| - | 001. Learning objectives en.srt | 665 | | | | | | | | srt | | | srt | 2023-08-23 17:41:05 |
| - | 001. Learning objectives.mp4 | 3377681 | | 35.363991 | 764 | 631 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 16:01:37 |
| - | 002. 38.1 Introducing Social Engineering Concepts en.srt | 10304 | | | | | | | | srt | | | srt | 2023-08-23 17:41:06 |
| - | 002. 38.1 Introducing Social Engineering Concepts.mp4 | 15247404 | | 373.63229 | 326 | 193 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 16:01:38 |
| - | 003. 38.2 Exploring Social Engineering Techniques en.srt | 12184 | | | | | | | | srt | | | srt | 2023-08-23 17:41:07 |
| - | 003. 38.2 Exploring Social Engineering Techniques.mp4 | 24586185 | | 443.408254 | 443 | 310 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 16:01:41 |
| - | 004. 38.3 Understanding the Insider Threat en.srt | 3644 | | | | | | | | srt | | | srt | 2023-08-23 17:41:08 |
| - | 004. 38.3 Understanding the Insider Threat.mp4 | 10106694 | | 157.849252 | 512 | 378 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 16:01:42 |
| - | 005. 38.4 Impersonation on Social Networking Sites en.srt | 9169 | | | | | | | | srt | | | srt | 2023-08-23 17:41:09 |
| - | 005. 38.4 Impersonation on Social Networking Sites.mp4 | 22393123 | | 358.005261 | 500 | 367 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 16:01:44 |
| - | 006. 38.5 Understanding Identity Theft en.srt | 7654 | | | | | | | | srt | | | srt | 2023-08-23 17:41:10 |
| - | 006. 38.5 Understanding Identity Theft.mp4 | 14633630 | | 266.959841 | 438 | 305 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 16:01:45 |
| - | 007. 38.6 Understanding Social Engineering Countermeasures en.srt | 4230 | | | | | | | | srt | | | srt | 2023-08-23 17:41:11 |
| - | 007. 38.6 Understanding Social Engineering Countermeasures.mp4 | 9337232 | | 158.313673 | 471 | 338 | 125 | h264 | aac | mov | 1280x720 | 30 | mp4 | 2023-08-23 16:01:47 |