~Get Your Files Here !/1. Introduction/1. Introduction.mp4107.66MB
~Get Your Files Here !/1. Introduction/1.1 Cyber Security (1)pr (2).mp424.14MB
~Get Your Files Here !/1. Introduction/10.1 Cyber Security Analysis.mp418.07MB
~Get Your Files Here !/1. Introduction/11. Cyber Security Perspectives.mp474.4MB
~Get Your Files Here !/1. Introduction/12. The Importance of Cyber Security.mp423.42MB
~Get Your Files Here !/1. Introduction/13. Implications of Cyber Security.mp448MB
~Get Your Files Here !/1. Introduction/2. Introduction.mp48.85MB
~Get Your Files Here !/1. Introduction/2.1 Cyber Security Concepts.mp420.5MB
~Get Your Files Here !/1. Introduction/3. Cyber Security Fundamentals.mp474.44MB
~Get Your Files Here !/1. Introduction/4. Cyber Security Principles.mp443.68MB
~Get Your Files Here !/1. Introduction/5. Cyber Security Concepts.mp460.23MB
~Get Your Files Here !/1. Introduction/6. Cyber Security Theories.mp464.71MB
~Get Your Files Here !/1. Introduction/6.1 Cyber Security Theor.mp421.87MB
~Get Your Files Here !/1. Introduction/9.1 CYBER SECURITY ESSEN.mp416.67MB
~Get Your Files Here !/10. Stakeholder Analysis in Cyber Security/1. The Various Stakeholders in the Cyber Ecosystem.mp436.24MB
~Get Your Files Here !/10. Stakeholder Analysis in Cyber Security/2. The role and importance of the stakeholders.mp436.23MB
~Get Your Files Here !/11. The Cyber Security Landscape (environment)/1. The cyber security environment.mp447.25MB
~Get Your Files Here !/11. The Cyber Security Landscape (environment)/1.2 Cyber Security Landscape.mp412.76MB
~Get Your Files Here !/12. Cyber Security Interventions/1. Intervention Strategies to deal with Cyber Threats.mp434.32MB
~Get Your Files Here !/12. Cyber Security Interventions/1.1 Protecting Digital Assets from Cyber Attacks.mp49.86MB
~Get Your Files Here !/13. Protecting your Digital Assets/1. Cyber Security Strategy.mp434.3MB
~Get Your Files Here !/14. Cyber Threat Landscape/1. Landscape of Cyber Threat.mp447.22MB
~Get Your Files Here !/14. Cyber Threat Landscape/2. Common Types of Cyber Threat and their Impact.mp446.14MB
~Get Your Files Here !/15. Network Security Fundamentals/1. Essential Principles of Securing Networks.mp443.6MB
~Get Your Files Here !/15. Network Security Fundamentals/2.1 Cyber Security (1)pr.mp420.46MB
~Get Your Files Here !/16. Web Application Security/1. Best Practices for Securing Web Applications.mp443.65MB
~Get Your Files Here !/16. Web Application Security/2. Common Vulnerabilities and Mitigation Strategies.mp446.79MB
~Get Your Files Here !/18. Mobile Security/1. Specific Security Considerations for Mobile Devices.mp445.75MB
~Get Your Files Here !/18. Mobile Security/1.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp411.81MB
~Get Your Files Here !/18. Mobile Security/2. Specific security considerations for mobile applications and mobile devices.mp434.33MB
~Get Your Files Here !/18. Mobile Security/2.1 Protecting Digital Assets from Cyber Attacks.mp49.86MB
~Get Your Files Here !/18. Mobile Security/3.1 Protecting Digital Assets from Cyber Attacks.mp49.86MB
~Get Your Files Here !/18. Mobile Security/4. Secure App Development.mp443.61MB
~Get Your Files Here !/18. Mobile Security/4.1 Cyber Security Polic(1).mp413.98MB
~Get Your Files Here !/19. IoT Security/2. IoT Associated Risks.mp446.15MB
~Get Your Files Here !/19. IoT Security/2.1 Cyber Security Risks.mp418.31MB
~Get Your Files Here !/19. IoT Security/3. How to Mitigate IoT Associated Risks.mp434.32MB
~Get Your Files Here !/2. Cyber Security Ecosystem/1. Cyber Security as an Ecosystem.mp454.66MB
~Get Your Files Here !/2. Cyber Security Ecosystem/1.1 Cyber Security Ecosy(2).mp413.87MB
~Get Your Files Here !/2. Cyber Security Ecosystem/2. How the Cyber Security Ecosystem Works.mp454.66MB
~Get Your Files Here !/2. Cyber Security Ecosystem/3. Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp446.81MB
~Get Your Files Here !/2. Cyber Security Ecosystem/3.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp411.81MB
~Get Your Files Here !/2. Cyber Security Ecosystem/4. Types of Risks in the Cyber Ecosystem.mp446.12MB
