Cyber Security Architecture Fundamentals
Posted on 13 Apr 07:32 | by mitsumi | 8 views
Cyber Security Architecture Fundamentals
Published 4/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.87 GB | Duration: 3h 3m
Learn all the fundamentals and skills needed to become a security architect
Published 4/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.87 GB | Duration: 3h 3m
Learn all the fundamentals and skills needed to become a security architect
What you'll learn
Understand the core concepts of security architecture
Develop and design security patterns
Work with Enterprise Architecture Frameworks
Properly run threat modelling
Requirements
Some knowledge of Cyber Security is required
Description
In this course, students will learn about the principles, concepts, and best practices of designing and implementing effective cyber security architectures. The course will cover a wide range of topics, including threat modeling, risk assessment, security design patterns, access control, cryptography, network security, cloud security, and incident response.Overview of Cyber Security ArchitectureThe course will begin with an overview of the fundamental concepts of cyber security architecture, and will then delve into the specifics of how to design and implement effective security solutions. Students will learn how to identify and assess security risks, and how to develop and apply appropriate security controls to mitigate those risks.Designing Effective Security SolutionsThroughout the course, students will also explore various security design patterns and strategies, and learn how to apply these to real-world security challenges. Additionally, students will gain hands-on experience with a range of security tools and technologies, and will develop practical skills in threat modeling, risk assessment, security testing, and incident response.Course Goals and Learning OutcomesBy the end of this course, students will have a deep understanding of the principles and best practices of cyber security architecture, and will be well-equipped to design, implement, and manage effective security solutions for a wide range of applications and environments.PrerequisitesThis course assumes a basic understanding of networking concepts and protocols, as well as some experience with programming and scripting languages. Students should also have some familiarity with common security tools and technologies, such as firewalls, intrusion detection/prevention systems, and vulnerability scanners.
Overview
Section 1: Introduction
Lecture 1 Introduction to Cyber Security
Lecture 2 The Problem with Security Today
Lecture 3 Introduction to Security Architecture
Lecture 4 Who is a Security Architect?
Lecture 5 Security Principles & Approaches
Lecture 6 Cyber Security Processes
Lecture 7 Risk Management
Lecture 8 Understanding Residual Risk
Section 2: Threat Modelling
Lecture 9 Threat Modelling - Part 1
Lecture 10 Threat Modelling vs Risk Assessment
Lecture 11 Threat Modelling - Part 2
Lecture 12 STRIDE
Lecture 13 DREAD
Lecture 14 PASTA
Lecture 15 OCTAVE
Lecture 16 TRIKE
Lecture 17 Attack Trees
Section 3: Enterprise Architecture Frameworks
Lecture 18 Section Preview
Lecture 19 TOGAF Framework
Lecture 20 Zachman Framework
Lecture 21 SABSA Framework
Section 4: Cyber Architecture for Enterprise Security
Lecture 22 Network Security
Lecture 23 Application Security
Lecture 24 Endpoint Security
Lecture 25 Identity & Access Management
Lecture 26 Data Protection
Lecture 27 Vulnerability, Patch & Availability Management
Lecture 28 Supply Chain Security
Section 5: Designing for Security
Lecture 29 Security Design Patterns
Lecture 30 Security Design Pattern Example
Lecture 31 Reference Security Architectures
Section 6: Case Study
Lecture 32 Case Study Preview
Lecture 33 Business Requirements
Lecture 34 Data Classification
Lecture 35 Threat Modelling
Lecture 36 Security Requirements
Lecture 37 Reference Architecture
Lecture 38 Identifying the Residual Risk
Section 7: Conclusion
Lecture 39 Conclusion
Cyber Security professionals who want to become security architects
rapidgator.net:
https://rapidgator.net/file/515508030a556ad75e0513e126fc188b/pccbf.Cyber.Security.Architecture.Fundamentals.part1.rar.html
https://rapidgator.net/file/84c3cd0cf091e6f19dc2a92d43712619/pccbf.Cyber.Security.Architecture.Fundamentals.part2.rar.html
https://rapidgator.net/file/6aea1c9f86e8a8c0c7ac4bb60c3049c2/pccbf.Cyber.Security.Architecture.Fundamentals.part3.rar.html
uploadgig.com:
https://uploadgig.com/file/download/331238d42154557b/pccbf.Cyber.Security.Architecture.Fundamentals.part1.rar
https://uploadgig.com/file/download/9b9de92492615eEe/pccbf.Cyber.Security.Architecture.Fundamentals.part2.rar
https://uploadgig.com/file/download/df0f5CE93cd816e0/pccbf.Cyber.Security.Architecture.Fundamentals.part3.rar
nitro.download:
https://nitro.download/view/708CA807B70AB07/pccbf.Cyber.Security.Architecture.Fundamentals.part1.rar
https://nitro.download/view/50699AE48342DDD/pccbf.Cyber.Security.Architecture.Fundamentals.part2.rar
https://nitro.download/view/D98FF2374CC94D5/pccbf.Cyber.Security.Architecture.Fundamentals.part3.rar
1dl.net:
https://1dl.net/pclubzz8ipyo/pccbf.Cyber.Security.Architecture.Fundamentals.part1.rar
https://1dl.net/e5x2ay84pp9g/pccbf.Cyber.Security.Architecture.Fundamentals.part2.rar
https://1dl.net/y6wmfjxwtdck/pccbf.Cyber.Security.Architecture.Fundamentals.part3.rar
Related News
System Comment
Information
Users of Visitor are not allowed to comment this publication.
Facebook Comment
Member Area
Top News