FILENAME | SIZE |  | 1. IT Security Trends/1. Introduction to Current Cyber Threats.mp4 | 39 MB |
 | 1. IT Security Trends/1. Introduction to Current Cyber Threats.srt | 6.1 KB |
 | 1. IT Security Trends/1. Introduction to Current Cyber Threats.vtt | 5.3 KB |
 | 1. IT Security Trends/10. Popular Myths About Computer System Security - notes for the examination.pdf | 988.5 KB |
 | 1. IT Security Trends/11. Trends in IT Security.mp4 | 18.7 MB |
 | 1. IT Security Trends/11. Trends in IT Security.srt | 4.2 KB |
 | 1. IT Security Trends/11. Trends in IT Security.vtt | 3.7 KB |
 | 1. IT Security Trends/12. The birth of technology society.mp4 | 18.6 MB |
 | 1. IT Security Trends/12. The birth of technology society.srt | 3.4 KB |
 | 1. IT Security Trends/12. The birth of technology society.vtt | 3.1 KB |
 | 1. IT Security Trends/13. EXERCISE How much info can you gather.mp4 | 13.8 MB |
 | 1. IT Security Trends/13. EXERCISE How much info can you gather.srt | 4.2 KB |
 | 1. IT Security Trends/13. EXERCISE How much info can you gather.vtt | 3.7 KB |
 | 1. IT Security Trends/14. Fake identity.mp4 | 21.8 MB |
 | 1. IT Security Trends/14. Fake identity.srt | 5.6 KB |
 | 1. IT Security Trends/14. Fake identity.vtt | 4.9 KB |
 | 1. IT Security Trends/15. Online privacy.mp4 | 32 MB |
 | 1. IT Security Trends/15. Online privacy.srt | 6.7 KB |
 | 1. IT Security Trends/15. Online privacy.vtt | 5.9 KB |
 | 1. IT Security Trends/16. Analyzing sniffing software.mp4 | 19.5 MB |
 | 1. IT Security Trends/16. Analyzing sniffing software.srt | 3.7 KB |
 | 1. IT Security Trends/16. Analyzing sniffing software.vtt | 3.3 KB |
 | 1. IT Security Trends/17. Cyber War.mp4 | 45.4 MB |
 | 1. IT Security Trends/17. Cyber War.srt | 8.8 KB |
 | 1. IT Security Trends/17. Cyber War.vtt | 7.7 KB |
 | 1. IT Security Trends/18. Changing IT Security Trends - notes for the examination.pdf | 2 MB |
 | 1. IT Security Trends/19. Objective #1 - Data security - Introduction.mp4 | 38.8 MB |
 | 1. IT Security Trends/19. Objective #1 - Data security - Introduction.srt | 7.3 KB |
 | 1. IT Security Trends/19. Objective #1 - Data security - Introduction.vtt | 6.4 KB |
 | 1. IT Security Trends/2. IT Prehistory.mp4 | 44.2 MB |
 | 1. IT Security Trends/2. IT Prehistory.srt | 5.7 KB |
 | 1. IT Security Trends/2. IT Prehistory.vtt | 5 KB |
 | 1. IT Security Trends/20. Confidentiality of data.mp4 | 31.7 MB |
 | 1. IT Security Trends/20. Confidentiality of data.srt | 5.6 KB |
 | 1. IT Security Trends/20. Confidentiality of data.vtt | 4.9 KB |
 | 1. IT Security Trends/21. EXERCISE Finding confidential data with search engines.mp4 | 23.5 MB |
 | 1. IT Security Trends/21. EXERCISE Finding confidential data with search engines.srt | 6 KB |
 | 1. IT Security Trends/21. EXERCISE Finding confidential data with search engines.vtt | 5.2 KB |
 | 1. IT Security Trends/22. Integrity of data.mp4 | 32.1 MB |
 | 1. IT Security Trends/22. Integrity of data.srt | 7 KB |
 | 1. IT Security Trends/22. Integrity of data.vtt | 6.2 KB |
 | 1. IT Security Trends/23. Data security - notes for the examination.pdf | 2 MB |
 | 1. IT Security Trends/3. Let’s look a few years back.mp4 | 36 MB |
 | 1. IT Security Trends/3. Let’s look a few years back.srt | 6 KB |
 | 1. IT Security Trends/3. Let’s look a few years back.vtt | 5.3 KB |
 | 1. IT Security Trends/4. Cyber crimes - an evolution not revolution.mp4 | 30.8 MB |
 | 1. IT Security Trends/4. Cyber crimes - an evolution not revolution.srt | 5.8 KB |
 | 1. IT Security Trends/4. Cyber crimes - an evolution not revolution.vtt | 5.1 KB |
 | 1. IT Security Trends/5. Current Cyber Threats - notes for the examination.pdf | 1.5 MB |
 | 1. IT Security Trends/6. Popular myths about IT security - origins.mp4 | 44.2 MB |
 | 1. IT Security Trends/6. Popular myths about IT security - origins.srt | 6.4 KB |
 | 1. IT Security Trends/6. Popular myths about IT security - origins.vtt | 5.6 KB |
