| parent folder | - | - |
| - | 001. Learning objectives en.srt | 665 | 2023-08-23 17:41:05 |
| - | 001. Learning objectives.mp4 | 3377681 | 2023-08-23 16:01:37 |
| - | 002. 38.1 Introducing Social Engineering Concepts en.srt | 10304 | 2023-08-23 17:41:06 |
| - | 002. 38.1 Introducing Social Engineering Concepts.mp4 | 15247404 | 2023-08-23 16:01:38 |
| - | 003. 38.2 Exploring Social Engineering Techniques en.srt | 12184 | 2023-08-23 17:41:07 |
| - | 003. 38.2 Exploring Social Engineering Techniques.mp4 | 24586185 | 2023-08-23 16:01:41 |
| - | 004. 38.3 Understanding the Insider Threat en.srt | 3644 | 2023-08-23 17:41:08 |
| - | 004. 38.3 Understanding the Insider Threat.mp4 | 10106694 | 2023-08-23 16:01:42 |
| - | 005. 38.4 Impersonation on Social Networking Sites en.srt | 9169 | 2023-08-23 17:41:09 |
| - | 005. 38.4 Impersonation on Social Networking Sites.mp4 | 22393123 | 2023-08-23 16:01:44 |
| - | 006. 38.5 Understanding Identity Theft en.srt | 7654 | 2023-08-23 17:41:10 |
| - | 006. 38.5 Understanding Identity Theft.mp4 | 14633630 | 2023-08-23 16:01:45 |
| - | 007. 38.6 Understanding Social Engineering Countermeasures en.srt | 4230 | 2023-08-23 17:41:11 |
| - | 007. 38.6 Understanding Social Engineering Countermeasures.mp4 | 9337232 | 2023-08-23 16:01:47 |