09-15-2024, 05:21 PM
770.67 MB | 00:24:53 | mp4 | 1280X720 | 16:9
Genre:eLearning |Language:English
Files Included :
1 Introduction & Motivation (23.86 MB)
10 E-Mail Security (59.36 MB)
11 Insert Online Shopping (42.24 MB)
12 Insert The 'better' (more secure) Operating system (9.33 MB)
13 Insert 'Hacking' outside of PCs and mobile Devices (17.52 MB)
14 Insert Disposing, Passing on, Selling Devices (5.21 MB)
15 Authentication & Passwords (43.65 MB)
16 Backup - Do we need that (10.18 MB)
17 The Golden Security Rules (36.82 MB)
2 What actually is Security - Trying to understand In-Security (14.54 MB)
3 Internet Basics The Internet and the Cloud (54.77 MB)
4 Basic Attacking Scheme (17.78 MB)
5 Users as the weak point Recognizing Attack Schemes & Phishing (Part 1) (95.49 MB)
6 Users as the weak point Recognizing Attack Schemes & Phishing (Part 2) (40.33 MB)
7 Users as the weak point Recognizing Attack Schemes & Phishing (Part 3) (259.29 MB)
8 Example The ideal (Banking-)Trojan (13.68 MB)
9 Technical Security Hacking (26.47 MB)
1 Introduction & Motivation (23.86 MB)
10 E-Mail Security (59.36 MB)
11 Insert Online Shopping (42.24 MB)
12 Insert The 'better' (more secure) Operating system (9.33 MB)
13 Insert 'Hacking' outside of PCs and mobile Devices (17.52 MB)
14 Insert Disposing, Passing on, Selling Devices (5.21 MB)
15 Authentication & Passwords (43.65 MB)
16 Backup - Do we need that (10.18 MB)
17 The Golden Security Rules (36.82 MB)
2 What actually is Security - Trying to understand In-Security (14.54 MB)
3 Internet Basics The Internet and the Cloud (54.77 MB)
4 Basic Attacking Scheme (17.78 MB)
5 Users as the weak point Recognizing Attack Schemes & Phishing (Part 1) (95.49 MB)
6 Users as the weak point Recognizing Attack Schemes & Phishing (Part 2) (40.33 MB)
7 Users as the weak point Recognizing Attack Schemes & Phishing (Part 3) (259.29 MB)
8 Example The ideal (Banking-)Trojan (13.68 MB)
9 Technical Security Hacking (26.47 MB)
Screenshot