switch to basic browser
📂
📝
📟

🌲 / CompTIA CySA+ (CS0-001) Complete Course and Practice Exam 5. Domain 4 Security Architecture and Toolsets

c File Name Size T Date
-1. Domain 4 Security Architecture and Tool Sets.mp43021325mp42025-08-25 05:43:46
-1. Domain 4 Security Architecture and Tool Sets.vtt1508vtt2025-08-25 05:43:46
-1.1 Domain 4 - Security Architecture & Tool Sets.pdf.pdf89282567pdf2025-08-25 05:43:58
-1.2 92 - Domain 4 - Security Architecture & Tool Sets.pdf.pdf510448pdf2025-08-25 05:43:58
-10. Layered Network Defense.mp422931268mp42025-08-25 05:44:01
-10. Layered Network Defense.vtt10034vtt2025-08-25 05:44:01
-10.1 100 - Layered Network Design.pdf.pdf2338967pdf2025-08-25 05:44:01
-11. Layered Host Security.mp415297356mp42025-08-25 05:44:02
-11. Layered Host Security.vtt6930vtt2025-08-25 05:44:02
-11.1 101 - Layered Host Security.pdf.pdf1963404pdf2025-08-25 05:44:02
-12. Data Analytics.mp419768396mp42025-08-25 05:44:03
-12. Data Analytics.vtt9183vtt2025-08-25 05:44:03
-12.1 102 - Data Analytics.pdf.pdf2010363pdf2025-08-25 05:44:04
-13. Personnel Security.mp428699011mp42025-08-25 05:44:05
-13. Personnel Security.vtt13368vtt2025-08-25 05:44:05
-13.1 103 - Personnel Security.pdf.pdf3912287pdf2025-08-25 05:44:05
-14. Outsourcing Concerns.mp414607530mp42025-08-25 05:44:06
-14. Outsourcing Concerns.vtt7472vtt2025-08-25 05:44:06
-14.1 104 - Outsourcing Concerns.pdf.pdf1771628pdf2025-08-25 05:44:06
-15. User Awareness Training.mp410715049mp42025-08-25 05:44:07
-15. User Awareness Training.vtt8988vtt2025-08-25 05:44:07
-15.1 105 - User Awareness Training.pdf.pdf1192041pdf2025-08-25 05:44:07
-16. Analyzing Secure Architectures.mp445292316mp42025-08-25 05:44:09
-16. Analyzing Secure Architectures.vtt18687vtt2025-08-25 05:44:09
-16.1 106 - Analyzing Secure Architectures.pdf.pdf2860263pdf2025-08-25 05:44:10
-17. Quiz Defense in Depth.html121html2025-08-25 05:44:10
-18. What Is Identity.mp423120023mp42025-08-25 05:44:11
-18. What Is Identity.vtt11013vtt2025-08-25 05:44:11
-18.1 107 - What is Identity.pdf.pdf2728935pdf2025-08-25 05:44:11
-19. Identity Systems.mp452946377mp42025-08-25 05:44:14
-19. Identity Systems.vtt25448vtt2025-08-25 05:44:14
-19.1 108 - Identity Systems.pdf.pdf4078946pdf2025-08-25 05:44:14
-2. Policy Documents.mp431127366mp42025-08-25 05:44:15
-2. Policy Documents.vtt16979vtt2025-08-25 05:44:15
-2.1 93 - Policy Documents.pdf.pdf3429678pdf2025-08-25 05:44:15
-20. Threats to Identity Systems.mp414878615mp42025-08-25 05:44:16
-20. Threats to Identity Systems.vtt7730vtt2025-08-25 05:44:16
-20.1 109 - Threats to Identity Systems.pdf.pdf1784122pdf2025-08-25 05:44:16
-21. Attacking AAA Protocols and Systems.mp442658331mp42025-08-25 05:44:18
-21. Attacking AAA Protocols and Systems.vtt20906vtt2025-08-25 05:44:18
-21.1 110 - Attacking AAA Protocols and Systems.pdf.pdf2868627pdf2025-08-25 05:44:18
-22. Targeting Account Lifecycle.mp415674981mp42025-08-25 05:44:19
-22. Targeting Account Lifecycle.vtt15683143vtt2025-08-25 05:44:20
-22.1 111 - Targeting Account Lifecycle.pdf.pdf1545442pdf2025-08-25 05:44:20
-23. Identity Exploits.mp414132908mp42025-08-25 05:44:20
-23. Identity Exploits.vtt6318vtt2025-08-25 05:44:20
-23.1 112 - Identity Exploits.pdf.pdf1943854pdf2025-08-25 05:44:20
-24. Credential Theft.mp416187028mp42025-08-25 05:44:21
-24. Credential Theft.vtt7606vtt2025-08-25 05:44:21
-24.1 113 - Credential Theft.pdf.pdf2422698pdf2025-08-25 05:44:21
-25. Securing Authentication and Authorization System.mp428003268mp42025-08-25 05:44:23
