/
|
Get Bonus Downloads Here.url
|
0.2 KB
|
/1. Introduction/
|
1. Introduction.mp4
|
112.9 MB
|
1.1 Cyber Security (1)pr (2).mp4
|
25.3 MB
|
10. Cyber Security Ideologies.html
|
4.2 KB
|
10.1 Cyber Security Analysis.mp4
|
18.9 MB
|
11. Cyber Security Perspectives.mp4
|
78.0 MB
|
11.1 Cyber Security (1)presentation with notes.pptx
|
108.2 KB
|
12. The Importance of Cyber Security.mp4
|
24.6 MB
|
12.1 IMPORTANCE+OF+CYBER+SECURITY.pptx
|
73.2 KB
|
13. Implications of Cyber Security.mp4
|
50.3 MB
|
13.1 THE IMPLICATIONS OF CYBER SECURITY- fv.pptx
|
104.8 KB
|
14. Explain the fundamental principles of Cyber Security.html
|
0.2 KB
|
2. Introduction.mp4
|
9.3 MB
|
2.1 Cyber Security Concepts.mp4
|
21.5 MB
|
3. Cyber Security Fundamentals.mp4
|
78.1 MB
|
3.1 Fundamental Principles of Cyber Security (1).pptx
|
75.1 KB
|
4. Cyber Security Principles.mp4
|
45.8 MB
|
4.1 The Fundamental Principles Of Cyber Security (1).pptx
|
197.6 KB
|
5. Cyber Security Concepts.mp4
|
63.2 MB
|
5.1 Cyber Security Concepts BV (1).pptx
|
105.5 KB
|
6. Cyber Security Theories.mp4
|
67.9 MB
|
6.1 Cyber Security Theor.mp4
|
22.9 MB
|
7. Cyber Security Terminologies and Definitions.html
|
4.6 KB
|
7.1 Cyber Security Concepts BV (1).pptx
|
105.5 KB
|
8. Cyber Security Paradigms.html
|
3.3 KB
|
8.1 Cyber Security - An Exploratory Study.pptx
|
197.7 KB
|
9. Cyber Security Philosophies.html
|
3.8 KB
|
9.1 CYBER SECURITY ESSEN.mp4
|
17.5 MB
|
/.../10. Stakeholder Analysis in Cyber Security/
|
1. The Various Stakeholders in the Cyber Ecosystem.mp4
|
38.0 MB
|
1.1 The Role Of Stakeholders In Cyber Security (2).pptx
|
196.7 KB
|
2. The role and importance of the stakeholders.mp4
|
38.0 MB
|
2.1 The Role Of Stakeholders In Cyber Security (2).pptx
|
196.7 KB
|
3. The Importance of Stakeholders.html
|
0.1 KB
|
/.../11. The Cyber Security Landscape (environment)/
|
1. The cyber security environment.mp4
|
49.6 MB
|
1.1 Cyber Security Environment.pptx
|
198.7 KB
|
1.2 Cyber Security Landscape.mp4
|
13.4 MB
|
2. What do you understand by the cyber security landscapeenvironment.html
|
0.2 KB
|
/.../12. Cyber Security Interventions/
|
1. Intervention Strategies to deal with Cyber Threats.mp4
|
36.0 MB
|
1.1 Protecting Digital Assets from Cyber Attacks.mp4
|
10.3 MB
|
2. Cryptography and Encryption.html
|
3.8 KB
|
2.1 Cryptography and Encryption.docx
|
21.3 KB
|
3. List and Explain the intervention strategies to deal with cyber threat.html
|
0.2 KB
|
/.../13. Protecting your Digital Assets/
|
1. Cyber Security Strategy.mp4
|
36.0 MB
|
1.1 Cyber Security (1)pr.jpg
|
15.5 KB
|
1.2 Cyber Security Strategy.pptx
|
199.2 KB
|
2. Protecting your digital assets.html
|
0.1 KB
|
/.../14. Cyber Threat Landscape/
|
1. Landscape of Cyber Threat.mp4
|
49.5 MB
|
1.1 Cyber Security Landscape.pptx
|
75.7 KB
|
2. Common Types of Cyber Threat and their Impact.mp4
|
48.4 MB
|
2.1 Common Cyber Security Threats.pptx
|
98.1 KB
|
3. Explain the common types of cyber threats and their impact.html
|
0.2 KB
|
/.../15. Network Security Fundamentals/
|
1. Essential Principles of Securing Networks.mp4
|
45.7 MB
|
1.1 The Fundamental Principles Of Cyber Security (1) (1).pptx
|
197.6 KB
|
2. Firewalls.html
|
3.8 KB
|
2.1 Cyber Security (1)pr.mp4
|
21.5 MB
|
3. Intrusion Detection Systems.html
|
3.9 KB
|
3.1 Cyber Security Tools.pptx
|
197.1 KB
|
4. VPNs.html
|
3.6 KB
|
4.1 VPN.jpg
|
124.2 KB
|
5. What are the essential principles of securing networks.html
|
0.2 KB
|
/.../16. Web Application Security/
|
1. Best Practices for Securing Web Applications.mp4
|
45.8 MB
|
1.1 Fundamental Principles of Cyber Security.pptx
|
75.1 KB
|
2. Common Vulnerabilities and Mitigation Strategies.mp4
|
49.1 MB
|
2.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (1).pptx
|
104.6 KB
|
3. What are the best practices for securing web applications.html
|
0.2 KB
|
/.../17. Cloud Security/
|
1. Unique challenges of Cloud Security.html
|
4.8 KB
|