~Get Your Files Here !/2. Cyber Security Ecosystem/4.3 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp411.81MB
~Get Your Files Here !/20. Social Engineering and Phishing/1.1 Cyber Security Risks.mp418.31MB
~Get Your Files Here !/20. Social Engineering and Phishing/3. Effective Strategies for recognizing and preventing phishing attempts.mp434.33MB
~Get Your Files Here !/20. Social Engineering and Phishing/3.1 Protecting Digital Assets from Cyber Attacks.mp49.85MB
~Get Your Files Here !/21. Incidence Response and Management/1. Essential steps for responding to cyber security incidents.mp434.34MB
~Get Your Files Here !/21. Incidence Response and Management/2. Essential steps for managing cyber securing incidents.mp443.62MB
~Get Your Files Here !/21. Incidence Response and Management/2.1 Protecting Digital Assets from Cyber Attacks.mp49.86MB
~Get Your Files Here !/21. Incidence Response and Management/3. Best practices for responding to cyber security incidents.mp446.63MB
~Get Your Files Here !/21. Incidence Response and Management/4. Best practices for managing cyber security incidents.mp446.8MB
~Get Your Files Here !/21. Incidence Response and Management/4.1 Protecting Digital Assets from Cyber Attacks.mp49.86MB
~Get Your Files Here !/23. Cyber Security Compliance and Regulations/1. Cyber Security Compliance Standards that organisations must adhere to.mp443.63MB
~Get Your Files Here !/23. Cyber Security Compliance and Regulations/2. Cyber Security Regulation Standards that organisations must adhere to.mp443.65MB
~Get Your Files Here !/24. Cyber Security Risk Assessment/1. The process of identifying cyber security risks.mp446.11MB
~Get Your Files Here !/24. Cyber Security Risk Assessment/2.1 Cyber Security Risks.mp418.3MB
~Get Your Files Here !/24. Cyber Security Risk Assessment/3. Mitigating Cyber Security Risks.mp452.39MB
~Get Your Files Here !/24. Cyber Security Risk Assessment/3.1 Protecting Digital Assets from Cyber Attacks.mp49.86MB
~Get Your Files Here !/25. Security Operations and Monitoring/1. The principles of secure software development.mp443.69MB
~Get Your Files Here !/26. Ethical Hacking and Penetration Testing/1.1 Cyber Security Polic(1) (2).mp413.98MB
~Get Your Files Here !/26. Ethical Hacking and Penetration Testing/2.1 Cyber Security Polic(1).mp413.98MB
~Get Your Files Here !/26. Ethical Hacking and Penetration Testing/3.1 Cyber Security Polic(1).mp413.97MB
~Get Your Files Here !/26. Ethical Hacking and Penetration Testing/4.1 Cyber Security Polic(1) (1).mp413.98MB
~Get Your Files Here !/27. Cyber Security for Small Businesses/2.1 Protecting Digital Assets from Cyber Attacks.mp49.86MB
~Get Your Files Here !/27. Cyber Security for Small Businesses/3.1 Cyber Security Polic(1).mp413.97MB
~Get Your Files Here !/3. Understanding Cyber Security - An Critical Overview/1. A critical overview of cyber security.mp463.47MB
~Get Your Files Here !/3. Understanding Cyber Security - An Critical Overview/2. A holistic view of cyber security.mp445.75MB
~Get Your Files Here !/3. Understanding Cyber Security - An Critical Overview/2.1 Cyber Security Landscape.mp412.75MB
~Get Your Files Here !/34. Cyber security for autonomous vehicle/1.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp411.8MB
~Get Your Files Here !/34. Cyber security for autonomous vehicle/2.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp411.81MB
~Get Your Files Here !/35. Cyber Security for the Supply Chain/1.1 IMPORTANCE OF CYBER (1).mp47.86MB
~Get Your Files Here !/36. Cyber Security for AI and Machine Learning/4.2 THE IMPLICATIONS OF (2).mp418MB
~Get Your Files Here !/37. Cyber security for 5G Networks/2.1 Protecting Digital Assets from Cyber Attacks.mp49.86MB
~Get Your Files Here !/4. Causes, Consequence and prevention of Cyber criminality/1. Causes, Consequences and prevention of Cyber Criminality.mp446.62MB
~Get Your Files Here !/4. Causes, Consequence and prevention of Cyber criminality/1.1 Causes, Consequences and Prevention of Cyber Criminality.mp411.83MB
