f69dc311a936 // 3.77 TiB free of 3.98 TiB

c File Name Size Date
parent folder--
-001. Learning objectives en.srt8502023-09-05 21:06:47
-001. Learning objectives.mp451888382023-09-05 21:00:27
-002. 4.1 Understanding Phishing and Spear Phishing Attacks en.srt21162023-09-05 21:06:48
-002. 4.1 Understanding Phishing and Spear Phishing Attacks.mp4130100742023-09-05 21:00:30
-003. 4.2 Understanding Pharming, Whaling, Malvertising, SMS Phishing, and Voice Phishing Attacks en.srt63262023-09-05 21:06:50
-003. 4.2 Understanding Pharming, Whaling, Malvertising, SMS Phishing, and Voice Phishing Attacks.mp4351023432023-09-05 21:00:34
-004. 4.3 Describing what is Elicitation, Interrogation, and Impersonation (Pretexting) en.srt34932023-09-05 21:06:51
-004. 4.3 Describing what is Elicitation, Interrogation, and Impersonation (Pretexting).mp4242444702023-09-05 21:00:37
-005. 4.4 Understanding What is Social Engineering Motivation Techniques en.srt20262023-09-05 21:06:51
-005. 4.4 Understanding What is Social Engineering Motivation Techniques.mp4134662082023-09-05 21:00:40
-006. 4.5 Understanding What is Shoulder Surfing en.srt14112023-09-05 21:06:53
-006. 4.5 Understanding What is Shoulder Surfing.mp4100505642023-09-05 21:00:42
-007. 4.6 Understanding What is USB Key Drop en.srt21392023-09-05 21:06:54
-007. 4.6 Understanding What is USB Key Drop.mp4128462432023-09-05 21:00:44
-008. 4.6 Understanding What is USB Key Drop en.srt21392023-09-05 21:06:55

control-panel