Fundamentals of Cybersecurity Architecture
Offered By: Cybrary
Course Description
Overview
What is Enterprise Security Architecture? A framework for applying a comprehensive method of describing the current and future structure for an organization's security processes so that they align with the company's overall strategic direction. What will I learn? A refresher on what a security architecture is What elements comprise its' design focus Different protection mechanisms The role a security kernel plays. In this course, you will get a refresher on what a Security Architecture is, what elements comprise its design focus, different protection mechanisms and the role the security kernel plays.
Cyber security architecture is the design artifacts that describe how the security controls are positioned and how they relate to the overall systems architecture. Cyber security architecture maintains the system’s quality attributes such as confidentiality, integrity and availability.
The target audience for this class are:
- Practicing cybersecurity professionals who wants a further appreciation of security architecture.
- Enterprise architects
- Cybersecurity management
- Application architects
Syllabus
- Module 1: Introduction
- 1.0 Introduction to the Class
- 1.1 Introduction to Cybersecurity
- Module 2: Threat Modeling
- 2.1 Threat Modeling Part 1
- 2.2 Threat Modeling Part 2
- 2.3 Threat Modeling Part 3
- Module 3: Enterprise Security Areas
- 3.1 Enterprise Security Areas Part 1
- 3.2 Enterprise Security Areas Part 2
- 3.3 Enterprise Security Areas Part 3
- Module 4: Other Enterprise Security Areas
- 4.1 Other Enterprise Security Areas Part 1
- 4.2 Other Enterprise Security Areas Part 2
- 4.3 Other Enterprise Security Areas Part 3
- Module 5: Cybersecurity Processes
- 5.1 Cybersecurity Processes Part 1
- 5.2 Cybersecurity Processes Part 2
- Module 6: Architecture Documentation
- 6.1 Architecture Documentation Part 1
- 6.2 Architecture Documentation Part 2
- Module 7: Case Study
- 7.1 Case Study
Taught by
Ian Loe
Related Courses
Менеджмент информационной безопасностиHigher School of Economics via Coursera Planning a Security Incident Response
Microsoft via edX Identifying Security Vulnerabilities
University of California, Davis via Coursera Secure Coding Practices
University of California, Davis via Coursera Atlas Security
MongoDB University