TWN Learn
Search
Search
Dark mode
Light mode
Explorer
Home
❯
06 Cybersecurity
❯
Security Concepts & Frameworks
❯
Defense
Folder: 06-Cybersecurity/Security-Concepts--and--Frameworks/Defense
44 items under this folder.
Mar 10, 2026
Authentication, Authorization and Accouting (AAA)
Mar 10, 2026
Authentication
Mar 10, 2026
Authorization
Mar 10, 2026
Bell-La Padula Model
Mar 10, 2026
Biba Model
Mar 10, 2026
BlackArch
Mar 10, 2026
CIA Triad
Mar 10, 2026
Concept of Operation
Mar 10, 2026
Credential Hygiene
Mar 10, 2026
Cyber Defense Frameworks
Mar 10, 2026
DREAD
Mar 10, 2026
Defense In-Depth
Mar 10, 2026
Defensive Network Tooling
Mar 10, 2026
Defensive Security Tooling
hacking
networking
Mar 10, 2026
Diamond Model
Mar 10, 2026
Endpoint Protection (AV)
Mar 10, 2026
Endpoint Protection (EDR)
Mar 10, 2026
Governance, Risk and Compliance
Mar 10, 2026
Identity and Access Management
Mar 10, 2026
Indicators of Compromise
Mar 10, 2026
Intrusion Detection Systems
Mar 10, 2026
Intrusion Prevention Systems
Mar 10, 2026
Kali Linux
Mar 10, 2026
Least Privilege
Mar 10, 2026
Logging
Mar 10, 2026
MITRE D3FEND
Mar 10, 2026
MITRE
Mar 10, 2026
Malware Analysis
Mar 10, 2026
Multi-Factor Authentication
Mar 10, 2026
NSA Compromised Network Indicators
Mar 10, 2026
OWASP Top 10
hacking
tools
software
Learning
certification-prep
Mar 10, 2026
PASTA
Mar 10, 2026
PESTLE Model
Learning
network-security
certification-prep
Mar 10, 2026
PSPF - Security Governance
Mar 10, 2026
ParrotOS
Mar 10, 2026
Protective Security Policy Framework
Mar 10, 2026
Pyramid of Pain
Mar 10, 2026
Risk and Control
Mar 10, 2026
STRIDE
Mar 10, 2026
Security Hardening
Mar 10, 2026
Security Operations
Mar 10, 2026
Security Orchestration, Automation & Response (SOAR)
Mar 10, 2026
Security Principles
Mar 10, 2026
sandboxes & sandboxing