f69dc311a936 // 3.77 TiB free of 3.98 TiB

c File Name Size Date
parent folder--
-001. Learning objectives.mp43864842023-08-23 16:05:53
-002. 2.1 Performing Risk Assessment.mp432614752023-08-23 16:05:55
-003. 2.2 Comparing Threats, Vulnerabilities, and Exploits.mp433207122023-08-23 16:05:56
-004. 2.3 Understanding Authentication, Authorization, and Accounting.mp413352822023-08-23 16:05:56
-005. 2.4 Examining the Access Control Process Terminology and Data Classification.mp414365732023-08-23 16:05:58
-006. 2.5 Examining the Access Control Process Data States and Policy Roles.mp425530862023-08-23 16:05:59
-007. 2.6 Examining the Access Control Process Security and Access Control Classification.mp435015432023-08-23 16:06:00
-008. 2.7 Understanding Discretionary Access Control.mp418474662023-08-23 16:06:01
-009. 2.8 Understanding Mandatory Access Control.mp418329022023-08-23 16:06:02
-010. 2.9 Understanding Role-based Access Control.mp412418452023-08-23 16:06:03
-011. 2.10 Understanding Attribute-based Access Control.mp411605172023-08-23 16:06:04
-012. 2.11 Understanding Rule-based Access Control.mp413817592023-08-23 16:06:05
-013. 2.12 Understanding Time-based Access Control.mp45152802023-08-23 16:06:05

control-panel