-25. Securing Authentication and Authorization System.vtt13445vtt2025-08-25 05:44:23
-25.1 114 - Securing Authentication and Authorization.pdf.pdf2237324pdf2025-08-25 05:44:23
-26. Identity as a Service (IDaaS).mp410166977mp42025-08-25 05:44:23
-26. Identity as a Service (IDaaS).vtt4786vtt2025-08-25 05:44:23
-26.1 115 - Identity as a Service (IDaaS).pdf.pdf1143148pdf2025-08-25 05:44:23
-27. Detecting Identity Attacks.mp47428541mp42025-08-25 05:44:24
-27. Detecting Identity Attacks.vtt3451vtt2025-08-25 05:44:24
-27.1 116 - Detecting Identity Attacks.pdf.pdf826465pdf2025-08-25 05:44:24
-28. Federated Identity Systems.mp449097599mp42025-08-25 05:44:26
-28. Federated Identity Systems.vtt23807vtt2025-08-25 05:44:26
-28.1 117 - Federated Identity Systems.pdf.pdf3764982pdf2025-08-25 05:44:26
-29. Quiz Identity and Access Management.html121html2025-08-25 05:44:26
-3. Standard Frameworks.mp436134760mp42025-08-25 05:44:28
-3. Standard Frameworks.vtt17367vtt2025-08-25 05:44:28
-3.1 94 - Standard Frameworks.pdf.pdf3918763pdf2025-08-25 05:44:28
-30. Software Development Life Cycle (SDLC).mp438577780mp42025-08-25 05:44:30
-30. Software Development Life Cycle (SDLC).vtt19411vtt2025-08-25 05:44:30
-30.1 118 - Software Development Life Cycle (SDLC).pdf.pdf7085261pdf2025-08-25 05:44:30
-31. Software Development Models.mp451255092mp42025-08-25 05:44:41
-31. Software Development Models.vtt26256vtt2025-08-25 05:44:41
-31.1 119 - Software Development Models.pdf.pdf3860880pdf2025-08-25 05:44:43
-32. Coding for Security.mp433516048mp42025-08-25 05:44:47
-32. Coding for Security.vtt17181vtt2025-08-25 05:44:47
-32.1 120 - Coding for Security.pdf.pdf2291885pdf2025-08-25 05:44:47
-33. Testing Application Security.mp427570496mp42025-08-25 05:44:51
-33. Testing Application Security.vtt12885vtt2025-08-25 05:44:51
-33.1 121 - Testing Application Code.pdf.pdf3663910pdf2025-08-25 05:44:51
-34. Finding Security Flaws.mp431722276mp42025-08-25 05:44:54
-34. Finding Security Flaws.vtt15009vtt2025-08-25 05:44:54
-34.1 122 - Finding Security Flaws.pdf.pdf3807167pdf2025-08-25 05:44:54
-35. Web Application Vulnerability Scanners.mp427571995mp42025-08-25 05:44:55
-35. Web Application Vulnerability Scanners.vtt12966vtt2025-08-25 05:44:55
-35.1 123 - Web Application Vulnerability Scanning.pdf.pdf3251080pdf2025-08-25 05:44:55
-36. Quiz Software Development and SDLC.html121html2025-08-25 05:44:55
-4. Policy-based Controls.mp416874721mp42025-08-25 05:44:56
-4. Policy-based Controls.vtt7702vtt2025-08-25 05:44:56
-4.1 95 - Policy-Based Controls.pdf.pdf2688409pdf2025-08-25 05:44:56
-5. Audits and Assessments.mp410595124mp42025-08-25 05:44:57
-5. Audits and Assessments.vtt5112vtt2025-08-25 05:44:57
-5.1 96 - Audits and Assessments.pdf.pdf1193621pdf2025-08-25 05:44:57
-6. Laws and Regulations.mp425538643mp42025-08-25 05:44:58
-6. Laws and Regulations.vtt11449vtt2025-08-25 05:44:58
-6.1 97 - Laws and Regulations.pdf.pdf5057017pdf2025-08-25 05:44:58
-7. Quiz Policies, Standards, Procedures, and Frameworks.html121html2025-08-25 05:44:58
-8. Defense in Depth.mp426343747mp42025-08-25 05:45:00
-8. Defense in Depth.vtt11814vtt2025-08-25 05:45:00
-8.1 98 - Defense in Depth.pdf.pdf3641347pdf2025-08-25 05:45:00
-9. Types of Controls.mp422850102mp42025-08-25 05:45:01
-9. Types of Controls.vtt10629vtt2025-08-25 05:45:01
-9.1 99 - Types of Controls.pdf.pdf3649896pdf2025-08-25 05:45:02

control-panel

π
CSN Education // 1.02 TiB free of 4.54 TiB