1.1 Common Cyber Security Threats BV.pptx
|
106.8 KB
|
2. Solutions for securing data and applications in cloud environments.html
|
4.4 KB
|
2.1 Cyber Security Attacks and Recommended Solutions.docx
|
18.8 KB
|
3. Cloud Security.html
|
0.1 KB
|
/.../18. Mobile Security/
|
1. Specific Security Considerations for Mobile Devices.mp4
|
48.0 MB
|
1.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4
|
12.4 MB
|
2. Specific security considerations for mobile applications and mobile devices.mp4
|
36.0 MB
|
2.1 Protecting Digital Assets from Cyber Attacks.mp4
|
10.3 MB
|
3. Mobile Device management.html
|
3.0 KB
|
3.1 Protecting Digital Assets from Cyber Attacks.mp4
|
10.3 MB
|
4. Secure App Development.mp4
|
45.7 MB
|
4.1 Cyber Security Polic(1).mp4
|
14.7 MB
|
5. Mobile Security.html
|
0.1 KB
|
/.../19. IoT Security/
|
1. IoT Security Challenges.html
|
3.6 KB
|
1.1 Cyber Security Threat Intelligence Sharing And Collaboration (1).pptx
|
197.5 KB
|
2. IoT Associated Risks.mp4
|
48.4 MB
|
2.1 Cyber Security Risks.mp4
|
19.2 MB
|
3. How to Mitigate IoT Associated Risks.mp4
|
36.0 MB
|
3.1 Protecting Your Digital Resources From Cyber Attacks.pptx
|
74.4 KB
|
4. IoT Security.html
|
0.1 KB
|
/.../2. Cyber Security Ecosystem/
|
1. Cyber Security as an Ecosystem.mp4
|
57.3 MB
|
1.1 Cyber Security Ecosy(2).mp4
|
14.5 MB
|
1.2 Cyber Security Ecosystem (1).pptx
|
105.7 KB
|
1.3 CYBER SECURITY ECOSYSTEM.docx
|
19.0 MB
|
2. How the Cyber Security Ecosystem Works.mp4
|
57.3 MB
|
3. Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4
|
49.1 MB
|
3.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4
|
12.4 MB
|
4. Types of Risks in the Cyber Ecosystem.mp4
|
48.4 MB
|
4.1 Cyber Security Risks BV.pptx
|
75.7 KB
|
4.2 Cyber Security Risks BV.pptx
|
75.7 KB
|
4.3 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4
|
12.4 MB
|
4.4 Cyber Security Risks.docx
|
20.8 KB
|
5. Malware.html
|
4.4 KB
|
5.1 Malware 2.jpg
|
163.7 KB
|
5.2 Malware 4.jpg
|
143.3 KB
|
5.3 Malware.jpg
|
924.2 KB
|
6. Spyware.html
|
3.3 KB
|
6.1 SW1.jpg
|
24.6 KB
|
6.2 SW2.jpg
|
192.9 KB
|
6.3 SW3.jpg
|
25.1 KB
|
6.4 SW4.jpg
|
398.3 KB
|
6.5 SW5.jpg
|
140.5 KB
|
7. Explain Cyber Security as an Ecosystem.html
|
0.2 KB
|
/.../20. Social Engineering and Phishing/
|
1. Social Engineering Attacks.html
|
3.9 KB
|
1.1 Cyber Security Risks.mp4
|
19.2 MB
|
2. Phishing.html
|
3.9 KB
|
2.1 Common Cyber Security Threats (1).pptx
|
199.2 KB
|
3. Effective Strategies for recognizing and preventing phishing attempts.mp4
|
36.0 MB
|
3.1 Protecting Digital Assets from Cyber Attacks.mp4
|
10.3 MB
|
4. The Psychology behind Social Engineering Attacks.html
|
4.0 KB
|
4.1 Cyber Security (1)pr.jpg
|
15.5 KB
|
5. Social Engineering and Phishing.html
|
0.1 KB
|
/.../21. Incidence Response and Management/
|
1. Essential steps for responding to cyber security incidents.mp4
|
36.0 MB
|
1.1 Protecting Your Digital Resources From Cyber Attacks.pptx
|
74.4 KB
|
2. Essential steps for managing cyber securing incidents.mp4
|
45.7 MB
|
2.1 Protecting Digital Assets from Cyber Attacks.mp4
|
10.3 MB
|
3. Best practices for responding to cyber security incidents.mp4
|
48.9 MB
|
3.1 Protecting Your Digital Resources From Cyber Attacks.pptx
|
74.4 KB
|
4. Best practices for managing cyber security incidents.mp4
|
49.1 MB
|
4.1 Protecting Digital Assets from Cyber Attacks.mp4
|
10.3 MB
|
5. Incidence Response and Management.html
|
0.1 KB
|
/.../22. Cryptographic Principles/
|
1. The fundamental principles of Cryptography.html
|
3.1 KB
|
1.1 The Fundamental Principles Of Cyber Security (1) (1).pptx
|
197.6 KB
|
2. Fundamental principles of Encryption.html
|
2.7 KB
|
2.1 The Fundamental Principles Of Cyber Security (1).pptx
|
197.6 KB
|
3. Fundamental principles of Algorithms.html
|
3.0 KB
|
3.1 The Fundamental Principles Of Cyber Security (1) (1).pptx
|
197.6 KB
|
4. Fundamental principles of Digital Signatures.html
|
2.3 KB
|
