FileMood

Download Cybersecurity for Executives

Cybersecurity for Executives

Name

Cybersecurity for Executives

 DOWNLOAD Copy Link

Total Size

300.7 MB

Total Files

86

Last Seen

2024-11-18 23:37

Hash

83D2BFD02B56545BAA859299D142C521126CEB94

/5.4. Stop Malicious Code/

20.How to avoid malicious code.mp4

12.5 MB

18.Stop malicious code summary.en.srt

1.0 KB

18.Stop malicious code summary.mp4

1.3 MB

19.What is malicious code.en.srt

4.5 KB

19.What is malicious code.mp4

8.5 MB

20.How to avoid malicious code.en.srt

6.9 KB

21.Organizational response to malicious code.en.srt

5.2 KB

21.Organizational response to malicious code.mp4

7.6 MB

/1.Introduction/

01.Cybersecurity for executives.mp4

4.3 MB

02.What you should know.en.srt

1.4 KB

02.What you should know.mp4

1.2 MB

03.How this course is organized.en.srt

1.7 KB

03.How this course is organized.mp4

2.3 MB

01.Cybersecurity for executives.en.srt

2.1 KB

/2.1. Understand the Big Picture/

04.Understand the big picture overview.en.srt

2.1 KB

04.Understand the big picture overview.mp4

4.8 MB

05.Why are you a target.en.srt

4.0 KB

05.Why are you a target.mp4

8.1 MB

06.Example - Organized crime.en.srt

4.5 KB

06.Example - Organized crime.mp4

9.7 MB

07.Why are you in the line of fire.en.srt

3.5 KB

07.Why are you in the line of fire.mp4

7.1 MB

08.Example - Cyberwar cross-fire.en.srt

3.3 KB

08.Example - Cyberwar cross-fire.mp4

7.6 MB

09.Insider threat - Cyber failure.en.srt

4.4 KB

09.Insider threat - Cyber failure.mp4

7.6 MB

/3.2. How to Think about Cybersecurity/

10.Think about cybersecurity summary.en.srt

1.7 KB

10.Think about cybersecurity summary.mp4

2.9 MB

11.Not what you buy, how you travel.en.srt

6.0 KB

11.Not what you buy, how you travel.mp4

11.0 MB

12.Germ theory.en.srt

2.7 KB

12.Germ theory.mp4

8.0 MB

13.Where to get IT support.en.srt

6.3 KB

13.Where to get IT support.mp4

11.0 MB

/4.3. Avoid Phishing Attacks/

14.Avoid phishing attacks summary.en.srt

1.6 KB

14.Avoid phishing attacks summary.mp4

3.2 MB

15.What are phishing attacks.en.srt

3.7 KB

15.What are phishing attacks.mp4

10.1 MB

16.How to avoid phishing attacks.en.srt

4.4 KB

16.How to avoid phishing attacks.mp4

8.4 MB

17.Organizational response to phishing attacks.en.srt

4.6 KB

17.Organizational response to phishing attacks.mp4

6.7 MB

/6.5. Avoid Identity Theft/

22.Avoid identity theft summary.en.srt

1.0 KB

22.Avoid identity theft summary.mp4

2.1 MB

23.What is identity theft.en.srt

4.3 KB

23.What is identity theft.mp4

8.6 MB

24.How to avoid identity theft.en.srt

5.6 KB

24.How to avoid identity theft.mp4

11.4 MB

25.Organizational response to identity theft.en.srt

6.0 KB

25.Organizational response to identity theft.mp4

8.5 MB

/7.6. Avoid Financial Cybertheft/

26.Avoid financial cybertheft summary.en.srt

1.0 KB

26.Avoid financial cybertheft summary.mp4

2.0 MB

27.What is financial cybertheft.en.srt

4.7 KB

27.What is financial cybertheft.mp4

9.6 MB

28.How to avoid financial cybertheft.en.srt

5.7 KB

28.How to avoid financial cybertheft.mp4

8.5 MB

29.Organizational response to financial cybertheft.en.srt

5.7 KB

29.Organizational response to financial cybertheft.mp4

7.8 MB

/8.7. Avoid Cyberattacks on Long Trips/

30.Avoid cyberattacks summary.en.srt

1.1 KB

30.Avoid cyberattacks summary.mp4

2.0 MB

31.What are cyberattacks on long trips.en.srt

4.2 KB

31.What are cyberattacks on long trips.mp4

8.5 MB

32.How to avoid cyberattacks on long trips.en.srt

4.6 KB

32.How to avoid cyberattacks on long trips.mp4

7.7 MB

33.Organizational response to cyberattacks on long trips.en.srt

4.2 KB

33.Organizational response to cyberattacks on long trips.mp4

6.2 MB

/9.8. Special Topics/

34.Special topics summary.en.srt

3.2 KB

34.Special topics summary.mp4

6.1 MB

35.Reasonable cybersecurity.en.srt

5.8 KB

35.Reasonable cybersecurity.mp4

10.5 MB

36.Cyber insurance.en.srt

4.9 KB

36.Cyber insurance.mp4

8.4 MB

37.Cloud computing.en.srt

5.5 KB

37.Cloud computing.mp4

7.4 MB

38.Internet of Things.en.srt

3.9 KB

38.Internet of Things.mp4

6.4 MB

39.Contractual firewalls.en.srt

5.8 KB

39.Contractual firewalls.mp4

7.5 MB

40.Third-party cyber risk management.en.srt

5.1 KB

40.Third-party cyber risk management.mp4

8.0 MB

41.Cybersecurity-related sales objectives.en.srt

6.2 KB

41.Cybersecurity-related sales objectives.mp4

11.4 MB

42.Active defense.en.srt

4.9 KB

42.Active defense.mp4

6.0 MB

/10.Conclusion/

43.Next steps.en.srt

1.7 KB

43.Next steps.mp4

2.1 MB

 

Total files 86


Copyright © 2024 FileMood.com