Domain 2.1-Given a scenario, configure identity and access management.24:38
Domain 2.2-Given a scenario, secure a network in a cloud environment Part-125:14
Domain 2.2-Given a scenario, secure a network in a cloud environment Part-217:49
Domain 2.3-Given a scenario, apply the appropriate OS and application security controls Part-130:53
Domain 2.3-Given a scenario, apply the appropriate OS and application security controls Part-228:46
Domain 2.3-Given a scenario, apply the appropriate OS and application security controls Part-320:00
Domain 2.4-Given a scenario, apply data security and compliance controls in cloud environments.32:30
Domain 2.5-Given a scenario, implement measures to meet security requirements Part-126:22
Domain 2.5-Given a scenario, implement measures to meet security requirements Part-213:09
Domain 2.6-Explain the importance of incident response procedures.21:51