~Get Your Files Here !/40. Cyber Security Virtualization and Containerization/4.1 Fundamental Principles of Cyber Security.mp412.02MB
~Get Your Files Here !/40. Cyber Security Virtualization and Containerization/5.1 Protecting Digital Assets from Cyber Attacks.mp49.85MB
~Get Your Files Here !/40. Cyber Security Virtualization and Containerization/6.1 Protecting Digital Assets from Cyber Attacks.mp49.86MB
~Get Your Files Here !/41. Cyber security for Quantum Computing/2.1 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp411.81MB
~Get Your Files Here !/42. Cyber security for election systems/1.1 Protecting Digital Assets from Cyber Attacks.mp49.86MB
~Get Your Files Here !/42. Cyber security for election systems/3.1 Protecting Digital Assets from Cyber Attacks.mp49.86MB
~Get Your Files Here !/43. Cyber security for wearable technology/3.1 THE IMPLICATIONS OF (2).mp417.99MB
~Get Your Files Here !/46. Cyber security for DevOps/1.1 Protecting Digital Assets from Cyber Attacks.mp49.86MB
~Get Your Files Here !/48. Cyber security for Smart Grids/2.3 SG17.avif50.76KB
~Get Your Files Here !/5. Cyber Security Tools, functions, and implications/1. Cyber Security Tools, functions and implications.mp442.09MB
~Get Your Files Here !/5. Cyber Security Tools, functions, and implications/1.2 IMPORTANCE OF CYBER (1).mp47.86MB
~Get Your Files Here !/5. Cyber Security Tools, functions, and implications/1.3 THE IMPLICATIONS OF (2).mp418MB
~Get Your Files Here !/52. Summary, Conclusion and Recommendation/1. Summary, Conclusion, and Recommendation.mp443.63MB
~Get Your Files Here !/52. Summary, Conclusion and Recommendation/1.12 Cyber Security Analysis.mp418.07MB
~Get Your Files Here !/52. Summary, Conclusion and Recommendation/1.15 Cyber Security Concepts.mp420.49MB
~Get Your Files Here !/52. Summary, Conclusion and Recommendation/1.16 Cyber Security Ecosy(2).mp413.87MB
~Get Your Files Here !/52. Summary, Conclusion and Recommendation/1.19 CYBER SECURITY ESSEN.mp416.67MB
~Get Your Files Here !/52. Summary, Conclusion and Recommendation/1.24 Cyber Security Landscape.mp412.76MB
~Get Your Files Here !/52. Summary, Conclusion and Recommendation/1.27 Cyber Security Polic(1) (2).mp413.98MB
~Get Your Files Here !/52. Summary, Conclusion and Recommendation/1.3 Causes, Consequences and Prevention of Cyber Criminality.mp411.82MB
~Get Your Files Here !/52. Summary, Conclusion and Recommendation/1.30 Cyber Security Risks, Vulnerabilities, Capacity and Preparedness Assessment.mp411.81MB
~Get Your Files Here !/52. Summary, Conclusion and Recommendation/1.31 Cyber Security Risks.mp418.31MB
~Get Your Files Here !/52. Summary, Conclusion and Recommendation/1.32 Cyber Security Theor.mp421.88MB
~Get Your Files Here !/52. Summary, Conclusion and Recommendation/1.34 Cyber Security Tools.mp416.18MB
~Get Your Files Here !/52. Summary, Conclusion and Recommendation/1.4 Common Cyber Securit.mp415.69MB
~Get Your Files Here !/52. Summary, Conclusion and Recommendation/1.47 Protecting Digital Assets from Cyber Attacks.mp49.85MB
~Get Your Files Here !/52. Summary, Conclusion and Recommendation/1.53 THE IMPLICATIONS OF .mp418MB
~Get Your Files Here !/52. Summary, Conclusion and Recommendation/1.56 The Role Of Stakehol.mp414.41MB
~Get Your Files Here !/52. Summary, Conclusion and Recommendation/1.9 Cyber Security (1)pr (2).mp424.14MB
~Get Your Files Here !/6. Cyber Security Analysis/1. Cyber Security Analysis.mp452.38MB
~Get Your Files Here !/7. Cyber Security Policy/1. Cyber Seurity Policy.mp436.04MB
~Get Your Files Here !/8. Cyber Security Essentials/1. Cyber Security Essentials.mp444.66MB
~Get Your Files Here !/8. Cyber Security Essentials/1.1 CYBER SECURITY ESSEN.mp416.67MB
~Get Your Files Here !/9. Operationalization and Conceptualization of Cyber Security/1. Cyber Security Operationalisation.mp474.35MB
~Get Your Files Here !/9. Operationalization and Conceptualization of Cyber Security/2. Cyber Security Conceptualisation.mp460.25MB
~Get Your Files Here !/9. Operationalization and Conceptualization of Cyber Security/2.1 Cyber Security Concepts.mp420.5MB