FileMood

Download Cybersecurity Architecture Fundamentals

Cybersecurity Architecture Fundamentals

Name

Cybersecurity Architecture Fundamentals

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

2.4 GB

Total Files

81

Hash

460F50694C9767963FCFEE8CBB18A7EF13A4E5CB

/Chapter 1 Introduction/

006. Security Principles and Approaches.mp4

272.7 MB

002. Introduction to Cybersecurity.mp4

20.3 MB

003. The Problem with Security Today.mp4

236.8 MB

004. Introduction to Security Architecture.mp4

42.6 MB

005. Who Is a Security Architect.mp4

98.0 MB

001. Welcome to the Course.mp4

14.0 MB

007. Cybersecurity Processes.mp4

26.8 MB

008. Risk Management.mp4

99.6 MB

009. Understanding Residual Risk.mp4

120.0 MB

/Chapter 2 Threat Modelling/

001. Threat Modelling - Part 1.mp4

70.2 MB

002. Threat Modelling Versus Risk Assessment.mp4

75.6 MB

003. Threat Modelling - Part 2.mp4

50.8 MB

004. STRIDE.mp4

32.3 MB

005. DREAD.mp4

34.3 MB

006. PASTA.mp4

94.3 MB

007. OCTAVE.mp4

30.1 MB

008. TRIKE.mp4

30.6 MB

009. Attack Trees.mp4

68.7 MB

/Chapter 3 Enterprise Architecture Frameworks/

001. Section Preview.mp4

22.9 MB

002. TOGAF Framework.mp4

27.2 MB

003. Zachman Framework.mp4

44.9 MB

004. SABSA Framework.mp4

37.0 MB

/Chapter 4 Cyber Architecture for Enterprise Security/

001. Network Security.mp4

80.3 MB

002. Application Security.mp4

23.7 MB

003. Endpoint Security.mp4

16.5 MB

004. Identity and Access Management.mp4

16.5 MB

005. Data Protection.mp4

56.7 MB

006. Vulnerability, Patch, and Availability Management.mp4

102.8 MB

007. Supply Chain Security.mp4

22.8 MB

/Chapter 5 Designing for Security/

001. Security Design Patterns.mp4

41.8 MB

002. Security Design Pattern Example.mp4

44.6 MB

003. Reference Security Architectures.mp4

52.0 MB

/Chapter 6 Case Study/

001. Case Study Preview.mp4

78.0 MB

002. Business Requirements.mp4

13.6 MB

003. Data Classification.mp4

16.4 MB

004. Threat Modelling.mp4

36.6 MB

005. Security Requirements.mp4

22.5 MB

006. Reference Architecture.mp4

36.4 MB

007. Identifying the Residual Risk.mp4

17.5 MB

/Chapter 7 Conclusion/

001. Conclusion.mp4

11.7 MB

/Cybersecurity-Architecture-Fundamentals-main/

Cyber+Architecture+Summary+Guide.pdf

25.0 MB

LICENSE

1.1 KB

README.md

0.1 KB

/.../Cyber Architecture Slides/

Application Security.pdf

3.4 MB

Attack Trees.pdf

8.2 MB

CASE STUDY - Business Requirements.pdf

2.4 MB

CASE STUDY - Data Classification.pdf

2.4 MB

CASE STUDY - Identifying Residual Risk.pdf

2.6 MB

Case Study - Threat Modelling.pdf

3.6 MB

CASE STUDY -Security Requirements.pdf

2.9 MB

CASE STUDY PREVIEW.pdf

4.9 MB

CASE STUDY Reference Architecture.pdf

2.9 MB

Cyber Security Process Part 1.pdf

6.0 MB

Data Protection.pdf

1.1 MB

DREAD.pdf

5.2 MB

Endpoint Security.pdf

2.9 MB

ENTERPRISE ARCHITECTURE.pdf

1.1 MB

Identity & Access Management.pdf

7.1 MB

Intro to Cyber Security.pdf

2.5 MB

Intro to Security Architecture.pdf

579.6 KB

Network Security.pdf

842.7 KB

OCTAVE.pdf

3.8 MB

PASTA.pdf

2.3 MB

Reference Security Architectures.pdf

2.3 MB

Risk management involves all processes from assessing the risk to managing it.pdf

1.1 MB

SABSA.pdf

3.6 MB

SECURITY DESIGN PATTERNS.pdf

1.6 MB

Security Pattern Example.pdf

1.6 MB

Security Principles & Approaches.pdf

369.9 KB

STRIDE.pdf

6.4 MB

Supply Chain Security.pdf

1.3 MB

The Problem with Security Today.pdf

926.9 KB

Threat Modelling Part 2.pdf

6.9 MB

THREAT MODELLING vs Risk Assessment.pdf

10.1 MB

Threat Modelling.pdf

6.9 MB

TOGAF.pdf

2.8 MB

TRIKE.pdf

6.8 MB

Understanding Residual Risk.pdf

1.1 MB

Vulnerability, Patch & Availability Management.pdf

912.4 KB

Who is a Security Architect.pdf

6.3 MB

Zachman Framework.pdf

2.2 MB

 

Total files 81


Copyright © 2025 FileMood.com