| - | 001. Learning objectives.mp4 | 386484 | | 54.612993 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:53 |
| - | 002. 2.1 Performing Risk Assessment.mp4 | 3261475 | | 462.612993 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:55 |
| - | 003. 2.2 Comparing Threats, Vulnerabilities, and Exploits.mp4 | 3320712 | | 471.018685 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:56 |
| - | 004. 2.3 Understanding Authentication, Authorization, and Accounting.mp4 | 1335282 | | 189.311995 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:56 |
| - | 005. 2.4 Examining the Access Control Process Terminology and Data Classification.mp4 | 1436573 | | 203.669002 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:58 |
| - | 006. 2.5 Examining the Access Control Process Data States and Policy Roles.mp4 | 2553086 | | 362.111995 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:05:59 |
| - | 007. 2.6 Examining the Access Control Process Security and Access Control Classification.mp4 | 3501543 | | 496.682653 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:00 |
| - | 008. 2.7 Understanding Discretionary Access Control.mp4 | 1847466 | | 261.972993 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:01 |
| - | 009. 2.8 Understanding Mandatory Access Control.mp4 | 1832902 | | 259.903991 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:02 |
| - | 010. 2.9 Understanding Role-based Access Control.mp4 | 1241845 | | 176.042653 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:03 |
| - | 011. 2.10 Understanding Attribute-based Access Control.mp4 | 1160517 | | 164.500998 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:04 |
| - | 012. 2.11 Understanding Rule-based Access Control.mp4 | 1381759 | | 195.882653 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:05 |
| - | 013. 2.12 Understanding Time-based Access Control.mp4 | 515280 | | 72.938685 | 56 | 55 | aac | mov | mp4 | 2023-08-23 16:06:05 |