ZeroToMastery - Cybersecurity for Beginners (4.2025)
    
    File List
    
        
            
                
                    - 3. Social Engineering, Phishing, and Prevention/1. Email Phishing.mp4  77.7 MB
- 3. Social Engineering, Phishing, and Prevention/3. Vishing.mp4  53.6 MB
- 6. Policies/3. Onboarding & Offboarding.mp4  42.2 MB
- 6. Policies/5. Employee Responsibility & Remote Work Security.mp4  41.0 MB
- 6. Policies/2. Password Policies.mp4  37.0 MB
- 10. Additional Things To Keep You Safe!/1. Physical Security.mp4  36.8 MB
- 4. Malware/1. Most Common Malwares.mp4  35.8 MB
- 3. Social Engineering, Phishing, and Prevention/2. Smishing.mp4  34.9 MB
- 6. Policies/1. Security Policies.mp4  34.6 MB
- 6. Policies/4. BYOD.mp4  33.6 MB
- 2. Introduction to Cybersecurity/1. The CIA Triangle & Why Cybersecurity Is Important.mp4  32.3 MB
- 2. Introduction to Cybersecurity/2. How People Get Hacked.mp4  31.7 MB
- 5. Endpoint Device Protection/2. MacOS Protection.mp4  30.9 MB
- 9. Data Handling/3. Data Privacy Regulations (GDPR, CCPA, HIPPA).mp4  30.3 MB
- 3. Social Engineering, Phishing, and Prevention/5. Social Engineering Awareness Training.mp4  28.4 MB
- 7. Web Browsing Security/2. Best Browser Settings.mp4  27.7 MB
- 3. Social Engineering, Phishing, and Prevention/4. Online Privacy.mp4  27.2 MB
- 8. Securing Online Accounts/1. Password Management.mp4  25.9 MB
- 5. Endpoint Device Protection/1. Windows Device Protection.mp4  25.7 MB
- 6. Policies/6. Reporting Procedures.mp4  25.6 MB
- 5. Endpoint Device Protection/3. Smartphone Protection.mp4  25.4 MB
- 10. Additional Things To Keep You Safe!/2. Finding Out About Emerging Threats & Vulnerabilities.mp4  24.7 MB
- 7. Web Browsing Security/1. Choosing The Best Browser.mp4  24.2 MB
- 7. Web Browsing Security/4. The Dangers of Clicking on Links! (Beef Framework).mp4  21.1 MB
- 8. Securing Online Accounts/2. 2FA.mp4  19.9 MB
- 9. Data Handling/1. Storing Data Securely.mp4  19.2 MB
- 4. Malware/3. How To Recognize Malware.mp4  18.6 MB
- 4. Malware/2. Protection Against Malware.mp4  18.0 MB
- 7. Web Browsing Security/3. How To Securely Download.mp4  16.2 MB
- 1. Introduction/1. Introduction.mp4  14.1 MB
- 9. Data Handling/2. Transferring Data Securely.mp4  13.9 MB
- 11. Where To Go From Here/1. Review This Byte!.html  32.0 KB
- 3. Social Engineering, Phishing, and Prevention/1. Email Phishing.srt  25.5 KB
- 3. Social Engineering, Phishing, and Prevention/3. Vishing.srt  23.9 KB
- 6. Policies/5. Employee Responsibility & Remote Work Security.srt  18.2 KB
- 8. Securing Online Accounts/1. Password Management.srt  14.1 KB
- 6. Policies/2. Password Policies.srt  14.1 KB
- 6. Policies/3. Onboarding & Offboarding.srt  13.7 KB
- 3. Social Engineering, Phishing, and Prevention/2. Smishing.srt  13.2 KB
- 7. Web Browsing Security/2. Best Browser Settings.srt  12.9 KB
- 5. Endpoint Device Protection/1. Windows Device Protection.srt  12.1 KB
- 5. Endpoint Device Protection/2. MacOS Protection.srt  12.0 KB
- 4. Malware/1. Most Common Malwares.srt  11.7 KB
- 6. Policies/4. BYOD.srt  11.2 KB
- 6. Policies/1. Security Policies.srt  10.5 KB
- 6. Policies/6. Reporting Procedures.srt  10.2 KB
- 2. Introduction to Cybersecurity/1. The CIA Triangle & Why Cybersecurity Is Important.srt  10.2 KB
- 2. Introduction to Cybersecurity/2. How People Get Hacked.srt  10.0 KB
- 7. Web Browsing Security/4. The Dangers of Clicking on Links! (Beef Framework).srt  9.5 KB
- 3. Social Engineering, Phishing, and Prevention/5. Social Engineering Awareness Training.srt  8.4 KB
- 9. Data Handling/3. Data Privacy Regulations (GDPR, CCPA, HIPPA).srt  8.1 KB
- 5. Endpoint Device Protection/3. Smartphone Protection.srt  7.6 KB
- 10. Additional Things To Keep You Safe!/2. Finding Out About Emerging Threats & Vulnerabilities.srt  7.4 KB
- 7. Web Browsing Security/1. Choosing The Best Browser.srt  7.3 KB
- 10. Additional Things To Keep You Safe!/1. Physical Security.srt  7.3 KB
- 8. Securing Online Accounts/2. 2FA.srt  6.9 KB
- 9. Data Handling/1. Storing Data Securely.srt  6.6 KB
- 4. Malware/3. How To Recognize Malware.srt  6.5 KB
- 4. Malware/2. Protection Against Malware.srt  6.2 KB
- 7. Web Browsing Security/3. How To Securely Download.srt  5.6 KB
- 3. Social Engineering, Phishing, and Prevention/4. Online Privacy.srt  5.2 KB
- 9. Data Handling/2. Transferring Data Securely.srt  4.5 KB
- 1. Introduction/1. Introduction.srt  3.3 KB
- 1. Introduction/2. Exercise Meet Your Classmates and Instructor.html  3.3 KB
 
    Download Torrent
    
    Related Resources
    
    Copyright Infringement
    
        If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.