1. Organization, Accounts and Editions
2. Account Identifiers
3. One Account benefits vs disadvantages
4. Compliance
5. Parameters
6. Storage Integration
7. Replication and Failover
8. Public and Private Connection
9. Access Control Overview
10. System-Defined Roles and Custom Roles
11. System-defined Roles (Best Practices)
12. Primary and Secondary Roles
13. Access Control Commands
14.1 access-control.zip
14. [Hands-On] - Access Control
15. Access Control (Best Practices)
16.1 managed-schemas.zip
16. [Hands-On] - Managed Schemas
17. Sensitive Data (Best Practices)
18. Authentication Overview
19. Authentication for Humans
20. [Hands-On] Multi-Factor Authentication
21. Authentication for Machines - Part 1
22. Authentication for Machines - Part 2
23. Network Security
24.1 network-policies.zip
24. [Hands On] Network Policies
25. End-to-End Encryption
26. Encryption Key Management
27. Secure Data Sharing
28.1 secure-data-sharing.zip
28. [Hands-On] - Secure Data Sharing
29. Time Travel
30.1 time-travel.zip
30. [Hands-On] Time Travel
31. Time Travel.html
32. Secure Views
33. Column-level Security
34.1 column-level-security.zip
34. [Hands-On] Column-level Security
35. Cloning