Course curriculum
-
-
Introduction to Security Architecture
-
The Cultural Legacy
-
Understanding and Prioritizing Risk
-
Security as a Business Enabler
-
The Meaning of Security - Summary
-
-
-
The Origins of Architecture
-
Managing Complexity
-
Information Systems Architecture
-
Enterprise Security Architecture
-
Why Architectures Sometimes Fail to Deliver
-
Security Architecture Needs a Holistic Approach
-
The Meaning of Architecture - Summary
-
-
-
Introduction to Managing the Security Architecture Program
-
Selling Security Architecture - Influencing Opinion and Behavior
-
Selling Security Architecture - Better Risk Management
-
Selling Security Architecture - Getting Ready for Formal Audits
-
Selling Security Architecture - Influencing the Analyst Community
-
Selling Security Architecture - Enabling Flexibility for New Opportunities
-
Selling Security Architecture - Reducing Cost and Improving Productivity
-
Selling Security Architecture - Leveraging Trusted Business Relationships
-
Getting Support and Budget
-
Gathering the Information You Need
-
Getting Everyone to Agree on the Conceptual Architecture
-
Maintaining Senior Management Confidence Over Time
-
-
-
1 - Introduction to Security
-
2 - CIA - Confidentiality
-
3 - CIA - Integrity
-
4 - CIA - Availability
-
5 - DAD Triad
-
6 - Overprotection
-
7 - Understanding IAM
-
8 - Implementing Defense in Depth
-
9 - Understanding Abstraction and Data Hiding
-
10 - Understanding Security Bondaries
-
11 - Understanding Security Management
-
12 - Business Acumen in Cyber Security
-
13 - The RACI Matrix
-
14 - Establishing a Robust Information Security Program
-
15 - Evaluating and Improving Cybersecurity Programs with Key Metrics
-
16 - Avoid Common Reporting Mistakes to Stakeholders
-
17 - Mastering Security Budget Management
-
18 - Crafting a Comprehensive Security Strategy for Modern Organizations
-
19 - Navigating Third Party Relationships
-
20 - Establish Clear Protocols for End of Vendor Relationships
-
21 - Mastering Vendor Management
-
22 - Ensuring robust Data Protection in Vendor Contracts
-
23 - Effective Vendor Management Onboarding, Monitoring, and Offboarding
-
24 - Effective Communication
-
25 - Building a Strong Cybersecurity Business Case for Investment
-
26 - Exploring Security Frameworks and Maturity Models
-
27 - Implementing Security Controls
-
28 - Information Security Policy Documents
-
29 - Implementing Standards
-
30 - Developing Cybersecurity Policies
-
31 - Acceptible Use Policy
-
32 - Understanding Cybersecurity Threats
-
33 - Understanding Threat Modeling
-
-
-
34 - Navigating Personnel in Security
-
35 - Offboarding, Transfers, Terminations
-
36 - Building _ Managing Information Security Teams
-
37 - Training Employees
-
38 - Training Frequency and Reinforcement
-
-
-
39 - Understanding Risk Management
-
41 - Asset Valuation
-
42 - Threat Actors and Vulnerabilities in Risk Management
-
43 - What is Exposure
-
44 - Implementing Safeguards _ Security Measures
-
45 - The Difference Between an Attack and a Breach
-
46 - Risk Management as A C-Suite Responsibility
-
47 - Calculating the Exposure Factor
-
48 - Prioritizing Risks with Strategic Approaches
-
49 - Understanding Types of Risk Management
-
50 - Inherent Risk, Residual Risk, and Total Risk
-
51 - Why So Many Calculations
-
52 - Types of Security Controls
-
53 - Constant Evaluation and Improvement
-
54 - COBIT Framework
-
55 - NIST Framework
-
56 - ISO Standards
-
57 - Social Engineering
-
58 - Common Phishing Tactics
-
59 - More Social Engineering
-
60 - Business Continuity Planning Team
-
61 - Business Continuity Plan Phases
-
62 - Legal and Regulatory Aspects of Disaster Recovery Planning
-
63 - Business Impact Analysis
-
64 - Risk Idenitifcation in the Business Impact Analysis
-
65 - Prioritizing Resources through Business Impact and Risk Analysis
-
66 - Strategy Development Phase
-
67 - Documenting the Business Continuity Plan
-

About this course
- $3,499.00
- 615 lessons
- 122.5 hours of video content