4.1 Fundamental Principles of Cyber Security.pptx
|
75.1 KB
|
5. Fundamental principles of Key management.html
|
1.7 KB
|
5.1 The Fundamental Principles Of Cyber Security (1) (1).pptx
|
197.6 KB
|
6. Cryptographic Principles.html
|
0.1 KB
|
/.../23. Cyber Security Compliance and Regulations/
|
1. Cyber Security Compliance Standards that organisations must adhere to.mp4
|
45.7 MB
|
1.1 Cyber Security Policy BV.pptx
|
103.6 KB
|
2. Cyber Security Regulation Standards that organisations must adhere to.mp4
|
45.8 MB
|
2.1 Cyber Security Policy BV.pptx
|
103.6 KB
|
3. GDPR.html
|
1.5 KB
|
3.1 Cyber Security Policy BV.pptx
|
103.6 KB
|
4. HIPAA.html
|
1.7 KB
|
4.1 Cyber Security Policy BV.pptx
|
103.6 KB
|
5. PCI DSS.html
|
2.1 KB
|
5.1 Cyber Security Policy BV.pptx
|
103.6 KB
|
6. Cyber Security Compliance and Regulations.html
|
0.1 KB
|
/.../24. Cyber Security Risk Assessment/
|
1. The process of identifying cyber security risks.mp4
|
48.4 MB
|
1.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (2).pptx
|
197.6 KB
|
2. Assessing Cyber Security Risks.html
|
4.5 KB
|
2.1 Cyber Security Risks.mp4
|
19.2 MB
|
3. Mitigating Cyber Security Risks.mp4
|
54.9 MB
|
3.1 Protecting Digital Assets from Cyber Attacks.mp4
|
10.3 MB
|
4. Cyber Security Risk Assessment.html
|
0.1 KB
|
/.../25. Security Operations and Monitoring/
|
1. The principles of secure software development.mp4
|
45.8 MB
|
1.1 Fundamental Principles of Cyber Security (1).pptx
|
75.1 KB
|
2. The integration of security into software development lifecycle.html
|
3.8 KB
|
2.1 The Fundamental Principles Of Cyber Security (1) (1).pptx
|
197.6 KB
|
3. Security Operations and Monitoring.html
|
0.1 KB
|
/.../26. Ethical Hacking and Penetration Testing/
|
1. Ethical Hacking.html
|
4.7 KB
|
1.1 Cyber Security Polic(1) (2).mp4
|
14.7 MB
|
2. The role of Ethical Hacking.html
|
4.5 KB
|
2.1 Cyber Security Polic(1).mp4
|
14.7 MB
|
3. The role of penetration testing.html
|
4.8 KB
|
3.1 Cyber Security Polic(1).mp4
|
14.6 MB
|
4. Identifying and Addressing vulnerabilities.html
|
4.8 KB
|
4.1 Cyber Security Polic(1) (1).mp4
|
14.7 MB
|
5. Ethical Hacking and Prevention Testing.html
|
0.1 KB
|
/.../27. Cyber Security for Small Businesses/
|
1. Tailored Cyber Security Strategies for small businesses.html
|
3.6 KB
|
1.1 Protecting Your Digital Resources From Cyber Attacks.pptx
|
74.4 KB
|
2. Best cyber security best practices for small businesses.html
|
3.5 KB
|
2.1 Protecting Digital Assets from Cyber Attacks.mp4
|
10.3 MB
|
3. Tailored Cyber security strategies for businesses with limited resources.html
|
3.6 KB
|
3.1 Cyber Security Polic(1).mp4
|
14.6 MB
|
4. Best cyber security practices for businesses with limited resources.html
|
3.2 KB
|
4.1 Fundamental Principles of Cyber Security.pptx
|
75.1 KB
|
5. Cyber Security for Small Businesses.html
|
0.1 KB
|
/.../28. Cyber Security for Remote Workforce/
|
1. Unique security challenges for organisations with remotedistributed workforce.html
|
3.6 KB
|
1.1 The Fundamental Principles Of Cyber Security (1) (1).pptx
|
197.6 KB
|
2. Unique solutions for organisations with remote or distributed workforces.html
|
2.7 KB
|
2.1 Protecting Your Digital Resources From Cyber Attacks.pptx
|
74.4 KB
|
3. Cyber Security for Remote Workforce.html
|
0.1 KB
|
/.../29. Cyber Security for Critical Infrastructure/
|
1. Specific security considerations for protecting critical infrastructure.html
|
3.3 KB
|
1.1 Fundamental Principles of Cyber Security (1).pptx
|
75.1 KB
|
2. Critical infrastructure Energy, transportation and healthcare systems.html
|
3.3 KB
|
2.1 Fundamental Principles of Cyber Security (1).pptx
|
75.1 KB
|
3. Cyber Security for Critical Infrastructure.html
|
0.1 KB
|
/.../3. Understanding Cyber Security - An Critical Overview/
|
1. A critical overview of cyber security.mp4
|
66.6 MB
|
1.1 Cyber Security Essentials.pptx
|
105.4 KB
|
2. A holistic view of cyber security.mp4
|
48.0 MB
