FILENAME SIZE ~Get Your Files Here !/1. Introduction/1. Introduction.mp4 25.3 MB ~Get Your Files Here !/1. Introduction/1. Introduction.srt 3.9 KB ~Get Your Files Here !/10. Cyber Security Career Paths/1. Incident Response Analyst.mp4 10.2 MB ~Get Your Files Here !/10. Cyber Security Career Paths/1. Incident Response Analyst.srt 1.7 KB ~Get Your Files Here !/10. Cyber Security Career Paths/2. Risk Analyst.mp4 9 MB ~Get Your Files Here !/10. Cyber Security Career Paths/2. Risk Analyst.srt 1.5 KB ~Get Your Files Here !/10. Cyber Security Career Paths/3. Penetration Tester.mp4 8.9 MB ~Get Your Files Here !/10. Cyber Security Career Paths/3. Penetration Tester.srt 1.4 KB ~Get Your Files Here !/10. Cyber Security Career Paths/4. Security Engineer.mp4 8.6 MB ~Get Your Files Here !/10. Cyber Security Career Paths/4. Security Engineer.srt 1.5 KB ~Get Your Files Here !/10. Cyber Security Career Paths/5. Forensics Analyst.mp4 10.6 MB ~Get Your Files Here !/10. Cyber Security Career Paths/5. Forensics Analyst.srt 1.7 KB ~Get Your Files Here !/10. Cyber Security Career Paths/6. Chief information security officer (CISO).mp4 12.4 MB ~Get Your Files Here !/10. Cyber Security Career Paths/6. Chief information security officer (CISO).srt 1.9 KB ~Get Your Files Here !/10. Cyber Security Career Paths/7. Chief Information Officers (CIO).mp4 13.2 MB ~Get Your Files Here !/10. Cyber Security Career Paths/7. Chief Information Officers (CIO).srt 2.1 KB ~Get Your Files Here !/11. Recap/1. Recap.mp4 5.8 MB ~Get Your Files Here !/11. Recap/1. Recap.srt 1.1 KB ~Get Your Files Here !/12. Assessment on Cyber Security/1. 100 Multiple Choice Questions on Cyber Security.html 202 B ~Get Your Files Here !/12. Assessment on Cyber Security/2. 100 Multiple Choice Questions on Cyber Security.html 202 B ~Get Your Files Here !/2. Cyber Security/1. What is Cyber Security.mp4 23.8 MB ~Get Your Files Here !/2. Cyber Security/1. What is Cyber Security.srt 3.6 KB ~Get Your Files Here !/2. Cyber Security/2. History of Cyber Security.mp4 22.6 MB ~Get Your Files Here !/2. Cyber Security/2. History of Cyber Security.srt 3.8 KB ~Get Your Files Here !/2. Cyber Security/3. Benefits of Cyber Security.mp4 14.5 MB ~Get Your Files Here !/2. Cyber Security/3. Benefits of Cyber Security.srt 2.4 KB ~Get Your Files Here !/2. Cyber Security/4. Careers in Cyber Security.mp4 20.2 MB ~Get Your Files Here !/2. Cyber Security/4. Careers in Cyber Security.srt 3.3 KB ~Get Your Files Here !/2. Cyber Security/5. Future of Cyber Security.mp4 28.9 MB ~Get Your Files Here !/2. Cyber Security/5. Future of Cyber Security.srt 4.4 KB ~Get Your Files Here !/3. Data Science/1. What is Data Science.mp4 25 MB ~Get Your Files Here !/3. Data Science/1. What is Data Science.srt 3.9 KB ~Get Your Files Here !/3. Data Science/2. History of Data Science.mp4 26.3 MB ~Get Your Files Here !/3. Data Science/2. History of Data Science.srt 3.8 KB ~Get Your Files Here !/3. Data Science/3. Benefits of Data Science.mp4 20 MB ~Get Your Files Here !/3. Data Science/3. Benefits of Data Science.srt 3.2 KB ~Get Your Files Here !/3. Data Science/4. Careers in Data Science.mp4 25.1 MB ~Get Your Files Here !/3. Data Science/4. Careers in Data Science.srt 4.1 KB ~Get Your Files Here !/3. Data Science/5. Future of Data Science.mp4 20.5 MB ~Get Your Files Here !/3. Data Science/5. Future of Data Science.srt 3.3 KB ~Get Your Files Here !/4. Applications of Cyber Security/1. Backup and Data Recovery.mp4 9.4 MB ~Get Your Files Here !/4. Applications of Cyber Security/1. Backup and Data Recovery.srt 1.5 KB ~Get Your Files Here !/4. Applications of Cyber Security/10. Vulnerability Assessments and Security Training.mp4 5.5 MB ~Get Your Files Here !/4. Applications of Cyber Security/10. Vulnerability Assessments and Security Training.srt 942 B ~Get Your Files Here !/4. Applications of Cyber Security/2. Physical Access Controls.mp4 5.1 MB ~Get Your Files Here !/4. Applications of Cyber Security/2. Physical Access Controls.srt 829 B ~Get Your Files Here !/4. Applications of Cyber Security/3. Logical Access Controls.mp4 8 MB ~Get Your Files Here !/4. Applications of Cyber Security/3. Logical Access Controls.srt 1.2 KB ~Get Your Files Here !