| - | 1. Domain 4 Security Architecture and Tool Sets.mp4 | 3021325 | mp4 | 2025-08-25 05:43:46 |
| - | 1. Domain 4 Security Architecture and Tool Sets.vtt | 1508 | vtt | 2025-08-25 05:43:46 |
| - | 1.1 Domain 4 - Security Architecture & Tool Sets.pdf.pdf | 89282567 | pdf | 2025-08-25 05:43:58 |
| - | 1.2 92 - Domain 4 - Security Architecture & Tool Sets.pdf.pdf | 510448 | pdf | 2025-08-25 05:43:58 |
| - | 10. Layered Network Defense.mp4 | 22931268 | mp4 | 2025-08-25 05:44:01 |
| - | 10. Layered Network Defense.vtt | 10034 | vtt | 2025-08-25 05:44:01 |
| - | 10.1 100 - Layered Network Design.pdf.pdf | 2338967 | pdf | 2025-08-25 05:44:01 |
| - | 11. Layered Host Security.mp4 | 15297356 | mp4 | 2025-08-25 05:44:02 |
| - | 11. Layered Host Security.vtt | 6930 | vtt | 2025-08-25 05:44:02 |
| - | 11.1 101 - Layered Host Security.pdf.pdf | 1963404 | pdf | 2025-08-25 05:44:02 |
| - | 12. Data Analytics.mp4 | 19768396 | mp4 | 2025-08-25 05:44:03 |
| - | 12. Data Analytics.vtt | 9183 | vtt | 2025-08-25 05:44:03 |
| - | 12.1 102 - Data Analytics.pdf.pdf | 2010363 | pdf | 2025-08-25 05:44:04 |
| - | 13. Personnel Security.mp4 | 28699011 | mp4 | 2025-08-25 05:44:05 |
| - | 13. Personnel Security.vtt | 13368 | vtt | 2025-08-25 05:44:05 |
| - | 13.1 103 - Personnel Security.pdf.pdf | 3912287 | pdf | 2025-08-25 05:44:05 |
| - | 14. Outsourcing Concerns.mp4 | 14607530 | mp4 | 2025-08-25 05:44:06 |
| - | 14. Outsourcing Concerns.vtt | 7472 | vtt | 2025-08-25 05:44:06 |
| - | 14.1 104 - Outsourcing Concerns.pdf.pdf | 1771628 | pdf | 2025-08-25 05:44:06 |
| - | 15. User Awareness Training.mp4 | 10715049 | mp4 | 2025-08-25 05:44:07 |
| - | 15. User Awareness Training.vtt | 8988 | vtt | 2025-08-25 05:44:07 |
| - | 15.1 105 - User Awareness Training.pdf.pdf | 1192041 | pdf | 2025-08-25 05:44:07 |
| - | 16. Analyzing Secure Architectures.mp4 | 45292316 | mp4 | 2025-08-25 05:44:09 |
| - | 16. Analyzing Secure Architectures.vtt | 18687 | vtt | 2025-08-25 05:44:09 |
| - | 16.1 106 - Analyzing Secure Architectures.pdf.pdf | 2860263 | pdf | 2025-08-25 05:44:10 |
| - | 17. Quiz Defense in Depth.html | 121 | html | 2025-08-25 05:44:10 |
| - | 18. What Is Identity.mp4 | 23120023 | mp4 | 2025-08-25 05:44:11 |
| - | 18. What Is Identity.vtt | 11013 | vtt | 2025-08-25 05:44:11 |
| - | 18.1 107 - What is Identity.pdf.pdf | 2728935 | pdf | 2025-08-25 05:44:11 |
| - | 19. Identity Systems.mp4 | 52946377 | mp4 | 2025-08-25 05:44:14 |
| - | 19. Identity Systems.vtt | 25448 | vtt | 2025-08-25 05:44:14 |
| - | 19.1 108 - Identity Systems.pdf.pdf | 4078946 | pdf | 2025-08-25 05:44:14 |
| - | 2. Policy Documents.mp4 | 31127366 | mp4 | 2025-08-25 05:44:15 |
| - | 2. Policy Documents.vtt | 16979 | vtt | 2025-08-25 05:44:15 |
| - | 2.1 93 - Policy Documents.pdf.pdf | 3429678 | pdf | 2025-08-25 05:44:15 |
