Cybersecurity Architecture Basics Online Course
Cybersecurity Architecture Basics Online Course
This course offers a thorough introduction to cybersecurity architecture, equipping learners with the expertise to design and implement strong security solutions. It covers core concepts and practical applications, enabling participants to evaluate security risks, implement effective controls, and apply security design patterns to real-world challenges.
Throughout the course, participants will engage in hands-on practice with various security tools and technologies. By exploring a range of security strategies and techniques, they will be well-equipped to tackle security challenges across diverse environments.
Note: This course assumes that you have a basic understanding of networking concepts and protocols, familiarity with common security tools and technologies, as well as some experience with programming and scripting languages.
Who is this course meant for?
- Ideal for cybersecurity professionals
- Perfect for students interested in gaining a deep understanding of security architecture.
What you will learn
- Understand the role of a security architect.
- Learn key security principles and approaches.
- Explore various threat models.
- Study enterprise architecture frameworks.
- Gain insights into data protection and IAM.
- Learn about reference security architecture.
Course Table of Content
Introduction
- Welcome to the Course
- Introduction to Cybersecurity
- The Problem with Security Today
- Introduction to Security Architecture
- Who Is a Security Architect?
- Security Principles and Approaches
- Cybersecurity Processes
- Risk Management
- Understanding Residual Risk
Threat Modelling
- Threat Modelling - Part 1
- Threat Modelling Versus Risk Assessment
- Threat Modelling - Part 2
- STRIDE
- DREAD
- PASTA
- OCTAVE
- TRIKE
- Attack Trees
Enterprise Architecture Frameworks
- Section Preview
- TOGAF Framework
- Zachman Framework
- SABSA Framework
Cyber Architecture for Enterprise Security
- Network Security
- Application Security
- Endpoint Security
- Identity and Access Management
- Data Protection
- Vulnerability, Patch, and Availability Management
- Supply Chain Security
Designing for Security
- Security Design Patterns
- Security Design Pattern Example
- Reference Security Architectures
Case Study
- Case Study Preview
- Business Requirements
- Data Classification
- Threat Modelling
- Security Requirements
- Reference Architecture
- Identifying the Residual Risk