FILENAME | SIZE | | 1. IT Security Trends/1. Introduction to Current Cyber Threats.mp4 | 20.5 MB |
| 1. IT Security Trends/1. Introduction to Current Cyber Threats.vtt | 5.3 KB |
| 1. IT Security Trends/10. Popular Myths About Computer System Security - notes for the examination.pdf | 988.5 KB |
| 1. IT Security Trends/11. Trends in IT Security.mp4 | 18.7 MB |
| 1. IT Security Trends/11. Trends in IT Security.vtt | 3.7 KB |
| 1. IT Security Trends/12. The birth of technology society.mp4 | 18.6 MB |
| 1. IT Security Trends/12. The birth of technology society.vtt | 3.1 KB |
| 1. IT Security Trends/13. EXERCISE How much info can you gather.mp4 | 13.8 MB |
| 1. IT Security Trends/13. EXERCISE How much info can you gather.vtt | 3.7 KB |
| 1. IT Security Trends/14. Fake identity.mp4 | 21.8 MB |
| 1. IT Security Trends/14. Fake identity.vtt | 4.9 KB |
| 1. IT Security Trends/15. Online privacy.mp4 | 32 MB |
| 1. IT Security Trends/15. Online privacy.vtt | 5.9 KB |
| 1. IT Security Trends/16. Analyzing sniffing software.mp4 | 19.5 MB |
| 1. IT Security Trends/16. Analyzing sniffing software.vtt | 3.3 KB |
| 1. IT Security Trends/17. Cyber War.mp4 | 45.4 MB |
| 1. IT Security Trends/17. Cyber War.vtt | 7.7 KB |
| 1. IT Security Trends/18. Changing IT Security Trends - notes for the examination.pdf | 2 MB |
| 1. IT Security Trends/19. Objective #1 - Data security - Introduction.mp4 | 38.8 MB |
| 1. IT Security Trends/19. Objective #1 - Data security - Introduction.vtt | 6.4 KB |
| 1. IT Security Trends/2. IT Prehistory.mp4 | 25.8 MB |
| 1. IT Security Trends/2. IT Prehistory.vtt | 5 KB |
| 1. IT Security Trends/20. Confidentiality of data.mp4 | 31.7 MB |
| 1. IT Security Trends/20. Confidentiality of data.vtt | 4.9 KB |
| 1. IT Security Trends/21. EXERCISE Finding confidential data with search engines.mp4 | 23.5 MB |
| 1. IT Security Trends/21. EXERCISE Finding confidential data with search engines.vtt | 5.2 KB |
| 1. IT Security Trends/22. Integrity of data.mp4 | 32.1 MB |
| 1. IT Security Trends/22. Integrity of data.vtt | 6.2 KB |
| 1. IT Security Trends/23. Data security - notes for the examination.pdf | 2 MB |
| 1. IT Security Trends/3. Let’s look a few years back.mp4 | 23.6 MB |
| 1. IT Security Trends/3. Let’s look a few years back.vtt | 5.3 KB |
| 1. IT Security Trends/4. Cyber crimes - an evolution not revolution.mp4 | 21.3 MB |
| 1. IT Security Trends/4. Cyber crimes - an evolution not revolution.vtt | 5.1 KB |
| 1. IT Security Trends/5. Current Cyber Threats - notes for the examination.pdf | 1.5 MB |
| 1. IT Security Trends/6. Popular myths about IT security - origins.mp4 | 27.9 MB |
| 1. IT Security Trends/6. Popular myths about IT security - origins.vtt | 5.6 KB |
| 1. IT Security Trends/7. Myths #1 - you’ll never be hacked.mp4 | 29.2 MB |
| 1. IT Security Trends/7. Myths #1 - you’ll never be hacked.vtt | 6 KB |
| 1. IT Security Trends/8. Myths #2 - you don’t need any protection software or hardware.mp4 | 25.8 MB |
| 1. IT Security Trends/8. Myths #2 - you don’t need any protection software or hardware.vtt | 5.5 KB |
| 1. IT Security Trends/9. Myths #3 - IT security is always a priority.mp4 | 6 MB |
| 1. IT Security Trends/9. Myths #3 - IT security is always a priority.vtt | 1.1 KB |
| 10. Risk Management/1. Introduction to Risk Management.mp4 | 3.9 MB |
| 10. Risk Management/1. Introduction to Risk Management.vtt | 1.4 KB |
| 10. Risk Management/10. DREAD Exploitability.mp4 | 13.9 MB |
| 10. Risk Management/10. DREAD Exploitability.vtt | 5.2 KB |
