Fundamentals of Cybersecurity Architecture
Offered By: Cybrary
Course Description
Overview
What is Enterprise Security Architecture? A framework for applying a comprehensive method of describing the current and future structure for an organization's security processes so that they align with the company's overall strategic direction. What will I learn? A refresher on what a security architecture is What elements comprise its' design focus Different protection mechanisms The role a security kernel plays. In this course, you will get a refresher on what a Security Architecture is, what elements comprise its design focus, different protection mechanisms and the role the security kernel plays.
Cyber security architecture is the design artifacts that describe how the security controls are positioned and how they relate to the overall systems architecture. Cyber security architecture maintains the system’s quality attributes such as confidentiality, integrity and availability.
The target audience for this class are:
- Practicing cybersecurity professionals who wants a further appreciation of security architecture.
- Enterprise architects
- Cybersecurity management
- Application architects
Syllabus
- Module 1: Introduction
- 1.0 Introduction to the Class
- 1.1 Introduction to Cybersecurity
- Module 2: Threat Modeling
- 2.1 Threat Modeling Part 1
- 2.2 Threat Modeling Part 2
- 2.3 Threat Modeling Part 3
- Module 3: Enterprise Security Areas
- 3.1 Enterprise Security Areas Part 1
- 3.2 Enterprise Security Areas Part 2
- 3.3 Enterprise Security Areas Part 3
- Module 4: Other Enterprise Security Areas
- 4.1 Other Enterprise Security Areas Part 1
- 4.2 Other Enterprise Security Areas Part 2
- 4.3 Other Enterprise Security Areas Part 3
- Module 5: Cybersecurity Processes
- 5.1 Cybersecurity Processes Part 1
- 5.2 Cybersecurity Processes Part 2
- Module 6: Architecture Documentation
- 6.1 Architecture Documentation Part 1
- 6.2 Architecture Documentation Part 2
- Module 7: Case Study
- 7.1 Case Study
Taught by
Ian Loe
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network