TWN Learn
Search
Search
Dark mode
Light mode
Explorer
Home
❯
06 Cybersecurity
❯
Security Concepts & Frameworks
❯
Defense
Folder: 06-Cybersecurity/Security-Concepts--and--Frameworks/Defense
44 items under this folder.
Sep 07, 2025
Authentication, Authorization and Accouting (AAA)
Sep 07, 2025
Authentication
Sep 07, 2025
Authorization
Sep 07, 2025
Bell-La Padula Model
Sep 07, 2025
Biba Model
Sep 07, 2025
BlackArch
Sep 07, 2025
CIA Triad
Sep 07, 2025
Concept of Operation
Sep 07, 2025
Credential Hygiene
Sep 07, 2025
Cyber Defense Frameworks
Sep 07, 2025
DREAD
Sep 07, 2025
Defense In-Depth
Sep 07, 2025
Defensive Network Tooling
Sep 07, 2025
Defensive Security Tooling
hacking
networking
Sep 07, 2025
Diamond Model
Sep 07, 2025
Endpoint Protection (AV)
Sep 07, 2025
Endpoint Protection (EDR)
Sep 07, 2025
Governance, Risk and Compliance
Sep 07, 2025
Identity and Access Management
Sep 07, 2025
Indicators of Compromise
Sep 07, 2025
Intrusion Detection Systems
Sep 07, 2025
Intrusion Prevention Systems
Sep 07, 2025
Kali Linux
Sep 07, 2025
Least Privilege
Sep 07, 2025
Logging
Sep 07, 2025
MITRE D3FEND
Sep 07, 2025
MITRE
Sep 07, 2025
Malware Analysis
Sep 07, 2025
Multi-Factor Authentication
Sep 07, 2025
NSA Compromised Network Indicators
Sep 07, 2025
OWASP Top 10
hacking
tools
software
Learning
certification-prep
Sep 07, 2025
PASTA
Sep 07, 2025
PESTLE Model
Learning
network-security
certification-prep
Sep 07, 2025
PSPF - Security Governance
Sep 07, 2025
ParrotOS
Sep 07, 2025
Protective Security Policy Framework
Sep 07, 2025
Pyramid of Pain
Sep 07, 2025
Risk and Control
Sep 07, 2025
STRIDE
Sep 07, 2025
Security Hardening
Sep 07, 2025
Security Operations
Sep 07, 2025
Security Orchestration, Automation & Response (SOAR)
Sep 07, 2025
Security Principles
Sep 07, 2025
sandboxes & sandboxing