| parent folder | - | - |
| - | 001. Learning objectives.mp4 | 386484 | 2023-08-23 16:05:53 |
| - | 002. 2.1 Performing Risk Assessment.mp4 | 3261475 | 2023-08-23 16:05:55 |
| - | 003. 2.2 Comparing Threats, Vulnerabilities, and Exploits.mp4 | 3320712 | 2023-08-23 16:05:56 |
| - | 004. 2.3 Understanding Authentication, Authorization, and Accounting.mp4 | 1335282 | 2023-08-23 16:05:56 |
| - | 005. 2.4 Examining the Access Control Process Terminology and Data Classification.mp4 | 1436573 | 2023-08-23 16:05:58 |
| - | 006. 2.5 Examining the Access Control Process Data States and Policy Roles.mp4 | 2553086 | 2023-08-23 16:05:59 |
| - | 007. 2.6 Examining the Access Control Process Security and Access Control Classification.mp4 | 3501543 | 2023-08-23 16:06:00 |
| - | 008. 2.7 Understanding Discretionary Access Control.mp4 | 1847466 | 2023-08-23 16:06:01 |
| - | 009. 2.8 Understanding Mandatory Access Control.mp4 | 1832902 | 2023-08-23 16:06:02 |
| - | 010. 2.9 Understanding Role-based Access Control.mp4 | 1241845 | 2023-08-23 16:06:03 |
| - | 011. 2.10 Understanding Attribute-based Access Control.mp4 | 1160517 | 2023-08-23 16:06:04 |
| - | 012. 2.11 Understanding Rule-based Access Control.mp4 | 1381759 | 2023-08-23 16:06:05 |
| - | 013. 2.12 Understanding Time-based Access Control.mp4 | 515280 | 2023-08-23 16:06:05 |