Cybersecurity Architecture Fundamentals
    
    File List
    
        
            
                
                    - Chapter 1 Introduction/006. Security Principles and Approaches.mp4  260.1 MB
 
                
                    - Chapter 1 Introduction/003. The Problem with Security Today.mp4  225.8 MB
 
                
                    - Chapter 1 Introduction/009. Understanding Residual Risk.mp4  114.4 MB
 
                
                    - Chapter 4 Cyber Architecture for Enterprise Security/006. Vulnerability, Patch, and Availability Management.mp4  98.1 MB
 
                
                    - Chapter 1 Introduction/008. Risk Management.mp4  95.0 MB
 
                
                    - Chapter 1 Introduction/005. Who Is a Security Architect.mp4  93.5 MB
 
                
                    - Chapter 2 Threat Modelling/006. PASTA.mp4  90.0 MB
 
                
                    - Chapter 4 Cyber Architecture for Enterprise Security/001. Network Security.mp4  76.5 MB
 
                
                    - Chapter 6 Case Study/001. Case Study Preview.mp4  74.4 MB
 
                
                    - Chapter 2 Threat Modelling/002. Threat Modelling Versus Risk Assessment.mp4  72.1 MB
 
                
                    - Chapter 2 Threat Modelling/001. Threat Modelling - Part 1.mp4  66.9 MB
 
                
                    - Chapter 2 Threat Modelling/009. Attack Trees.mp4  65.5 MB
 
                
                    - Chapter 4 Cyber Architecture for Enterprise Security/005. Data Protection.mp4  54.1 MB
 
                
                    - Chapter 5 Designing for Security/003. Reference Security Architectures.mp4  49.6 MB
 
                
                    - Chapter 2 Threat Modelling/003. Threat Modelling - Part 2.mp4  48.4 MB
 
                
                    - Chapter 3 Enterprise Architecture Frameworks/003. Zachman Framework.mp4  42.8 MB
 
                
                    - Chapter 5 Designing for Security/002. Security Design Pattern Example.mp4  42.6 MB
 
                
                    - Chapter 1 Introduction/004. Introduction to Security Architecture.mp4  40.6 MB
 
                
                    - Chapter 5 Designing for Security/001. Security Design Patterns.mp4  39.8 MB
 
                
                    - Chapter 3 Enterprise Architecture Frameworks/004. SABSA Framework.mp4  35.3 MB
 
                
                    - Chapter 6 Case Study/004. Threat Modelling.mp4  34.9 MB
 
                
                    - Chapter 6 Case Study/006. Reference Architecture.mp4  34.7 MB
 
                
                    - Chapter 2 Threat Modelling/005. DREAD.mp4  32.7 MB
 
                
                    - Chapter 2 Threat Modelling/004. STRIDE.mp4  30.8 MB
 
                
                    - Chapter 2 Threat Modelling/008. TRIKE.mp4  29.2 MB
 
                
                    - Chapter 2 Threat Modelling/007. OCTAVE.mp4  28.8 MB
 
                
                    - Chapter 3 Enterprise Architecture Frameworks/002. TOGAF Framework.mp4  25.9 MB
 
                
                    - Chapter 1 Introduction/007. Cybersecurity Processes.mp4  25.5 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Summary+Guide.pdf  23.8 MB
 
                
                    - Chapter 4 Cyber Architecture for Enterprise Security/002. Application Security.mp4  22.6 MB
 
                
                    - Chapter 3 Enterprise Architecture Frameworks/001. Section Preview.mp4  21.9 MB
 
                
                    - Chapter 4 Cyber Architecture for Enterprise Security/007. Supply Chain Security.mp4  21.7 MB
 
                
                    - Chapter 6 Case Study/005. Security Requirements.mp4  21.5 MB
 
                
                    - Chapter 1 Introduction/002. Introduction to Cybersecurity.mp4  19.4 MB
 
                
                    - Chapter 6 Case Study/007. Identifying the Residual Risk.mp4  16.6 MB
 
                
                    - Chapter 4 Cyber Architecture for Enterprise Security/003. Endpoint Security.mp4  15.8 MB
 
                
                    - Chapter 4 Cyber Architecture for Enterprise Security/004. Identity and Access Management.mp4  15.8 MB
 
                
                    - Chapter 6 Case Study/003. Data Classification.mp4  15.6 MB
 
                
                    - Chapter 1 Introduction/001. Welcome to the Course.mp4  13.3 MB
 
                
                    - Chapter 6 Case Study/002. Business Requirements.mp4  13.0 MB
 
                
                    - Chapter 7 Conclusion/001. Conclusion.mp4  11.2 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/THREAT MODELLING vs Risk Assessment.pdf  9.7 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Attack Trees.pdf  7.8 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Identity & Access Management.pdf  6.7 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Threat Modelling.pdf  6.6 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Threat Modelling Part 2.pdf  6.6 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/TRIKE.pdf  6.5 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/STRIDE.pdf  6.1 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Who is a Security Architect.pdf  6.0 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Cyber Security Process Part 1.pdf  5.7 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/DREAD.pdf  5.0 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/CASE STUDY PREVIEW.pdf  4.6 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/OCTAVE.pdf  3.7 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Case Study - Threat Modelling.pdf  3.5 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/SABSA.pdf  3.4 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Application Security.pdf  3.3 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Endpoint Security.pdf  2.8 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/CASE STUDY Reference Architecture.pdf  2.8 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/CASE STUDY -Security Requirements.pdf  2.7 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/TOGAF.pdf  2.6 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/CASE STUDY - Identifying Residual Risk.pdf  2.5 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Intro to Cyber Security.pdf  2.4 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/CASE STUDY - Business Requirements.pdf  2.3 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/CASE STUDY - Data Classification.pdf  2.3 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/PASTA.pdf  2.2 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Reference Security Architectures.pdf  2.2 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Zachman Framework.pdf  2.1 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Security Pattern Example.pdf  1.6 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/SECURITY DESIGN PATTERNS.pdf  1.5 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Supply Chain Security.pdf  1.3 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Data Protection.pdf  1.1 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Understanding Residual Risk.pdf  1.1 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Risk management involves all processes from assessing the risk to managing it.pdf  1.0 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/ENTERPRISE ARCHITECTURE.pdf  1.0 MB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/The Problem with Security Today.pdf  905.2 KB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Vulnerability, Patch & Availability Management.pdf  891.0 KB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Network Security.pdf  822.9 KB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Intro to Security Architecture.pdf  566.0 KB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Security Principles & Approaches.pdf  361.3 KB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/LICENSE  1.0 KB
 
                
                    - Cybersecurity-Architecture-Fundamentals-main/README.md  103 bytes
 
                
            
        
     
    Download Torrent
    
    Related Resources
    
    Copyright Infringement
    
        If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.