CSN Education // 1.04 TiB free of 4.54 TiB

c File Name Size Date
parent folder--
-1. Domain 4 Security Architecture and Tool Sets.mp430213252025-08-25 05:43:46
-1. Domain 4 Security Architecture and Tool Sets.vtt15082025-08-25 05:43:46
-1.1 Domain 4 - Security Architecture & Tool Sets.pdf.pdf892825672025-08-25 05:43:58
-1.2 92 - Domain 4 - Security Architecture & Tool Sets.pdf.pdf5104482025-08-25 05:43:58
-10. Layered Network Defense.mp4229312682025-08-25 05:44:01
-10. Layered Network Defense.vtt100342025-08-25 05:44:01
-10.1 100 - Layered Network Design.pdf.pdf23389672025-08-25 05:44:01
-11. Layered Host Security.mp4152973562025-08-25 05:44:02
-11. Layered Host Security.vtt69302025-08-25 05:44:02
-11.1 101 - Layered Host Security.pdf.pdf19634042025-08-25 05:44:02
-12. Data Analytics.mp4197683962025-08-25 05:44:03
-12. Data Analytics.vtt91832025-08-25 05:44:03
-12.1 102 - Data Analytics.pdf.pdf20103632025-08-25 05:44:04
-13. Personnel Security.mp4286990112025-08-25 05:44:05
-13. Personnel Security.vtt133682025-08-25 05:44:05
-13.1 103 - Personnel Security.pdf.pdf39122872025-08-25 05:44:05
-14. Outsourcing Concerns.mp4146075302025-08-25 05:44:06
-14. Outsourcing Concerns.vtt74722025-08-25 05:44:06
-14.1 104 - Outsourcing Concerns.pdf.pdf17716282025-08-25 05:44:06
-15. User Awareness Training.mp4107150492025-08-25 05:44:07
-15. User Awareness Training.vtt89882025-08-25 05:44:07
-15.1 105 - User Awareness Training.pdf.pdf11920412025-08-25 05:44:07
-16. Analyzing Secure Architectures.mp4452923162025-08-25 05:44:09
-16. Analyzing Secure Architectures.vtt186872025-08-25 05:44:09
-16.1 106 - Analyzing Secure Architectures.pdf.pdf28602632025-08-25 05:44:10
-17. Quiz Defense in Depth.html1212025-08-25 05:44:10
-18. What Is Identity.mp4231200232025-08-25 05:44:11
-18. What Is Identity.vtt110132025-08-25 05:44:11
-18.1 107 - What is Identity.pdf.pdf27289352025-08-25 05:44:11
-19. Identity Systems.mp4529463772025-08-25 05:44:14
-19. Identity Systems.vtt254482025-08-25 05:44:14
-19.1 108 - Identity Systems.pdf.pdf40789462025-08-25 05:44:14
-2. Policy Documents.mp4311273662025-08-25 05:44:15
-2. Policy Documents.vtt169792025-08-25 05:44:15
-2.1 93 - Policy Documents.pdf.pdf34296782025-08-25 05:44:15
-20. Threats to Identity Systems.mp4148786152025-08-25 05:44:16
-20. Threats to Identity Systems.vtt77302025-08-25 05:44:16
-20.1 109 - Threats to Identity Systems.pdf.pdf17841222025-08-25 05:44:16
-21. Attacking AAA Protocols and Systems.mp4426583312025-08-25 05:44:18
-21. Attacking AAA Protocols and Systems.vtt209062025-08-25 05:44:18
-21.1 110 - Attacking AAA Protocols and Systems.pdf.pdf28686272025-08-25 05:44:18
-22. Targeting Account Lifecycle.mp4156749812025-08-25 05:44:19
-22. Targeting Account Lifecycle.vtt156831432025-08-25 05:44:20
-22.1 111 - Targeting Account Lifecycle.pdf.pdf15454422025-08-25 05:44:20
-23. Identity Exploits.mp4141329082025-08-25 05:44:20
-23. Identity Exploits.vtt63182025-08-25 05:44:20
-23.1 112 - Identity Exploits.pdf.pdf19438542025-08-25 05:44:20
-24. Credential Theft.mp4161870282025-08-25 05:44:21
-24. Credential Theft.vtt76062025-08-25 05:44:21
-24.1 113 - Credential Theft.pdf.pdf24226982025-08-25 05:44:21
-25. Securing Authentication and Authorization System.mp4280032682025-08-25 05:44:23
