* Cantinho Satkeys

Refresh History
  • j.s.: bom fim de semana  49E09B4F
    23 de Novembro de 2024, 21:01
  • j.s.: try65hytr a todos
    23 de Novembro de 2024, 21:01
  • FELISCUNHA: dgtgtr   49E09B4F  e bom fim de semana
    23 de Novembro de 2024, 12:27
  • JPratas: try65hytr A Todos  101yd91 k7y8j0
    22 de Novembro de 2024, 02:46
  • j.s.: try65hytr a todos  4tj97u<z 4tj97u<z
    21 de Novembro de 2024, 18:43
  • FELISCUNHA: dgtgtr  pessoal   49E09B4F
    20 de Novembro de 2024, 12:26
  • JPratas: try65hytr Pessoal  4tj97u<z classic k7y8j0
    19 de Novembro de 2024, 02:06
  • FELISCUNHA: ghyt74   49E09B4F  e bom fim de semana  4tj97u<z
    16 de Novembro de 2024, 11:11
  • j.s.: bom fim de semana  49E09B4F
    15 de Novembro de 2024, 17:29
  • j.s.: try65hytr a todos  4tj97u<z
    15 de Novembro de 2024, 17:29
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    15 de Novembro de 2024, 10:07
  • JPratas: try65hytr A Todos  4tj97u<z classic k7y8j0
    15 de Novembro de 2024, 03:53
  • FELISCUNHA: dgtgtr   49E09B4F
    12 de Novembro de 2024, 12:25
  • JPratas: try65hytr Pessoal  classic k7y8j0 yu7gh8
    12 de Novembro de 2024, 01:59
  • j.s.: try65hytr a todos  4tj97u<z
    11 de Novembro de 2024, 19:31
  • cereal killa: try65hytr pessoal  2dgh8i
    11 de Novembro de 2024, 18:16
  • FELISCUNHA: ghyt74   49E09B4F  e bom fim de semana  4tj97u<z
    09 de Novembro de 2024, 11:43
  • JPratas: try65hytr Pessoal  classic k7y8j0
    08 de Novembro de 2024, 01:42
  • j.s.: try65hytr a todos  49E09B4F
    07 de Novembro de 2024, 18:10
  • JPratas: dgtgtr Pessoal  49E09B4F k7y8j0
    06 de Novembro de 2024, 17:19

Autor Tópico: Cyber Security Architecture Fundamentals  (Lida 40 vezes)

0 Membros e 1 Visitante estão a ver este tópico.

Online mitsumi

  • Moderador Global
  • ***
  • Mensagens: 117428
  • Karma: +0/-0
Cyber Security Architecture Fundamentals
« em: 13 de Abril de 2023, 07:32 »

Cyber Security Architecture Fundamentals
Published 4/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.87 GB | Duration: 3h 3m

Learn all the fundamentals and skills needed to become a security architect

What you'll learn
Understand the core concepts of security architecture
Develop and design security patterns
Work with Enterprise Architecture Frameworks
Properly run threat modelling

Requirements
Some knowledge of Cyber Security is required

Description
In this course, students will learn about the principles, concepts, and best practices of designing and implementing effective cyber security architectures. The course will cover a wide range of topics, including threat modeling, risk assessment, security design patterns, access control, cryptography, network security, cloud security, and incident response.Overview of Cyber Security ArchitectureThe course will begin with an overview of the fundamental concepts of cyber security architecture, and will then delve into the specifics of how to design and implement effective security solutions. Students will learn how to identify and assess security risks, and how to develop and apply appropriate security controls to mitigate those risks.Designing Effective Security SolutionsThroughout the course, students will also explore various security design patterns and strategies, and learn how to apply these to real-world security challenges. Additionally, students will gain hands-on experience with a range of security tools and technologies, and will develop practical skills in threat modeling, risk assessment, security testing, and incident response.Course Goals and Learning OutcomesBy the end of this course, students will have a deep understanding of the principles and best practices of cyber security architecture, and will be well-equipped to design, implement, and manage effective security solutions for a wide range of applications and environments.PrerequisitesThis course assumes a basic understanding of networking concepts and protocols, as well as some experience with programming and scripting languages. Students should also have some familiarity with common security tools and technologies, such as firewalls, intrusion detection/prevention systems, and vulnerability scanners.