|
2.1 Cyber Security Landscape.mp4
|
13.4 MB
|
3. Give a critical overview of cyber security from your own perspective.html
|
0.2 KB
|
/.../30. Cyber Security for financial institutions/
|
1. Unique cyber security challenges faced by financial institutions.html
|
2.8 KB
|
1.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (2).pptx
|
197.6 KB
|
2. Cyber Security Regulatory requirements that must be met by financial institution.html
|
3.1 KB
|
2.1 Cyber Security Laws In The USA, UK, FRANCE, CANADA, GERMANY, THE NETHERLANDS, AFRICA AFRICA AND NIGE (2).pptx
|
120.3 KB
|
2.2 Regulatory Compliance And Data Protection Laws On Cyber Security.pptx
|
200.1 KB
|
3. Cyber Security for financial institutions.html
|
0.1 KB
|
/.../31. Emerging trends for cyber security/
|
1. Latest Trends and Advancements in Cyber Security.html
|
3.0 KB
|
1.1 Machine Learning And AI In Cyber Security (1) (1).pptx
|
122.5 KB
|
2. Latest Trends in AI-Driven security.html
|
3.2 KB
|
2.1 Machine Learning And AI In Cyber Security (1) (1).pptx
|
122.5 KB
|
2.2 Machine Learning And AI In Cyber Security (2).pptx
|
122.5 KB
|
3. Latest trends in zero-trust architecture.html
|
2.9 KB
|
3.1 Machine Learning And AI In Cyber Security (1).pptx
|
122.5 KB
|
4. Latest trends in quantum-safe cryptography.html
|
3.1 KB
|
4.1 Machine Learning And AI In Cyber Security (2).pptx
|
122.5 KB
|
5. Latest trends in cyber security software and hardware.html
|
3.0 KB
|
5.1 Machine Learning And AI In Cyber Security (2).pptx
|
122.5 KB
|
6. Emerging trends for cyber security.html
|
0.1 KB
|
/.../32. Cyber Security for Smart Cities/
|
1. Security implications of interconnected IoT devices in urban environments.html
|
3.1 KB
|
1.1 Fundamental Principles of Cyber Security (1).pptx
|
75.1 KB
|
2. Strategies for securing smart city infrastructure.html
|
3.5 KB
|
2.1 The Fundamental Principles Of Cyber Security (1) (1).pptx
|
197.6 KB
|
3. Cyber Security for Smart Cities.html
|
0.1 KB
|
/.../33. Cyber Security for Healthcare/
|
1. Unique challenges of securing sensitive patient data in the healthcare industry.html
|
3.3 KB
|
1.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (2).pptx
|
197.6 KB
|
2. Unique challenges of securing sensitive medical devices in healthcare Industry.html
|
2.9 KB
|
2.1 Common Cyber Security Threats.pptx
|
98.1 KB
|
3. Cyber Security for HealthCare.html
|
0.1 KB
|
/.../34. Cyber security for autonomous vehicle/
|
1. Security considerations for autonomous and connected vehicles.html
|
3.3 KB
|
1.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4
|
12.4 MB
|
2. Cyber Threats for autonomous and connected vehicles.html
|
3.1 KB
|
2.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4
|
12.4 MB
|
3. Cyber protective measures for autonomous and connected vehicles.html
|
3.3 KB
|
3.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (1).pptx
|
197.6 KB
|
4. Cyber Security for Autonomous Vehicle.html
|
0.1 KB
|
/.../35. Cyber Security for the Supply Chain/
|
1. Importance of securing the supply chain against cyber attacks.html
|
2.8 KB
|
1.1 IMPORTANCE OF CYBER (1).mp4
|
8.2 MB
|
2. The impact of supply chain breaches on the organisation.html
|
2.8 KB
|
2.1 The Implications Of Cyber Security (1).pptx
|
197.7 KB
|
3. Cyber Security for the Supply Chain.html
|
0.1 KB
|
/.../36. Cyber Security for AI and Machine Learning/
|
1. Security challenges related to the use of AI in cyber security.html
|
2.9 KB
|
1.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (2).pptx
|
197.6 KB
|
2. Ethical considerations related to the use of AI in cyber security.html
|
2.7 KB
|
2.1 Cyber Security Ethics And Privacy.pptx
|
198.8 KB
|
3. Security challenges related to the use of machine learning in cyber security.html
|
2.6 KB
|
3.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (1).pptx
|
197.6 KB
|
4. Ethical considerations relating to the use of machine learning in cyber security.html
|
2.6 KB
