15
/wp-content/uploads/24/2023/06/Cybersecurity-vulnerabilities-threats-and-mitigations.pptx
/wp-content/uploads/24/2023/06/Identifying-cybersecurity-attacks-and-attack-vectors.pptx
/wp-content/uploads/24/2023/06/Week-2-Cybersecurity-Threats-Vulnerabilities-and-Risks-Transcript.pdf
/wp-content/uploads/24/2023/06/Week-2-Cybersecurity-Threats-Vulnerabilities-and-Risks-Writeup.pdf
/wp-content/uploads/24/2023/06/Week-2-How-to-Identify-an-Attack-and-Attack-Vectors-Write_up.pdf
/wp-content/uploads/24/2023/06/Week-2-Zoombombing-and-Security-Breach-Writeup.pdf