Overview
Section 1: Introduction

Lecture 1 Introduction to Cyber Security

Lecture 2 The Problem with Security Today

Lecture 3 Introduction to Security Architecture

Lecture 4 Who is a Security Architect?

Lecture 5 Security Principles & Approaches

Lecture 6 Cyber Security Processes

Lecture 7 Risk Management

Lecture 8 Understanding Residual Risk

Section 2: Threat Modelling

Lecture 9 Threat Modelling - Part 1

Lecture 10 Threat Modelling vs Risk Assessment

Lecture 11 Threat Modelling - Part 2

Lecture 12 STRIDE

Lecture 13 DREAD

Lecture 14 PASTA

Lecture 15 OCTAVE

Lecture 16 TRIKE

Lecture 17 Attack Trees

Section 3: Enterprise Architecture Frameworks

Lecture 18 Section Preview

Lecture 19 TOGAF Framework

Lecture 20 Zachman Framework

Lecture 21 SABSA Framework

Section 4: Cyber Architecture for Enterprise Security

Lecture 22 Network Security

Lecture 23 Application Security

Lecture 24 Endpoint Security

Lecture 25 Identity & Access Management

Lecture 26 Data Protection

Lecture 27 Vulnerability, Patch & Availability Management

Lecture 28 Supply Chain Security

Section 5: Designing for Security

Lecture 29 Security Design Patterns

Lecture 30 Security Design Pattern Example

Lecture 31 Reference Security Architectures

Section 6: Case Study

Lecture 32 Case Study Preview

Lecture 33 Business Requirements

Lecture 34 Data Classification

Lecture 35 Threat Modelling

Lecture 36 Security Requirements

Lecture 37 Reference Architecture

Lecture 38 Identifying the Residual Risk

Section 7: Conclusion

Lecture 39 Conclusion

Cyber Security professionals who want to become security architects

rapidgator.net:
Citar
https://rapidgator.net/file/515508030a556ad75e0513e126fc188b/pccbf.Cyber.Security.Architecture.Fundamentals.part1.rar.html
https://rapidgator.net/file/84c3cd0cf091e6f19dc2a92d43712619/pccbf.Cyber.Security.Architecture.Fundamentals.part2.rar.html
https://rapidgator.net/file/6aea1c9f86e8a8c0c7ac4bb60c3049c2/pccbf.Cyber.Security.Architecture.Fundamentals.part3.rar.html

uploadgig.com:
Citar
https://uploadgig.com/file/download/331238d42154557b/pccbf.Cyber.Security.Architecture.Fundamentals.part1.rar
https://uploadgig.com/file/download/9b9de92492615eEe/pccbf.Cyber.Security.Architecture.Fundamentals.part2.rar
https://uploadgig.com/file/download/df0f5CE93cd816e0/pccbf.Cyber.Security.Architecture.Fundamentals.part3.rar

nitroflare.com:
Citar
https://nitroflare.com/view/708CA807B70AB07/pccbf.Cyber.Security.Architecture.Fundamentals.part1.rar
https://nitroflare.com/view/50699AE48342DDD/pccbf.Cyber.Security.Architecture.Fundamentals.part2.rar
https://nitroflare.com/view/D98FF2374CC94D5/pccbf.Cyber.Security.Architecture.Fundamentals.part3.rar

1dl.net:
Citar
https://1dl.net/pclubzz8ipyo/pccbf.Cyber.Security.Architecture.Fundamentals.part1.rar
https://1dl.net/e5x2ay84pp9g/pccbf.Cyber.Security.Architecture.Fundamentals.part2.rar
https://1dl.net/y6wmfjxwtdck/pccbf.Cyber.Security.Architecture.Fundamentals.part3.rar