.8 MB ~Get Your Files Here !/04 - 3. Business Email Compromise/02 - Protect against business email compromise.srt 5 KB ~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.mp4 10.6 MB ~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/01 - Explore the threat of botnets and DDoS attacks.srt 4.5 KB ~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.mp4 15.1 MB ~Get Your Files Here !/05 - 4. Botnets and DDoS attacks/02 - Protect against botnets and DDoS threats.srt 6.3 KB ~Get Your Files Here !/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.mp4 8.6 MB ~Get Your Files Here !/06 - 5. Deepfakes/01 - Explore the threat of deepfakes.srt 3.4 KB ~Get Your Files Here !/06 - 5. Deepfakes/02 - Protect against deepfakes.mp4 11.6 MB ~Get Your Files Here !/06 - 5. Deepfakes/02 - Protect against deepfakes.srt 4.7 KB ~Get Your Files Here !/07 - 6. Insider Threats/01 - Explore the risk of insider threats.mp4 10.4 MB ~Get Your Files Here !/07 - 6. Insider Threats/01 - Explore the risk of insider threats.srt 5.5 KB ~Get Your Files Here !/07 - 6. Insider Threats/02 - Protect against insider threats.mp4 6.7 MB ~Get Your Files Here !/07 - 6. Insider Threats/02 - Protect against insider threats.srt 6 KB ~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.mp4 13.8 MB ~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/01 - Explore the threat of unmanaged IoT devices.srt 6.3 KB ~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.mp4 11.9 MB ~Get Your Files Here !/08 - 7. Unmanaged IoT Devices/02 - Protect against unmanaged IoT devices.srt 5.7 KB ~Get Your Files Here !/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.mp4 13.6 MB ~Get Your Files Here !/09 - 8. Shadow IT/01 - Explore the threat of shadow IT.srt 5.7 KB ~Get Your Files Here !/09 - 8. Shadow IT/02 - Protect against shadow IT.mp4 11.8 MB ~Get Your Files Here !/09 - 8. Shadow IT/02 - Protect against shadow IT.srt 5.3 KB ~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.mp4 15.4 MB ~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/01 - The threat of supply chain attacks and third-party risks.srt 5.5 KB ~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.mp4 10 MB ~Get Your Files Here !/10 - 9. Supply Chain Attacks and Third-Party Risks/02 - Protect against supply chain attacks and third-party risks.srt 7 KB ~Get Your Files Here !/11 - Conclusion/01 - Stay up to date on cybersecurity.mp4 11.3 MB ~Get Your Files Here !/11 - Conclusion/01 - Stay up to date on cybersecurity.srt 3.6 KB ~Get Your Files Here !/Bonus Resources.txt 386 B