| | 021 Managing user access and identity.mp4 | 19.71 MB |
| | 022 Implementing preventative security.mp4 | 17.89 MB |
| | 023 Monitoring and alerts.mp4 | 14.95 MB |
| | 018 Describing security requirements.mp4 | 14.21 MB |
| | 008 Dissecting the payment card industry and PCI DSS.mp4 | 13.94 MB |
| | 007 Implementing control frameworks.mp4 | 13.64 MB |
| | 025 Preparing for an incident.mp4 | 13.53 MB |
| | 019 Architecting security risk.mp4 | 12.86 MB |
| | 016 Understanding advanced persistent threats (APTs).mp4 | 12.86 MB |
| | 004 Dissecting cyber risk.mp4 | 12.53 MB |
| | 003 Understanding the NIST cybersecurity framework.mp4 | 12.04 MB |
| | 011 Dissecting security threats.mp4 | 11.04 MB |
| | 026 Responding to an incident.mp4 | 10.95 MB |
| | 005 Unpacking COBIT 5.mp4 | 9.84 MB |
| | 012 Exploring cybercrime as an industry.mp4 | 9.46 MB |
| | 014 Using callbacks to capture keystrokes.mp4 | 9.37 MB |
| | 015 Hiding malware with rootkits.mp4 | 9.34 MB |
| | 009 Exploring the Cyber Essentials framework.mp4 | 8.83 MB |
| | 013 Hiding malware through cloaking and alternate data streams.mp4 | 8.61 MB |
| | 020 Selecting security controls.mp4 | 8.14 MB |
| | 024 Managing incident response.mp4 | 8.11 MB |
| | 017 Exploring ransomware.mp4 | 8.01 MB |
| | 006 Looking closer at DSS05.mp4 | 7.76 MB |
| | 010 Breaking down the cybersecurity kill chain.mp4 | 7.71 MB |
| | 001 Welcome.mp4 | 6.21 MB |
| | 027 Next steps.mp4 | 3.44 MB |
| | 002 What you should know.mp4 | 1.95 MB |