-25. Securing Authentication and Authorization System.vtt134452025-08-25 05:44:23
-25.1 114 - Securing Authentication and Authorization.pdf.pdf22373242025-08-25 05:44:23
-26. Identity as a Service (IDaaS).mp4101669772025-08-25 05:44:23
-26. Identity as a Service (IDaaS).vtt47862025-08-25 05:44:23
-26.1 115 - Identity as a Service (IDaaS).pdf.pdf11431482025-08-25 05:44:23
-27. Detecting Identity Attacks.mp474285412025-08-25 05:44:24
-27. Detecting Identity Attacks.vtt34512025-08-25 05:44:24
-27.1 116 - Detecting Identity Attacks.pdf.pdf8264652025-08-25 05:44:24
-28. Federated Identity Systems.mp4490975992025-08-25 05:44:26
-28. Federated Identity Systems.vtt238072025-08-25 05:44:26
-28.1 117 - Federated Identity Systems.pdf.pdf37649822025-08-25 05:44:26
-29. Quiz Identity and Access Management.html1212025-08-25 05:44:26
-3. Standard Frameworks.mp4361347602025-08-25 05:44:28
-3. Standard Frameworks.vtt173672025-08-25 05:44:28
-3.1 94 - Standard Frameworks.pdf.pdf39187632025-08-25 05:44:28
-30. Software Development Life Cycle (SDLC).mp4385777802025-08-25 05:44:30
-30. Software Development Life Cycle (SDLC).vtt194112025-08-25 05:44:30
-30.1 118 - Software Development Life Cycle (SDLC).pdf.pdf70852612025-08-25 05:44:30
-31. Software Development Models.mp4512550922025-08-25 05:44:41
-31. Software Development Models.vtt262562025-08-25 05:44:41
-31.1 119 - Software Development Models.pdf.pdf38608802025-08-25 05:44:43
-32. Coding for Security.mp4335160482025-08-25 05:44:47
-32. Coding for Security.vtt171812025-08-25 05:44:47
-32.1 120 - Coding for Security.pdf.pdf22918852025-08-25 05:44:47
-33. Testing Application Security.mp4275704962025-08-25 05:44:51
-33. Testing Application Security.vtt128852025-08-25 05:44:51
-33.1 121 - Testing Application Code.pdf.pdf36639102025-08-25 05:44:51
-34. Finding Security Flaws.mp4317222762025-08-25 05:44:54
-34. Finding Security Flaws.vtt150092025-08-25 05:44:54
-34.1 122 - Finding Security Flaws.pdf.pdf38071672025-08-25 05:44:54
-35. Web Application Vulnerability Scanners.mp4275719952025-08-25 05:44:55
-35. Web Application Vulnerability Scanners.vtt129662025-08-25 05:44:55
-35.1 123 - Web Application Vulnerability Scanning.pdf.pdf32510802025-08-25 05:44:55
-36. Quiz Software Development and SDLC.html1212025-08-25 05:44:55
-4. Policy-based Controls.mp4168747212025-08-25 05:44:56
-4. Policy-based Controls.vtt77022025-08-25 05:44:56
-4.1 95 - Policy-Based Controls.pdf.pdf26884092025-08-25 05:44:56
-5. Audits and Assessments.mp4105951242025-08-25 05:44:57
-5. Audits and Assessments.vtt51122025-08-25 05:44:57
-5.1 96 - Audits and Assessments.pdf.pdf11936212025-08-25 05:44:57
-6. Laws and Regulations.mp4255386432025-08-25 05:44:58
-6. Laws and Regulations.vtt114492025-08-25 05:44:58
-6.1 97 - Laws and Regulations.pdf.pdf50570172025-08-25 05:44:58
-7. Quiz Policies, Standards, Procedures, and Frameworks.html1212025-08-25 05:44:58
-8. Defense in Depth.mp4263437472025-08-25 05:45:00
-8. Defense in Depth.vtt118142025-08-25 05:45:00
-8.1 98 - Defense in Depth.pdf.pdf36413472025-08-25 05:45:00
-9. Types of Controls.mp4228501022025-08-25 05:45:01
-9. Types of Controls.vtt106292025-08-25 05:45:01
-9.1 99 - Types of Controls.pdf.pdf36498962025-08-25 05:45:02

control-panel