|
4.1 Cyber Security Ethics And Privacy.pptx
|
198.8 KB
|
4.2 THE IMPLICATIONS OF (2).mp4
|
18.9 MB
|
5. Cyber Security for AI and Machine Learning.html
|
0.1 KB
|
/.../37. Cyber security for 5G Networks/
|
1. Cyber Security Implications of 5G Networks.html
|
2.9 KB
|
1.1 The Fundamental Principles Of Cyber Security (1) (1).pptx
|
197.6 KB
|
2. Measures needed to protect against emerging threats in the era of 5Gconnectivity.html
|
2.6 KB
|
2.1 Protecting Digital Assets from Cyber Attacks.mp4
|
10.3 MB
|
3. Cyber Security for 5G Networks.html
|
0.1 KB
|
/.../38. Cyber security for industrial control systems (ICS)/
|
1. Unique cyber security considerations for protecting industrial control systems.html
|
2.8 KB
|
1.1 The Fundamental Principles Of Cyber Security (1).pptx
|
197.6 KB
|
2. Unique cyber security considerations in critical infrastructures.html
|
2.9 KB
|
2.1 The Fundamental Principles Of Cyber Security (1) (1).pptx
|
197.6 KB
|
3. Unique cyber security considerations in manufacturing environments.html
|
2.6 KB
|
3.1 Fundamental Principles of Cyber Security.pptx
|
75.1 KB
|
4. Cyber Security for industrial control systems (ICS).html
|
0.1 KB
|
/.../39. Cyber security for blockchain and cryptocurrency/
|
1. Blockchain networks.html
|
3.0 KB
|
1.1 Fundamental Principles of Cyber Security (1).pptx
|
75.1 KB
|
2. Cryptocurrency transactions.html
|
2.2 KB
|
2.1 The Fundamental Principles Of Cyber Security (1) (1).pptx
|
197.6 KB
|
3. Security challenges for securing blockchain networks.html
|
3.0 KB
|
3.1 Cyber Security Landscape.pptx
|
75.7 KB
|
4. Security challenges for securing cryptocurrency transactions.html
|
2.9 KB
|
4.1 Cyber Security Environment.pptx
|
198.7 KB
|
5. Best practices for securing blockchain networks.html
|
2.9 KB
|
5.1 Fundamental Principles of Cyber Security (1).pptx
|
75.1 KB
|
6. Best practices for securing Cryptocurrency transactions.html
|
2.6 KB
|
6.1 Fundamental Principles of Cyber Security (1).pptx
|
75.1 KB
|
7. Cyber Security for blockchain and cryptocurrency.html
|
0.1 KB
|
/.../4. Causes, Consequence and prevention of Cyber criminality/
|
1. Causes, Consequences and prevention of Cyber Criminality.mp4
|
48.9 MB
|
1.1 Causes, Consequences and Prevention of Cyber Criminality.mp4
|
12.4 MB
|
2. What are the causes of cyber criminality.html
|
0.2 KB
|
3. What are the consequences of cyber criminality.html
|
0.2 KB
|
4. How can cyber criminality be prevented.html
|
0.2 KB
|
/.../40. Cyber Security Virtualization and Containerization/
|
1. Security considerations for virtualized environments.html
|
2.8 KB
|
1.1 The Fundamental Principles Of Cyber Security (1) (1).pptx
|
197.6 KB
|
2. Security considerations for containerized applications.html
|
2.4 KB
|
2.1 Fundamental Principles of Cyber Security (1).pptx
|
75.1 KB
|
3. Hypervisor security.html
|
2.5 KB
|
3.1 Fundamental Principles of Cyber Security.pptx
|
75.1 KB
|
4. Container Isolation.html
|
2.7 KB
|
4.1 Fundamental Principles of Cyber Security.mp4
|
12.6 MB
|
5. Security considerations for Hypervisor Security.html
|
2.4 KB
|
5.1 Protecting Digital Assets from Cyber Attacks.mp4
|
10.3 MB
|
6. Security considerations for Container Isolation.html
|
2.8 KB
|
6.1 Protecting Digital Assets from Cyber Attacks.mp4
|
10.3 MB
|
7. Security considerations for Virtualization and Containerization.html
|
0.1 KB
|
/.../41. Cyber security for Quantum Computing/
|
1. Potential Impact of Quantum Computing on current encryption methods.html
|
2.6 KB
|
1.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (1).pptx
|
197.6 KB
|
2. Strategies for preparing for the era of quantum-safe cryptography.html
|
3.3 KB
|
2.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4
|
12.4 MB
|
3. Cyber Security for Quantum Computing.html
|
0.1 KB
|
/.../42. Cyber security for election systems/
|
1. Cyber Security challenges for securing election systems.html
|
3.6 KB
|