| - | 20. Threats to Identity Systems.mp4 | 14878615 | mp4 | 2025-08-25 05:44:16 |
| - | 20. Threats to Identity Systems.vtt | 7730 | vtt | 2025-08-25 05:44:16 |
| - | 20.1 109 - Threats to Identity Systems.pdf.pdf | 1784122 | pdf | 2025-08-25 05:44:16 |
| - | 21. Attacking AAA Protocols and Systems.mp4 | 42658331 | mp4 | 2025-08-25 05:44:18 |
| - | 21. Attacking AAA Protocols and Systems.vtt | 20906 | vtt | 2025-08-25 05:44:18 |
| - | 21.1 110 - Attacking AAA Protocols and Systems.pdf.pdf | 2868627 | pdf | 2025-08-25 05:44:18 |
| - | 22. Targeting Account Lifecycle.mp4 | 15674981 | mp4 | 2025-08-25 05:44:19 |
| - | 22. Targeting Account Lifecycle.vtt | 15683143 | vtt | 2025-08-25 05:44:20 |
| - | 22.1 111 - Targeting Account Lifecycle.pdf.pdf | 1545442 | pdf | 2025-08-25 05:44:20 |
| - | 23. Identity Exploits.mp4 | 14132908 | mp4 | 2025-08-25 05:44:20 |
| - | 23. Identity Exploits.vtt | 6318 | vtt | 2025-08-25 05:44:20 |
| - | 23.1 112 - Identity Exploits.pdf.pdf | 1943854 | pdf | 2025-08-25 05:44:20 |
| - | 24. Credential Theft.mp4 | 16187028 | mp4 | 2025-08-25 05:44:21 |
| - | 24. Credential Theft.vtt | 7606 | vtt | 2025-08-25 05:44:21 |
| - | 24.1 113 - Credential Theft.pdf.pdf | 2422698 | pdf | 2025-08-25 05:44:21 |
| - | 25. Securing Authentication and Authorization System.mp4 | 28003268 | mp4 | 2025-08-25 05:44:23 |
| - | 25. Securing Authentication and Authorization System.vtt | 13445 | vtt | 2025-08-25 05:44:23 |
| - | 25.1 114 - Securing Authentication and Authorization.pdf.pdf | 2237324 | pdf | 2025-08-25 05:44:23 |
| - | 26. Identity as a Service (IDaaS).mp4 | 10166977 | mp4 | 2025-08-25 05:44:23 |
| - | 26. Identity as a Service (IDaaS).vtt | 4786 | vtt | 2025-08-25 05:44:23 |
| - | 26.1 115 - Identity as a Service (IDaaS).pdf.pdf | 1143148 | pdf | 2025-08-25 05:44:23 |
| - | 27. Detecting Identity Attacks.mp4 | 7428541 | mp4 | 2025-08-25 05:44:24 |
| - | 27. Detecting Identity Attacks.vtt | 3451 | vtt | 2025-08-25 05:44:24 |
| - | 27.1 116 - Detecting Identity Attacks.pdf.pdf | 826465 | pdf | 2025-08-25 05:44:24 |
| - | 28. Federated Identity Systems.mp4 | 49097599 | mp4 | 2025-08-25 05:44:26 |
| - | 28. Federated Identity Systems.vtt | 23807 | vtt | 2025-08-25 05:44:26 |
| - | 28.1 117 - Federated Identity Systems.pdf.pdf | 3764982 | pdf | 2025-08-25 05:44:26 |
| - | 29. Quiz Identity and Access Management.html | 121 | html | 2025-08-25 05:44:26 |
| - | 3. Standard Frameworks.mp4 | 36134760 | mp4 | 2025-08-25 05:44:28 |
| - | 3. Standard Frameworks.vtt | 17367 | vtt | 2025-08-25 05:44:28 |
| - | 3.1 94 - Standard Frameworks.pdf.pdf | 3918763 | pdf | 2025-08-25 05:44:28 |
| - | 30. Software Development Life Cycle (SDLC).mp4 | 38577780 | mp4 | 2025-08-25 05:44:30 |
