| parent folder | - | - |
| - | 1. Domain 4 Security Architecture and Tool Sets.mp4 | 3021325 | 2025-08-25 05:43:46 |
| - | 1. Domain 4 Security Architecture and Tool Sets.vtt | 1508 | 2025-08-25 05:43:46 |
| - | 1.1 Domain 4 - Security Architecture & Tool Sets.pdf.pdf | 89282567 | 2025-08-25 05:43:58 |
| - | 1.2 92 - Domain 4 - Security Architecture & Tool Sets.pdf.pdf | 510448 | 2025-08-25 05:43:58 |
| - | 10. Layered Network Defense.mp4 | 22931268 | 2025-08-25 05:44:01 |
| - | 10. Layered Network Defense.vtt | 10034 | 2025-08-25 05:44:01 |
| - | 10.1 100 - Layered Network Design.pdf.pdf | 2338967 | 2025-08-25 05:44:01 |
| - | 11. Layered Host Security.mp4 | 15297356 | 2025-08-25 05:44:02 |
| - | 11. Layered Host Security.vtt | 6930 | 2025-08-25 05:44:02 |
| - | 11.1 101 - Layered Host Security.pdf.pdf | 1963404 | 2025-08-25 05:44:02 |
| - | 12. Data Analytics.mp4 | 19768396 | 2025-08-25 05:44:03 |
| - | 12. Data Analytics.vtt | 9183 | 2025-08-25 05:44:03 |
| - | 12.1 102 - Data Analytics.pdf.pdf | 2010363 | 2025-08-25 05:44:04 |
| - | 13. Personnel Security.mp4 | 28699011 | 2025-08-25 05:44:05 |
| - | 13. Personnel Security.vtt | 13368 | 2025-08-25 05:44:05 |
| - | 13.1 103 - Personnel Security.pdf.pdf | 3912287 | 2025-08-25 05:44:05 |
| - | 14. Outsourcing Concerns.mp4 | 14607530 | 2025-08-25 05:44:06 |
| - | 14. Outsourcing Concerns.vtt | 7472 | 2025-08-25 05:44:06 |
| - | 14.1 104 - Outsourcing Concerns.pdf.pdf | 1771628 | 2025-08-25 05:44:06 |
| - | 15. User Awareness Training.mp4 | 10715049 | 2025-08-25 05:44:07 |
| - | 15. User Awareness Training.vtt | 8988 | 2025-08-25 05:44:07 |
| - | 15.1 105 - User Awareness Training.pdf.pdf | 1192041 | 2025-08-25 05:44:07 |
| - | 16. Analyzing Secure Architectures.mp4 | 45292316 | 2025-08-25 05:44:09 |
| - | 16. Analyzing Secure Architectures.vtt | 18687 | 2025-08-25 05:44:09 |
| - | 16.1 106 - Analyzing Secure Architectures.pdf.pdf | 2860263 | 2025-08-25 05:44:10 |
| - | 17. Quiz Defense in Depth.html | 121 | 2025-08-25 05:44:10 |
| - | 18. What Is Identity.mp4 | 23120023 | 2025-08-25 05:44:11 |
| - | 18. What Is Identity.vtt | 11013 | 2025-08-25 05:44:11 |
| - | 18.1 107 - What is Identity.pdf.pdf | 2728935 | 2025-08-25 05:44:11 |
| - | 19. Identity Systems.mp4 | 52946377 | 2025-08-25 05:44:14 |
| - | 19. Identity Systems.vtt | 25448 | 2025-08-25 05:44:14 |
| - | 19.1 108 - Identity Systems.pdf.pdf | 4078946 | 2025-08-25 05:44:14 |
| - | 2. Policy Documents.mp4 | 31127366 | 2025-08-25 05:44:15 |
| - | 2. Policy Documents.vtt | 16979 | 2025-08-25 05:44:15 |
| - | 2.1 93 - Policy Documents.pdf.pdf | 3429678 | 2025-08-25 05:44:15 |
| - | 20. Threats to Identity Systems.mp4 | 14878615 | 2025-08-25 05:44:16 |
| - | 20. Threats to Identity Systems.vtt | 7730 | 2025-08-25 05:44:16 |
| - | 20.1 109 - Threats to Identity Systems.pdf.pdf | 1784122 | 2025-08-25 05:44:16 |
| - | 21. Attacking AAA Protocols and Systems.mp4 | 42658331 | 2025-08-25 05:44:18 |
| - | 21. Attacking AAA Protocols and Systems.vtt | 20906 | 2025-08-25 05:44:18 |
| - | 21.1 110 - Attacking AAA Protocols and Systems.pdf.pdf | 2868627 | 2025-08-25 05:44:18 |
| - | 22. Targeting Account Lifecycle.mp4 | 15674981 | 2025-08-25 05:44:19 |
| - | 22. Targeting Account Lifecycle.vtt | 15683143 | 2025-08-25 05:44:20 |
| - | 22.1 111 - Targeting Account Lifecycle.pdf.pdf | 1545442 | 2025-08-25 05:44:20 |
| - | 23. Identity Exploits.mp4 | 14132908 | 2025-08-25 05:44:20 |
| - | 23. Identity Exploits.vtt | 6318 | 2025-08-25 05:44:20 |
| - | 23.1 112 - Identity Exploits.pdf.pdf | 1943854 | 2025-08-25 05:44:20 |
| - | 24. Credential Theft.mp4 | 16187028 | 2025-08-25 05:44:21 |
| - | 24. Credential Theft.vtt | 7606 | 2025-08-25 05:44:21 |
| - | 24.1 113 - Credential Theft.pdf.pdf | 2422698 | 2025-08-25 05:44:21 |
| - | 25. Securing Authentication and Authorization System.mp4 | 28003268 | 2025-08-25 05:44:23 |