1.1 Protecting Digital Assets from Cyber Attacks.mp4
|
10.3 MB
|
2. Cyber security best practices for security election systems.html
|
2.5 KB
|
2.1 Fundamental Principles of Cyber Security.pptx
|
75.1 KB
|
3. Cyber security strategies for protecting against cyber threats to democracy.html
|
3.0 KB
|
3.1 Protecting Digital Assets from Cyber Attacks.mp4
|
10.3 MB
|
4. Cyber Security for Elections Systems.html
|
0.1 KB
|
/.../43. Cyber security for wearable technology/
|
1. Wearable Technology.html
|
2.0 KB
|
1.1 Fundamental Principles of Cyber Security (1).pptx
|
75.1 KB
|
2. Cyber Security challenges of Wearable technology.html
|
2.9 KB
|
2.1 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment (1) (2).pptx
|
197.6 KB
|
3. Cyber security implications of wearable devices.html
|
3.0 KB
|
3.1 THE IMPLICATIONS OF (2).mp4
|
18.9 MB
|
4. Cyber security privacy concerns for wearable devices personal data collection.html
|
2.9 KB
|
4.1 Cyber Security Ethics And Privacy.pptx
|
198.8 KB
|
5. Wearable Technology and Cyber Security Challenges and Implications.html
|
0.1 KB
|
/.../44. Cyber security for artificial intelligence ethics/
|
1. Ethical considerations in AI driven cyber security solutions and decision making.html
|
3.3 KB
|
1.1 Cyber Security Tools.pptx
|
197.1 KB
|
2. Potential Biases in AI-driven cyber security solutions and decision-making.html
|
2.8 KB
|
2.1 Cyber+Security+(1)presentation+with+notes.pptx
|
108.2 KB
|
3. Ethical Consideration is not very important in Cyber Security.html
|
0.1 KB
|
/.../45. Cyber security for space systems/
|
1. Unique challenges of securing satellite communication systems from cyber threat.html
|
3.3 KB
|
1.1 Cyber Security Analysis RV.pptx
|
105.4 KB
|
2. Unique challenges of securing space-based assets against cyber threats.html
|
3.0 KB
|
2.1 Protecting Your Digital Resources From Cyber Attacks.pptx
|
74.4 KB
|
3. Cyber Security Challenges for Space Systems.html
|
0.1 KB
|
/.../46. Cyber security for DevOps/
|
1. Integration of security practices into the DevOps workflow.html
|
3.1 KB
|
1.1 Protecting Digital Assets from Cyber Attacks.mp4
|
10.3 MB
|
2. The role of DevSecOps in ensuring secure software delivery.html
|
2.9 KB
|
2.1 IMPORTANCE+OF+CYBER+SECURITY.pptx
|
73.2 KB
|
3. Cyber Security Practices for DevOps workflow.html
|
0.1 KB
|
/.../47. Cyber Security for Aviation and Aerospace/
|
1. Security considerations for aviation.html
|
3.1 KB
|
1.1 Fundamental Principles of Cyber Security.pptx
|
75.1 KB
|
2. Security considerations for aerospace.html
|
2.8 KB
|
2.1 The Fundamental Principles Of Cyber Security (1).pptx
|
197.6 KB
|
3. Cyber security for aircraft communication and navigation systems.html
|
2.8 KB
|
3.1 Fundamental Principles of Cyber Security.pptx
|
75.1 KB
|
4. The importance of Cyber Security for Aviation and Aerospace.html
|
0.1 KB
|
/.../48. Cyber security for Smart Grids/
|
1. Security challenges for securing smart grid infrastructure in the energy sector.html
|
2.9 KB
|
1.1 SG.jpg
|
11.0 KB
|
1.10 SG21.jpg
|
7.5 KB
|
1.11 SG22.jpg
|
10.2 KB
|
1.12 SG23.jpg
|
607.9 KB
|
1.13 SG24.png
|
106.1 KB
|
1.14 SG25.jpg
|
7.0 KB
|
1.15 SG34.jpg
|
5.6 KB
|
1.16 SG35.png
|
239.3 KB
|
1.17 SG9.jpg
|
8.0 KB
|
1.2 SG10.jpg
|
12.5 KB
|
1.3 SG11.jpg
|
13.3 KB
|
1.4 SG12.jpg
|
9.8 KB
|
1.5 SG14.jpg
|
15.1 KB
|
1.6 SG15.jpg
|
7.8 KB
|
1.7 SG19.jpg
|
9.3 KB
|
1.8 SG2.png
|
329.8 KB
|
1.9 SG20.jpg
|
10.7 KB
|
2. Resilience strategies for securing smart grid infrastructure in the energysector.html
|
2.9 KB
|
2.1 SG13.webp
|
19.1 KB
|
2.10 SG30.jpg
|
9.8 KB
|
2.11 SG31.webp
|
24.7 KB
|
2.12 SG33.png
|
302.7 KB
|
2.13 SG4.jpg
|
180.8 KB
|
2.14 SG5.jpg
|
91.8 KB
|
2.15 SG6.jpg
|
7.6 KB
|
2.16 SG7.png
|
322.0 KB
|
2.17 SG8.jpg
|
6.8 KB
|
2.2 SG16.jpg
|
10.9 KB
|
2.3 SG17.avif
|
52.0 KB
|
2.4 SG18.jpg
|
171.6 KB
|
2.5 SG26.jpg
|
128.8 KB
|
2.6 SG27.jpg
|
10.7 KB
|
2.7 SG28.ppm
|
218.7 KB
|
2.8 SG29.jpg
|
284.3 KB
|
2.9 SG3.jpg
|
349.2 KB