/4. Applications of Cyber Security/4. Securely Configured and Encrypted Devices.mp4 7.5 MB ~Get Your Files Here !/4. Applications of Cyber Security/4. Securely Configured and Encrypted Devices.srt 1.1 KB ~Get Your Files Here !/4. Applications of Cyber Security/5. Securely Configured Network Components.mp4 3.9 MB ~Get Your Files Here !/4. Applications of Cyber Security/5. Securely Configured Network Components.srt 661 B ~Get Your Files Here !/4. Applications of Cyber Security/6. Network segmentation.mp4 3.1 MB ~Get Your Files Here !/4. Applications of Cyber Security/6. Network segmentation.srt 607 B ~Get Your Files Here !/4. Applications of Cyber Security/7. Email and Online Protection.mp4 7.4 MB ~Get Your Files Here !/4. Applications of Cyber Security/7. Email and Online Protection.srt 1.3 KB ~Get Your Files Here !/4. Applications of Cyber Security/8. Wireless security.mp4 4.1 MB ~Get Your Files Here !/4. Applications of Cyber Security/8. Wireless security.srt 810 B ~Get Your Files Here !/4. Applications of Cyber Security/9. Maintenance, Monitoring and Patching.mp4 7.9 MB ~Get Your Files Here !/4. Applications of Cyber Security/9. Maintenance, Monitoring and Patching.srt 1.3 KB ~Get Your Files Here !/5. Cybersecurity Tools/1. BluVector.mp4 7.7 MB ~Get Your Files Here !/5. Cybersecurity Tools/1. BluVector.srt 1.4 KB ~Get Your Files Here !/5. Cybersecurity Tools/2. Bricata.mp4 10.2 MB ~Get Your Files Here !/5. Cybersecurity Tools/2. Bricata.srt 1.8 KB ~Get Your Files Here !/5. Cybersecurity Tools/3. Cloud Defender.mp4 9.7 MB ~Get Your Files Here !/5. Cybersecurity Tools/3. Cloud Defender.srt 1.7 KB ~Get Your Files Here !/5. Cybersecurity Tools/4. Cofense Triage.mp4 11.1 MB ~Get Your Files Here !/5. Cybersecurity Tools/4. Cofense Triage.srt 1.7 KB ~Get Your Files Here !/5. Cybersecurity Tools/5. Contrast Security.mp4 6.7 MB ~Get Your Files Here !/5. Cybersecurity Tools/5. Contrast Security.srt 1.1 KB ~Get Your Files Here !/5. Cybersecurity Tools/6. Digital Gaurdian.mp4 10.6 MB ~Get Your Files Here !/5. Cybersecurity Tools/6. Digital Gaurdian.srt 1.7 KB ~Get Your Files Here !/5. Cybersecurity Tools/7. Mantix4.mp4 6.3 MB ~Get Your Files Here !/5. Cybersecurity Tools/7. Mantix4.srt 1 KB ~Get Your Files Here !/5. Cybersecurity Tools/8. SecBI.mp4 9.9 MB ~Get Your Files Here !/5. Cybersecurity Tools/8. SecBI.srt 1.6 KB ~Get Your Files Here !/6. Cyber Security Examples/1. Malware.mp4 6.9 MB ~Get Your Files Here !/6. Cyber Security Examples/1. Malware.srt 1.1 KB ~Get Your Files Here !/6. Cyber Security Examples/2. Ransomware Attacks.mp4 13.6 MB ~Get Your Files Here !/6. Cyber Security Examples/2. Ransomware Attacks.srt 2.4 KB ~Get Your Files Here !/6. Cyber Security Examples/3. Man in the Middle Attacks.mp4 7.9 MB ~Get Your Files Here !/6. Cyber Security Examples/3. Man in the Middle Attacks.srt 1.4 KB ~Get Your Files Here !/6. Cyber Security Examples/4. Distributed Denial of Service (DDoS).mp4 10.4 MB ~Get Your Files Here !/6. Cyber Security Examples/4. Distributed Denial of Service (DDoS).srt 1.4 KB ~Get Your Files Here !/6. Cyber Security Examples/5. Password Attacks.mp4 15.7 MB ~Get Your Files Here !/6. Cyber Security Examples/5. Password Attacks.srt 2.3 KB ~Get Your Files Here !/6. Cyber Security Examples/6. Drive-By Download Attacks.mp4 10.2 MB ~Get Your Files Here !/6. Cyber Security Examples/6. Drive-By Download Attacks.srt 1.8 KB ~Get Your Files Here !/7. Cyber Security Project Ideas/1. Keylogging.mp4 5.8 MB ~Get Your Files Here !/7. Cyber Security Project Ideas/1. Keylogging.srt 1 KB ~Get Your Files Here !/7. Cyber Security Project Ideas/2. Packet Sniffing.mp4 9.2 MB ~Get Your Files Here !/7. Cyber Security Project Ideas/2. Packet Sniffing.srt 1.6 KB ~Get Your Files Here !/7. Cyber Security Project Ideas/3. Bug Bounties.mp4 5.8 MB ~Get Your Files Here !/7. Cyber Security Project Ideas/3. Bug Bounties.srt 1 KB ~Get Your Files Here !/7. Cyber Security Project Ideas/4. Breaking Caesar Cipher.mp4 6.3 MB ~Get Your Files Here !/7. Cyber Security Project Ideas/4. Breaking Caesar Cipher.srt 994 B ~Get Your Files Here !/7. Cyber Security Project Ideas/5. SQL Injection.mp4 6 MB ~Get Your Files Here !/7. Cyber Security Project Ideas/5. SQL Injection.srt 1.1 KB