Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Fundamentals of Cybersecurity Architecture

via Cybrary

Description

What is Enterprise Security Architecture? A framework for applying a comprehensive method of describing the current and future structure for an organization's security processes so that they align with the company's overall strategic direction. What will I learn? A refresher on what a security architecture is What elements comprise its' design focus Different protection mechanisms The role a security kernel plays. In this course, you will get a refresher on what a Security Architecture is, what elements comprise its design focus, different protection mechanisms and the role the security kernel plays.

Cyber security architecture is the design artifacts that describe how the security controls are positioned and how they relate to the overall systems architecture. Cyber security architecture maintains the system’s quality attributes such as confidentiality, integrity and availability.

The target audience for this class are:

  • Practicing cybersecurity professionals who wants a further appreciation of security architecture.
  • Enterprise architects
  • Cybersecurity management
  • Application architects

Tags

Syllabus

  • Module 1: Introduction
    • 1.0 Introduction to the Class
    • 1.1 Introduction to Cybersecurity
  • Module 2: Threat Modeling
    • 2.1 Threat Modeling Part 1
    • 2.2 Threat Modeling Part 2
    • 2.3 Threat Modeling Part 3
  • Module 3: Enterprise Security Areas
    • 3.1 Enterprise Security Areas Part 1
    • 3.2 Enterprise Security Areas Part 2
    • 3.3 Enterprise Security Areas Part 3
  • Module 4: Other Enterprise Security Areas
    • 4.1 Other Enterprise Security Areas Part 1
    • 4.2 Other Enterprise Security Areas Part 2
    • 4.3 Other Enterprise Security Areas Part 3
  • Module 5: Cybersecurity Processes
    • 5.1 Cybersecurity Processes Part 1
    • 5.2 Cybersecurity Processes Part 2
  • Module 6: Architecture Documentation
    • 6.1 Architecture Documentation Part 1
    • 6.2 Architecture Documentation Part 2
  • Module 7: Case Study
    • 7.1 Case Study

Online Course


Fundamentals of Cybersecurity Architecture

via Cybrary
Affiliate notice

What is Enterprise Security Architecture? A framework for applying a comprehensive method of describing the current and future structure for an organization's security processes so that they align with the company's overall strategic direction. What will I learn? A refresher on what a security architecture is What elements comprise its' design focus Different protection mechanisms The role a security kernel plays. In this course, you will get a refresher on what a Security Architecture is, what elements comprise its design focus, different protection mechanisms and the role the security kernel plays.

Cyber security architecture is the design artifacts that describe how the security controls are positioned and how they relate to the overall systems architecture. Cyber security architecture maintains the system’s quality attributes such as confidentiality, integrity and availability.

The target audience for this class are:

  • Practicing cybersecurity professionals who wants a further appreciation of security architecture.
  • Enterprise architects
  • Cybersecurity management
  • Application architects

  • Module 1: Introduction
    • 1.0 Introduction to the Class
    • 1.1 Introduction to Cybersecurity
  • Module 2: Threat Modeling
    • 2.1 Threat Modeling Part 1
    • 2.2 Threat Modeling Part 2
    • 2.3 Threat Modeling Part 3
  • Module 3: Enterprise Security Areas
    • 3.1 Enterprise Security Areas Part 1
    • 3.2 Enterprise Security Areas Part 2
    • 3.3 Enterprise Security Areas Part 3
  • Module 4: Other Enterprise Security Areas
    • 4.1 Other Enterprise Security Areas Part 1
    • 4.2 Other Enterprise Security Areas Part 2
    • 4.3 Other Enterprise Security Areas Part 3
  • Module 5: Cybersecurity Processes
    • 5.1 Cybersecurity Processes Part 1
    • 5.2 Cybersecurity Processes Part 2
  • Module 6: Architecture Documentation
    • 6.1 Architecture Documentation Part 1
    • 6.2 Architecture Documentation Part 2
  • Module 7: Case Study
    • 7.1 Case Study