|
3. The importance of securing Smart Grid Infrastructure in the energy sector.html
|
0.1 KB
|
/.../49. Cyber Security for Biometric Authentication/
|
1. Security implications of biometric authentication methods.html
|
2.5 KB
|
1.1 BA.jpg
|
158.0 KB
|
1.2 BA10.webp
|
10.5 KB
|
1.3 BA11.jpg
|
300.7 KB
|
1.4 BA12.webp
|
19.7 KB
|
1.5 BA12.webp
|
19.7 KB
|
1.6 BA21.png
|
89.2 KB
|
1.7 BA6.png
|
45.5 KB
|
1.8 BA7.png
|
74.8 KB
|
1.9 BA8.webp
|
31.8 KB
|
2. Privacy implications of biometric authentication methods.html
|
2.6 KB
|
2.1 BA13.jpg
|
434.2 KB
|
2.10 BA30.jpg
|
26.4 KB
|
2.11 BA5.jpg
|
179.5 KB
|
2.12 BA9.webp
|
37.4 KB
|
2.2 BA14.jpg
|
16.0 KB
|
2.3 BA15.png
|
142.7 KB
|
2.4 BA16.jpg
|
115.2 KB
|
2.5 BA19.jpg
|
78.2 KB
|
2.6 BA2.jpg
|
207.7 KB
|
2.7 BA20.jpg
|
85.9 KB
|
2.8 BA22.jpg
|
135.2 KB
|
2.9 BA23.png
|
47.0 KB
|
3. Potential Vulnerabilities associated with biometric data.html
|
2.2 KB
|
3.1 BA17.jpg
|
48.5 KB
|
3.2 BA24.jpg
|
47.3 KB
|
3.3 BA25.webp
|
220.5 KB
|
3.4 BA26.png
|
31.9 KB
|
3.5 BA27.jpg
|
139.4 KB
|
3.6 BA28.jpg
|
426.1 KB
|
3.7 BA29.jpg
|
16.1 KB
|
3.8 BA3.jpg
|
111.2 KB
|
3.9 BA4.jpg
|
88.6 KB
|
4. Explain the potential vulnerabilities associated with biometric data.html
|
0.2 KB
|
/.../5. Cyber Security Tools, functions, and implications/
|
1. Cyber Security Tools, functions and implications.mp4
|
44.1 MB
|
1.1 Cyber Security Tools.pptx
|
197.1 KB
|
1.2 IMPORTANCE OF CYBER (1).mp4
|
8.2 MB
|
1.3 THE IMPLICATIONS OF (2).mp4
|
18.9 MB
|
2. Describe some cyber security tools, their functions and implications.html
|
0.2 KB
|
/.../50. Cyber Security for Augmented Reality and Virtual Reality/
|
1. Security considerations for ARVR technologies.html
|
2.6 KB
|
1.1 OP.webp
|
42.0 KB
|
1.2 OP10.jpg
|
182.8 KB
|
1.3 OP3.png
|
359.7 KB
|
1.4 OP4.png
|
354.8 KB
|
1.5 OP9.jpg
|
39.6 KB
|
2. Potential Privacy risks associated with immersive experiences.html
|
2.3 KB
|
2.1 OP2.webp
|
602.1 KB
|
2.2 OP5.jpg
|
83.5 KB
|
2.3 OP6.webp
|
36.9 KB
|
2.4 OP7.jpg
|
21.8 KB
|
2.5 OP8.jpeg
|
23.8 KB
|
3. Discuss Cyber Security Strategies for augmented and virtual reality technology.html
|
0.2 KB
|
/.../51. Cyber Security for Quantum Internet/
|
1. Security challenges presented by the development of a quantum internet.html
|
3.0 KB
|
1.1 QC3.jpg
|
96.1 KB
|
2. Security challenges presented by developing quantum communication protocol.html
|
2.9 KB
|
2.1 QC2.gif
|
8.8 KB
|
3. Security opportunities presented by the development of a quantum internet.html
|
2.8 KB
|
3.1 QC.jpg
|
17.9 KB
|
4. Security Opportunities presented by developing quantum communication protocol.html
|
3.2 KB
|
4.1 QC.jpg
|
17.9 KB
|
4.10 QC9.png
|
68.3 KB
|
4.2 QC10.jpg
|
21.6 KB
|
4.3 QC2.gif
|
8.8 KB
|
4.4 QC3.jpg
|
96.1 KB
|
4.5 QC4.jpg
|
33.0 KB
|
4.6 QC5.jpg
|
65.8 KB
|
4.7 QC6.png
|
41.9 KB
|
4.8 QC7.jpg
|
30.4 KB
|
4.9 QC8.png
|
38.3 KB
|
5. Explain the security challenges that can occur in quantum internet development.html
|
0.2 KB
|
/.../52. Summary, Conclusion and Recommendation/
|
1. Summary, Conclusion, and Recommendation.mp4
|
45.8 MB
|
1.1 Biometric Authentication And Identity Management.pptx
|
198.4 KB
|
1.10 Cyber Security (1)presentation with notes.pptx
|
108.2 KB
|
1.11 Cyber Security Analysis RV.pptx
|
105.4 KB
|
1.12 Cyber Security Analysis.mp4
|
18.9 MB
|
1.13 Cyber Security Awareness Training.pptx
|
197.5 KB
|
1.14 Cyber Security Concepts BV (1).pptx
|
105.5 KB
|
1.15 Cyber Security Concepts.mp4
|
21.5 MB
|
1.16 Cyber Security Ecosy(2).mp4
|
14.5 MB
|
1.17 Cyber Security Ecosystem.pptx
|
198.2 KB
|
1.18 Cyber Security Environment.pptx
|
198.7 KB
|
1.19 CYBER SECURITY ESSEN.mp4
|
17.5 MB
|
1.2 Causes, Consequences And Prevention Of Cyber Criminality (1) (2).pptx
|
197.5 KB
|
1.20 Cyber Security Ethics And Privacy.pptx
|
198.8 KB
|
1.21 Cyber Security In Critical Infrastructure.pptx
|
176.0 KB
|
1.22 Cyber Security In The Cloud.pptx
|
198.0 KB
|
