ZeroToMastery - Cybersecurity for Beginners (4.2025)
File List
- 3. Social Engineering, Phishing, and Prevention/1. Email Phishing.mp4 77.7 MB
- 3. Social Engineering, Phishing, and Prevention/3. Vishing.mp4 53.6 MB
- 6. Policies/3. Onboarding & Offboarding.mp4 42.2 MB
- 6. Policies/5. Employee Responsibility & Remote Work Security.mp4 41.0 MB
- 6. Policies/2. Password Policies.mp4 37.0 MB
- 10. Additional Things To Keep You Safe!/1. Physical Security.mp4 36.8 MB
- 4. Malware/1. Most Common Malwares.mp4 35.8 MB
- 3. Social Engineering, Phishing, and Prevention/2. Smishing.mp4 34.9 MB
- 6. Policies/1. Security Policies.mp4 34.6 MB
- 6. Policies/4. BYOD.mp4 33.6 MB
- 2. Introduction to Cybersecurity/1. The CIA Triangle & Why Cybersecurity Is Important.mp4 32.3 MB
- 2. Introduction to Cybersecurity/2. How People Get Hacked.mp4 31.7 MB
- 5. Endpoint Device Protection/2. MacOS Protection.mp4 30.9 MB
- 9. Data Handling/3. Data Privacy Regulations (GDPR, CCPA, HIPPA).mp4 30.3 MB
- 3. Social Engineering, Phishing, and Prevention/5. Social Engineering Awareness Training.mp4 28.4 MB
- 7. Web Browsing Security/2. Best Browser Settings.mp4 27.7 MB
- 3. Social Engineering, Phishing, and Prevention/4. Online Privacy.mp4 27.2 MB
- 8. Securing Online Accounts/1. Password Management.mp4 25.9 MB
- 5. Endpoint Device Protection/1. Windows Device Protection.mp4 25.7 MB
- 6. Policies/6. Reporting Procedures.mp4 25.6 MB
- 5. Endpoint Device Protection/3. Smartphone Protection.mp4 25.4 MB
- 10. Additional Things To Keep You Safe!/2. Finding Out About Emerging Threats & Vulnerabilities.mp4 24.7 MB
- 7. Web Browsing Security/1. Choosing The Best Browser.mp4 24.2 MB
- 7. Web Browsing Security/4. The Dangers of Clicking on Links! (Beef Framework).mp4 21.1 MB
- 8. Securing Online Accounts/2. 2FA.mp4 19.9 MB
- 9. Data Handling/1. Storing Data Securely.mp4 19.2 MB
- 4. Malware/3. How To Recognize Malware.mp4 18.6 MB
- 4. Malware/2. Protection Against Malware.mp4 18.0 MB
- 7. Web Browsing Security/3. How To Securely Download.mp4 16.2 MB
- 1. Introduction/1. Introduction.mp4 14.1 MB
- 9. Data Handling/2. Transferring Data Securely.mp4 13.9 MB
- 11. Where To Go From Here/1. Review This Byte!.html 32.0 KB
- 3. Social Engineering, Phishing, and Prevention/1. Email Phishing.srt 25.5 KB
- 3. Social Engineering, Phishing, and Prevention/3. Vishing.srt 23.9 KB
- 6. Policies/5. Employee Responsibility & Remote Work Security.srt 18.2 KB
- 8. Securing Online Accounts/1. Password Management.srt 14.1 KB
- 6. Policies/2. Password Policies.srt 14.1 KB
- 6. Policies/3. Onboarding & Offboarding.srt 13.7 KB
- 3. Social Engineering, Phishing, and Prevention/2. Smishing.srt 13.2 KB
- 7. Web Browsing Security/2. Best Browser Settings.srt 12.9 KB
- 5. Endpoint Device Protection/1. Windows Device Protection.srt 12.1 KB
- 5. Endpoint Device Protection/2. MacOS Protection.srt 12.0 KB
- 4. Malware/1. Most Common Malwares.srt 11.7 KB
- 6. Policies/4. BYOD.srt 11.2 KB
- 6. Policies/1. Security Policies.srt 10.5 KB
- 6. Policies/6. Reporting Procedures.srt 10.2 KB
- 2. Introduction to Cybersecurity/1. The CIA Triangle & Why Cybersecurity Is Important.srt 10.2 KB
- 2. Introduction to Cybersecurity/2. How People Get Hacked.srt 10.0 KB
- 7. Web Browsing Security/4. The Dangers of Clicking on Links! (Beef Framework).srt 9.5 KB
- 3. Social Engineering, Phishing, and Prevention/5. Social Engineering Awareness Training.srt 8.4 KB
- 9. Data Handling/3. Data Privacy Regulations (GDPR, CCPA, HIPPA).srt 8.1 KB
- 5. Endpoint Device Protection/3. Smartphone Protection.srt 7.6 KB
- 10. Additional Things To Keep You Safe!/2. Finding Out About Emerging Threats & Vulnerabilities.srt 7.4 KB
- 7. Web Browsing Security/1. Choosing The Best Browser.srt 7.3 KB
- 10. Additional Things To Keep You Safe!/1. Physical Security.srt 7.3 KB
- 8. Securing Online Accounts/2. 2FA.srt 6.9 KB
- 9. Data Handling/1. Storing Data Securely.srt 6.6 KB
- 4. Malware/3. How To Recognize Malware.srt 6.5 KB
- 4. Malware/2. Protection Against Malware.srt 6.2 KB
- 7. Web Browsing Security/3. How To Securely Download.srt 5.6 KB
- 3. Social Engineering, Phishing, and Prevention/4. Online Privacy.srt 5.2 KB
- 9. Data Handling/2. Transferring Data Securely.srt 4.5 KB
- 1. Introduction/1. Introduction.srt 3.3 KB
- 1. Introduction/2. Exercise Meet Your Classmates and Instructor.html 3.3 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.