 | 1. IT Security Trends/7. Myths #1 - you’ll never be hacked.mp4 | 29.2 MB |
 | 1. IT Security Trends/7. Myths #1 - you’ll never be hacked.srt | 6.9 KB |
 | 1. IT Security Trends/7. Myths #1 - you’ll never be hacked.vtt | 6 KB |
 | 1. IT Security Trends/8. Myths #2 - you don’t need any protection software or hardware.mp4 | 25.8 MB |
 | 1. IT Security Trends/8. Myths #2 - you don’t need any protection software or hardware.srt | 6.3 KB |
 | 1. IT Security Trends/8. Myths #2 - you don’t need any protection software or hardware.vtt | 5.5 KB |
 | 1. IT Security Trends/9. Myths #3 - IT security is always a priority.mp4 | 6 MB |
 | 1. IT Security Trends/9. Myths #3 - IT security is always a priority.srt | 1.3 KB |
 | 1. IT Security Trends/9. Myths #3 - IT security is always a priority.vtt | 1.1 KB |
 | 2. Computer Network Security/1. Network security - introduction.mp4 | 34.5 MB |
 | 2. Computer Network Security/1. Network security - introduction.srt | 6.3 KB |
 | 2. Computer Network Security/1. Network security - introduction.vtt | 5.6 KB |
 | 2. Computer Network Security/10. OSI MODEL #4 - Transport Layer.mp4 | 28.6 MB |
 | 2. Computer Network Security/10. OSI MODEL #4 - Transport Layer.srt | 6.3 KB |
 | 2. Computer Network Security/10. OSI MODEL #4 - Transport Layer.vtt | 5.6 KB |
 | 2. Computer Network Security/11. Threats Enumerating Remote Computers.mp4 | 16.8 MB |
 | 2. Computer Network Security/11. Threats Enumerating Remote Computers.srt | 4 KB |
 | 2. Computer Network Security/11. Threats Enumerating Remote Computers.vtt | 3.6 KB |
 | 2. Computer Network Security/12. EXERCISE Transport Layer Attack using METASPLOIT part 1.mp4 | 12.8 MB |
 | 2. Computer Network Security/12. EXERCISE Transport Layer Attack using METASPLOIT part 1.srt | 5.9 KB |
 | 2. Computer Network Security/12. EXERCISE Transport Layer Attack using METASPLOIT part 1.vtt | 5.2 KB |
 | 2. Computer Network Security/13. EXERCISE Transport Layer Attack using METASPLOIT part 2.mp4 | 26.1 MB |
 | 2. Computer Network Security/13. EXERCISE Transport Layer Attack using METASPLOIT part 2.srt | 5.7 KB |
 | 2. Computer Network Security/2. OSI MODEL #1 - Physical layer.mp4 | 29 MB |
 | 2. Computer Network Security/2. OSI MODEL #1 - Physical layer.srt | 6.4 KB |
 | 2. Computer Network Security/2. OSI MODEL #1 - Physical layer.vtt | 5.7 KB |
 | 2. Computer Network Security/3. OSI MODEL #2 - Data link layer.mp4 | 22.8 MB |
 | 2. Computer Network Security/3. OSI MODEL #2 - Data link layer.srt | 5.3 KB |
 | 2. Computer Network Security/3. OSI MODEL #2 - Data link layer.vtt | 4.6 KB |
 | 2. Computer Network Security/4. Threats MAC spoofing.mp4 | 27.5 MB |
 | 2. Computer Network Security/4. Threats MAC spoofing.srt | 6.6 KB |
 | 2. Computer Network Security/4. Threats MAC spoofing.vtt | 5.8 KB |
 | 2. Computer Network Security/5. Threats ARP Poisoning.mp4 | 31.3 MB |
 | 2. Computer Network Security/5. Threats ARP Poisoning.srt | 7.6 KB |
 | 2. Computer Network Security/5. Threats ARP Poisoning.vtt | 6.7 KB |
 | 2. Computer Network Security/6. EXERCISE Data Link Layer Attack.mp4 | 35.3 MB |
 | 2. Computer Network Security/6. EXERCISE Data Link Layer Attack.srt | 8 KB |
 | 2. Computer Network Security/6. EXERCISE Data Link Layer Attack.vtt | 7 KB |
 | 2. Computer Network Security/7. OSI MODEL #3 - Network layer.mp4 | 31.7 MB |
 | 2. Computer Network Security/7. OSI MODEL #3 - Network layer.srt | 7.2 KB |
 | 2. Computer Network Security/7. OSI MODEL #3 - Network layer.vtt | 6.3 KB |
 | 2. Computer Network Security/8. TCP Tunnelling over ICMP.mp4 | 35 MB |
 | 2. Computer Network Security/8. TCP Tunnelling over ICMP.srt | 7.7 KB |
 | 2. Computer Network Security/8. TCP Tunnelling over ICMP.vtt | 6.8 KB |
 | 2. Computer Network Security/9. Network Protocols - notes for the examination.pdf | 2.2 MB |
 | 6. Operating Systems Security/1. Operating systems security - introduction.mp4 | 110.6 MB |