| - | 001. Learning objectives.mp4 | 250386 | | 35.306667 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:11:09 |
| - | 002. 38.1 Introducing Social Engineering Concepts.mp4 | 2633922 | | 373.568005 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:11:10 |
| - | 003. 38.2 Exploring Social Engineering Techniques.mp4 | 3125652 | | 443.349002 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:11:11 |
| - | 004. 38.3 Understanding the Insider Threat.mp4 | 1113284 | | 157.802653 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:11:12 |
| - | 005. 38.4 Impersonation on Social Networking Sites.mp4 | 2523795 | | 357.951995 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:11:13 |
| - | 006. 38.5 Understanding Identity Theft.mp4 | 1882157 | | 266.900998 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:11:14 |
| - | 007. 38.6 Understanding Social Engineering Countermeasures.mp4 | 1116499 | | 158.25068 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:11:15 |