1.23 Cyber Security Intelligence.pptx
|
197.9 KB
|
1.24 Cyber Security Landscape.mp4
|
13.4 MB
|
1.25 Cyber Security Landscape.pptx
|
75.7 KB
|
1.26 Cyber Security Laws In The USA, UK, FRANCE, CANADA, GERMANY, THE NETHERLANDS, AFRICA AFRICA AND NIGE (2).pptx
|
120.3 KB
|
1.27 Cyber Security Polic(1) (2).mp4
|
14.7 MB
|
1.28 Cyber Security Policy BV.pptx
|
103.6 KB
|
1.29 Cyber Security Research (1).pptx
|
199.5 KB
|
1.3 Causes, Consequences and Prevention of Cyber Criminality.mp4
|
12.4 MB
|
1.30 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp4
|
12.4 MB
|
1.31 Cyber Security Risks.mp4
|
19.2 MB
|
1.32 Cyber Security Theor.mp4
|
22.9 MB
|
1.33 Cyber Security Threat Intelligence Sharing And Collaboration.pptx
|
197.5 KB
|
1.34 Cyber Security Tools.mp4
|
17.0 MB
|
1.35 Cyber Security, Risks, Vulnerabilities, Capacity And Preparedness Assessment.pptx
|
197.6 KB
|
1.36 Cyber+Security+(1)presentation+with+notes.pptx
|
108.2 KB
|
1.37 Fundamental Principles of Cyber Security (1).pptx
|
75.1 KB
|
1.38 Hacking Simulation.pptx
|
150.4 KB
|
1.39 How Can I Be Hacked By Cyber Criminals.pptx
|
198.2 KB
|
1.4 Common Cyber Securit.mp4
|
16.5 MB
|
1.40 How Do Cyber Criminals Operate.pptx
|
197.2 KB
|
1.41 IMPORTANCE+OF+CYBER+SECURITY.pptx
|
73.2 KB
|
1.42 International Laws On Cyber Security.pptx
|
122.1 KB
|
1.43 Internet Of Things.pptx
|
199.6 KB
|
1.44 Machine Learning And AI In Cyber Security.pptx
|
122.5 KB
|
1.45 Machine Learning In Cyber Security.pptx
|
107.2 KB
|
1.46 Operationalisation Of Cyber Criminality.pptx
|
200.4 KB
|
1.47 Protecting Digital Assets from Cyber Attacks.mp4
|
10.3 MB
|
1.48 Protecting Your Digital Resources From Cyber Attacks.pptx
|
74.4 KB
|
1.49 Quantum Computing And Post Quantum Cryptography.pptx
|
129.7 KB
|
1.5 Conducting Cyber Criminality Investigation (1).pptx
|
198.8 KB
|
1.50 Questions And Answers On Cyber Security (1) (1).pptx
|
194.8 KB
|
1.51 Regulatory Compliance And Data Protection Laws On Cyber Security.pptx
|
200.1 KB
|
1.52 Supply Chain Cyber Security.pptx
|
197.5 KB
|
1.53 THE IMPLICATIONS OF .mp4
|
18.9 MB
|
1.54 The Mind Of A Cyber Criminal (1).pptx
|
196.4 KB
|
1.55 The Mind Of A Cyber Criminal.pptx
|
196.4 KB
|
1.56 The Role Of Stakehol.mp4
|
15.1 MB
|
1.57 The Role Of Stakeholders In Cyber Security (2).pptx
|
196.7 KB
|
1.58 The Use Of Artificial Intelligence In Cyber Security.pptx
|
197.5 KB
|
1.59 The Use Of Machine Learning In Cyber Security.pptx
|
195.8 KB
|
1.6 Cyber Criminality Simulation.pptx
|
196.9 KB
|
1.60 The Use Of Technology In Cyber Security.pptx
|
197.6 KB
|
1.61 Who Is A Cyber Criminal.pptx
|
198.4 KB
|
1.62 Zero Trust Security Model In Cyber Security (2).pptx
|
198.5 KB
|
1.7 Cyber Security - An Exploratory Study.pptx
|
197.7 KB
|
1.8 Cyber Security (1).pptx
|
199.6 KB
|
1.9 Cyber Security (1)pr (2).mp4
|
25.3 MB
|
2. Summary, Conclusion and Recommendation.html
|
0.1 KB
|
/.../6. Cyber Security Analysis/
|
1. Cyber Security Analysis.mp4
|
54.9 MB
|
1.1 Cyber Security Analysis RV.pptx
|
105.4 KB
|
2. Discuss the implications of cyber security.html
|
0.2 KB
|
/.../7. Cyber Security Policy/
|
1. Cyber Seurity Policy.mp4
|
37.8 MB
|
1.1 Cyber Security Policy BV.pptx
|
103.6 KB
|
2. Cyber Security Policy.html
|
0.1 KB
|
/.../8. Cyber Security Essentials/
|
1. Cyber Security Essentials.mp4
|
46.8 MB
|
1.1 CYBER SECURITY ESSEN.mp4
|
17.5 MB
|
2. Discuss why cyber security is essential for every stakeholder.html
|
0.2 KB
|
/.../9. Operationalization and Conceptualization of Cyber Security/
|
1. Cyber Security Operationalisation.mp4
|
78.0 MB
|
1.1 Cyber Security Concepts BV (1).pptx
|
105.5 KB
|
1.2 Operationalisation Of Cyber Criminality.pptx
|
200.4 KB
|
2. Cyber Security Conceptualisation.mp4
|
63.2 MB
|
2.1 Cyber Security Concepts.mp4
|
21.5 MB
|
3. Explain some of the concepts of Cyber Security giving examples.html
|
0.2 KB
|
/~Get Your Files Here !/
|
Bonus Resources.txt
|
0.4 KB
|
Total files 517
|