| 10. Risk Management/11. EXERCISE Risk Assessment.mp4 | 18.1 MB |
| 10. Risk Management/11. EXERCISE Risk Assessment.vtt | 7.2 KB |
| 10. Risk Management/12. Risk Assessment - notes for the examination.html | 10 B |
| 10. Risk Management/12.1 03-2-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf | 1.8 MB |
| 10. Risk Management/13. Introduction to Social Engineering and rogue software.mp4 | 11.4 MB |
| 10. Risk Management/13. Introduction to Social Engineering and rogue software.vtt | 4.1 KB |
| 10. Risk Management/14. Manipulation tactics.mp4 | 22.2 MB |
| 10. Risk Management/14. Manipulation tactics.vtt | 9.2 KB |
| 10. Risk Management/15. EXERCISE Social Engineering attacks.mp4 | 19 MB |
| 10. Risk Management/15. EXERCISE Social Engineering attacks.vtt | 6 KB |
| 10. Risk Management/16. SE with KALI BackTrack.mp4 | 16.2 MB |
| 10. Risk Management/16. SE with KALI BackTrack.vtt | 6.4 KB |
| 10. Risk Management/17. Rogue Software.mp4 | 7.4 MB |
| 10. Risk Management/17. Rogue Software.vtt | 2.4 KB |
| 10. Risk Management/18. Fraud tools #1.mp4 | 20 MB |
| 10. Risk Management/18. Fraud tools #1.vtt | 6.4 KB |
| 10. Risk Management/19. Fraud tools #2.mp4 | 17.7 MB |
| 10. Risk Management/19. Fraud tools #2.vtt | 6.3 KB |
| 10. Risk Management/2. Attack methods.mp4 | 17.3 MB |
| 10. Risk Management/2. Attack methods.vtt | 6.6 KB |
| 10. Risk Management/20. Social Engineering and Rogue Software - notes for the examination.html | 10 B |
| 10. Risk Management/20.1 03-3-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf | 2.9 MB |
| 10. Risk Management/3. Local attacks.mp4 | 7.9 MB |
| 10. Risk Management/3. Local attacks.vtt | 2.9 KB |
| 10. Risk Management/4. Target scanning and enumeration techniques #1.mp4 | 15.8 MB |
| 10. Risk Management/4. Target scanning and enumeration techniques #1.vtt | 5.5 KB |
| 10. Risk Management/5. Target scanning and enumeration techniques #2.mp4 | 8.4 MB |
| 10. Risk Management/5. Target scanning and enumeration techniques #2.vtt | 3.3 KB |
| 10. Risk Management/6. Passive scanning.mp4 | 7.1 MB |
| 10. Risk Management/6. Passive scanning.vtt | 1.8 KB |
| 10. Risk Management/7. Attack Methodologies - notes for the examination.html | 10 B |
| 10. Risk Management/7.1 03-1-CISS-Ethical-Hacking-Training-2.0-by-www.SecAcademy.com.pdf.pdf | 1.6 MB |
| 10. Risk Management/8. Introduction to risk assessment.mp4 | 18.1 MB |
| 10. Risk Management/8. Introduction to risk assessment.vtt | 6.3 KB |
| 10. Risk Management/9. DREAD Risk assessment model.mp4 | 12.7 MB |
| 10. Risk Management/9. DREAD Risk assessment model.vtt | 4.6 KB |
| 11. Defence in Depth/1. Introduction to Defence in Depth.mp4 | 4.5 MB |
| 11. Defence in Depth/1. Introduction to Defence in Depth.vtt | 1.5 KB |
| 11. Defence in Depth/10. Law #2.mp4 | 7.6 MB |
| 11. Defence in Depth/10. Law #2.vtt | 2.8 KB |
| 11. Defence in Depth/11. Law #3.mp4 | 5.9 MB |
| 11. Defence in Depth/11. Law #3.vtt | 2.2 KB |
| 11. Defence in Depth/12. Law #4.mp4 | 6 MB |
| 11. Defence in Depth/12. Law #4.vtt | 1.8 KB |
| 11. Defence in Depth/13. Law #5.mp4 | 8.8 MB |
| 11. Defence in Depth/13. Law #5.vtt | 3.1 KB |
| 11. Defence in Depth/14. Law #6.mp4 | 5.8 MB |
| 11. Defence in Depth/14. Law #6.vtt | 2.1 KB |
| 11. Defence in Depth/15. Law #7.mp4 | 2.9 MB |
| 11. Defence in Depth/15. Law #7.vtt | 1.2 KB |
| 11. Defence in Depth/16. Law #8.mp4 | 4.6 MB |
| 11. Defence in Depth/16. Law #8.vtt | 1.5 KB |
| 11. Defence in Depth/17. Law #9.mp4 | 9.2 MB |