| - | 25. Securing Authentication and Authorization System.vtt | 13445 | 2025-08-25 05:44:23 |
| - | 25.1 114 - Securing Authentication and Authorization.pdf.pdf | 2237324 | 2025-08-25 05:44:23 |
| - | 26. Identity as a Service (IDaaS).mp4 | 10166977 | 2025-08-25 05:44:23 |
| - | 26. Identity as a Service (IDaaS).vtt | 4786 | 2025-08-25 05:44:23 |
| - | 26.1 115 - Identity as a Service (IDaaS).pdf.pdf | 1143148 | 2025-08-25 05:44:23 |
| - | 27. Detecting Identity Attacks.mp4 | 7428541 | 2025-08-25 05:44:24 |
| - | 27. Detecting Identity Attacks.vtt | 3451 | 2025-08-25 05:44:24 |
| - | 27.1 116 - Detecting Identity Attacks.pdf.pdf | 826465 | 2025-08-25 05:44:24 |
| - | 28. Federated Identity Systems.mp4 | 49097599 | 2025-08-25 05:44:26 |
| - | 28. Federated Identity Systems.vtt | 23807 | 2025-08-25 05:44:26 |
| - | 28.1 117 - Federated Identity Systems.pdf.pdf | 3764982 | 2025-08-25 05:44:26 |
| - | 29. Quiz Identity and Access Management.html | 121 | 2025-08-25 05:44:26 |
| - | 3. Standard Frameworks.mp4 | 36134760 | 2025-08-25 05:44:28 |
| - | 3. Standard Frameworks.vtt | 17367 | 2025-08-25 05:44:28 |
| - | 3.1 94 - Standard Frameworks.pdf.pdf | 3918763 | 2025-08-25 05:44:28 |
| - | 30. Software Development Life Cycle (SDLC).mp4 | 38577780 | 2025-08-25 05:44:30 |
| - | 30. Software Development Life Cycle (SDLC).vtt | 19411 | 2025-08-25 05:44:30 |
| - | 30.1 118 - Software Development Life Cycle (SDLC).pdf.pdf | 7085261 | 2025-08-25 05:44:30 |
| - | 31. Software Development Models.mp4 | 51255092 | 2025-08-25 05:44:41 |
| - | 31. Software Development Models.vtt | 26256 | 2025-08-25 05:44:41 |
| - | 31.1 119 - Software Development Models.pdf.pdf | 3860880 | 2025-08-25 05:44:43 |
| - | 32. Coding for Security.mp4 | 33516048 | 2025-08-25 05:44:47 |
| - | 32. Coding for Security.vtt | 17181 | 2025-08-25 05:44:47 |
| - | 32.1 120 - Coding for Security.pdf.pdf | 2291885 | 2025-08-25 05:44:47 |
| - | 33. Testing Application Security.mp4 | 27570496 | 2025-08-25 05:44:51 |
| - | 33. Testing Application Security.vtt | 12885 | 2025-08-25 05:44:51 |
| - | 33.1 121 - Testing Application Code.pdf.pdf | 3663910 | 2025-08-25 05:44:51 |
| - | 34. Finding Security Flaws.mp4 | 31722276 | 2025-08-25 05:44:54 |
| - | 34. Finding Security Flaws.vtt | 15009 | 2025-08-25 05:44:54 |
| - | 34.1 122 - Finding Security Flaws.pdf.pdf | 3807167 | 2025-08-25 05:44:54 |
| - | 35. Web Application Vulnerability Scanners.mp4 | 27571995 | 2025-08-25 05:44:55 |
| - | 35. Web Application Vulnerability Scanners.vtt | 12966 | 2025-08-25 05:44:55 |
| - | 35.1 123 - Web Application Vulnerability Scanning.pdf.pdf | 3251080 | 2025-08-25 05:44:55 |
| - | 36. Quiz Software Development and SDLC.html | 121 | 2025-08-25 05:44:55 |
| - | 4. Policy-based Controls.mp4 | 16874721 | 2025-08-25 05:44:56 |
| - | 4. Policy-based Controls.vtt | 7702 | 2025-08-25 05:44:56 |
| - | 4.1 95 - Policy-Based Controls.pdf.pdf | 2688409 | 2025-08-25 05:44:56 |
| - | 5. Audits and Assessments.mp4 | 10595124 | 2025-08-25 05:44:57 |
| - | 5. Audits and Assessments.vtt | 5112 | 2025-08-25 05:44:57 |
| - | 5.1 96 - Audits and Assessments.pdf.pdf | 1193621 | 2025-08-25 05:44:57 |
| - | 6. Laws and Regulations.mp4 | 25538643 | 2025-08-25 05:44:58 |
| - | 6. Laws and Regulations.vtt | 11449 | 2025-08-25 05:44:58 |
| - | 6.1 97 - Laws and Regulations.pdf.pdf | 5057017 | 2025-08-25 05:44:58 |
| - | 7. Quiz Policies, Standards, Procedures, and Frameworks.html | 121 | 2025-08-25 05:44:58 |
| - | 8. Defense in Depth.mp4 | 26343747 | 2025-08-25 05:45:00 |
| - | 8. Defense in Depth.vtt | 11814 | 2025-08-25 05:45:00 |
| - | 8.1 98 - Defense in Depth.pdf.pdf | 3641347 | 2025-08-25 05:45:00 |
| - | 9. Types of Controls.mp4 | 22850102 | 2025-08-25 05:45:01 |
| - | 9. Types of Controls.vtt | 10629 | 2025-08-25 05:45:01 |
| - | 9.1 99 - Types of Controls.pdf.pdf | 3649896 | 2025-08-25 05:45:02 |