Course curriculum

    1. Introduction to Security Architecture

    2. The Cultural Legacy

    3. Understanding and Prioritizing Risk

    4. Security as a Business Enabler

    5. The Meaning of Security - Summary

    1. The Origins of Architecture

    2. Managing Complexity

    3. Information Systems Architecture

    4. Enterprise Security Architecture

    5. Why Architectures Sometimes Fail to Deliver

    6. Security Architecture Needs a Holistic Approach

    7. The Meaning of Architecture - Summary

    1. Introduction to Managing the Security Architecture Program

    2. Selling Security Architecture - Influencing Opinion and Behavior

    3. Selling Security Architecture - Better Risk Management

    4. Selling Security Architecture - Getting Ready for Formal Audits

    5. Selling Security Architecture - Influencing the Analyst Community

    6. Selling Security Architecture - Enabling Flexibility for New Opportunities

    7. Selling Security Architecture - Reducing Cost and Improving Productivity

    8. Selling Security Architecture - Leveraging Trusted Business Relationships

    9. Getting Support and Budget

    10. Gathering the Information You Need

    11. Getting Everyone to Agree on the Conceptual Architecture

    12. Maintaining Senior Management Confidence Over Time

    1. 1 - Introduction to Security

    2. 2 - CIA - Confidentiality

    3. 3 - CIA - Integrity

    4. 4 - CIA - Availability

    5. 5 - DAD Triad

    6. 6 - Overprotection

    7. 7 - Understanding IAM

    8. 8 - Implementing Defense in Depth

    9. 9 - Understanding Abstraction and Data Hiding

    10. 10 - Understanding Security Bondaries

    11. 11 - Understanding Security Management

    12. 12 - Business Acumen in Cyber Security

    13. 13 - The RACI Matrix

    14. 14 - Establishing a Robust Information Security Program

    15. 15 - Evaluating and Improving Cybersecurity Programs with Key Metrics

    16. 16 - Avoid Common Reporting Mistakes to Stakeholders

    17. 17 - Mastering Security Budget Management

    18. 18 - Crafting a Comprehensive Security Strategy for Modern Organizations

    19. 19 - Navigating Third Party Relationships

    20. 20 - Establish Clear Protocols for End of Vendor Relationships

    21. 21 - Mastering Vendor Management

    22. 22 - Ensuring robust Data Protection in Vendor Contracts

    23. 23 - Effective Vendor Management Onboarding, Monitoring, and Offboarding

    24. 24 - Effective Communication

    25. 25 - Building a Strong Cybersecurity Business Case for Investment

    26. 26 - Exploring Security Frameworks and Maturity Models

    27. 27 - Implementing Security Controls

    28. 28 - Information Security Policy Documents

    29. 29 - Implementing Standards

    30. 30 - Developing Cybersecurity Policies

    31. 31 - Acceptible Use Policy

    32. 32 - Understanding Cybersecurity Threats

    33. 33 - Understanding Threat Modeling

    1. 34 - Navigating Personnel in Security

    2. 35 - Offboarding, Transfers, Terminations

    3. 36 - Building _ Managing Information Security Teams

    4. 37 - Training Employees

    5. 38 - Training Frequency and Reinforcement

    1. 39 - Understanding Risk Management

    2. 41 - Asset Valuation

    3. 42 - Threat Actors and Vulnerabilities in Risk Management

    4. 43 - What is Exposure

    5. 44 - Implementing Safeguards _ Security Measures

    6. 45 - The Difference Between an Attack and a Breach

    7. 46 - Risk Management as A C-Suite Responsibility

    8. 47 - Calculating the Exposure Factor

    9. 48 - Prioritizing Risks with Strategic Approaches

    10. 49 - Understanding Types of Risk Management

    11. 50 - Inherent Risk, Residual Risk, and Total Risk

    12. 51 - Why So Many Calculations

    13. 52 - Types of Security Controls

    14. 53 - Constant Evaluation and Improvement

    15. 54 - COBIT Framework

    16. 55 - NIST Framework

    17. 56 - ISO Standards

    18. 57 - Social Engineering

    19. 58 - Common Phishing Tactics

    20. 59 - More Social Engineering

    21. 60 - Business Continuity Planning Team

    22. 61 - Business Continuity Plan Phases

    23. 62 - Legal and Regulatory Aspects of Disaster Recovery Planning

    24. 63 - Business Impact Analysis

    25. 64 - Risk Idenitifcation in the Business Impact Analysis

    26. 65 - Prioritizing Resources through Business Impact and Risk Analysis

    27. 66 - Strategy Development Phase

    28. 67 - Documenting the Business Continuity Plan

About this course

  • $3,499.00
  • 615 lessons
  • 122.5 hours of video content

Discover your potential, starting today