| - | 30. Software Development Life Cycle (SDLC).vtt | 19411 | vtt | 2025-08-25 05:44:30 |
| - | 30.1 118 - Software Development Life Cycle (SDLC).pdf.pdf | 7085261 | pdf | 2025-08-25 05:44:30 |
| - | 31. Software Development Models.mp4 | 51255092 | mp4 | 2025-08-25 05:44:41 |
| - | 31. Software Development Models.vtt | 26256 | vtt | 2025-08-25 05:44:41 |
| - | 31.1 119 - Software Development Models.pdf.pdf | 3860880 | pdf | 2025-08-25 05:44:43 |
| - | 32. Coding for Security.mp4 | 33516048 | mp4 | 2025-08-25 05:44:47 |
| - | 32. Coding for Security.vtt | 17181 | vtt | 2025-08-25 05:44:47 |
| - | 32.1 120 - Coding for Security.pdf.pdf | 2291885 | pdf | 2025-08-25 05:44:47 |
| - | 33. Testing Application Security.mp4 | 27570496 | mp4 | 2025-08-25 05:44:51 |
| - | 33. Testing Application Security.vtt | 12885 | vtt | 2025-08-25 05:44:51 |
| - | 33.1 121 - Testing Application Code.pdf.pdf | 3663910 | pdf | 2025-08-25 05:44:51 |
| - | 34. Finding Security Flaws.mp4 | 31722276 | mp4 | 2025-08-25 05:44:54 |
| - | 34. Finding Security Flaws.vtt | 15009 | vtt | 2025-08-25 05:44:54 |
| - | 34.1 122 - Finding Security Flaws.pdf.pdf | 3807167 | pdf | 2025-08-25 05:44:54 |
| - | 35. Web Application Vulnerability Scanners.mp4 | 27571995 | mp4 | 2025-08-25 05:44:55 |
| - | 35. Web Application Vulnerability Scanners.vtt | 12966 | vtt | 2025-08-25 05:44:55 |
| - | 35.1 123 - Web Application Vulnerability Scanning.pdf.pdf | 3251080 | pdf | 2025-08-25 05:44:55 |
| - | 36. Quiz Software Development and SDLC.html | 121 | html | 2025-08-25 05:44:55 |
| - | 4. Policy-based Controls.mp4 | 16874721 | mp4 | 2025-08-25 05:44:56 |
| - | 4. Policy-based Controls.vtt | 7702 | vtt | 2025-08-25 05:44:56 |
| - | 4.1 95 - Policy-Based Controls.pdf.pdf | 2688409 | pdf | 2025-08-25 05:44:56 |
| - | 5. Audits and Assessments.mp4 | 10595124 | mp4 | 2025-08-25 05:44:57 |
| - | 5. Audits and Assessments.vtt | 5112 | vtt | 2025-08-25 05:44:57 |
| - | 5.1 96 - Audits and Assessments.pdf.pdf | 1193621 | pdf | 2025-08-25 05:44:57 |
| - | 6. Laws and Regulations.mp4 | 25538643 | mp4 | 2025-08-25 05:44:58 |
| - | 6. Laws and Regulations.vtt | 11449 | vtt | 2025-08-25 05:44:58 |
| - | 6.1 97 - Laws and Regulations.pdf.pdf | 5057017 | pdf | 2025-08-25 05:44:58 |
| - | 7. Quiz Policies, Standards, Procedures, and Frameworks.html | 121 | html | 2025-08-25 05:44:58 |
| - | 8. Defense in Depth.mp4 | 26343747 | mp4 | 2025-08-25 05:45:00 |
| - | 8. Defense in Depth.vtt | 11814 | vtt | 2025-08-25 05:45:00 |
| - | 8.1 98 - Defense in Depth.pdf.pdf | 3641347 | pdf | 2025-08-25 05:45:00 |
| - | 9. Types of Controls.mp4 | 22850102 | mp4 | 2025-08-25 05:45:01 |
| - | 9. Types of Controls.vtt | 10629 | vtt | 2025-08-25 05:45:01 |
| - | 9.1 99 - Types of Controls.pdf.pdf | 3649896 | pdf | 2025-08-25 05:45:02 |