TorBT - Torrents and Magnet Links Search Engine

[ WebToolTip.com ] Udemy - Cybersecurity Architecture and Design Masterclass

File Name
Size
Get Bonus Downloads Here.url
180 B
~Get Your Files Here !/1 - Foundations and Strategic Architecture Thinking/1 -Why Cybersecurity Architecture and Design Are Critical Today.mp4
121 MB
~Get Your Files Here !/1 - Foundations and Strategic Architecture Thinking/2 -Key Industry Frameworks SABSA, TOGAF, NIST SP 800-160, ISO IEC 27001.mp4
128 MB
~Get Your Files Here !/1 - Foundations and Strategic Architecture Thinking/3 -Security Architecture Layers Business, Data, Application, Technology.mp4
121 MB
~Get Your Files Here !/1 - Foundations and Strategic Architecture Thinking/4 -Secure Design Principles Least Privilege, Defense-in-Depth, Fail-Safe Defaults.mp4
130 MB
~Get Your Files Here !/1 - Foundations and Strategic Architecture Thinking/5 -Threat Modeling Fundamentals STRIDE, PASTA, MITRE ATT&CK Mapping.mp4
127 MB
~Get Your Files Here !/1 - Foundations and Strategic Architecture Thinking/6 - Key Points.html
4.8 kB
~Get Your Files Here !/1 - Foundations and Strategic Architecture Thinking/6 - Secure Software Supply Chain.html
4.9 kB
~Get Your Files Here !/2 - Risk-Based and Business-Aligned Design/1 -Risk-Based Design Decisions Aligning Controls to Business Impact.mp4
110 MB
~Get Your Files Here !/2 - Risk-Based and Business-Aligned Design/2 -Developing Reference Architectures Templates, Blueprints, and Patterns.mp4
142 MB
~Get Your Files Here !/2 - Risk-Based and Business-Aligned Design/3 -Business-Driven Security Architecture and Enterprise Risk Mapping.mp4
134 MB
~Get Your Files Here !/3 - Identity, Access, and Zero Trust Models/1 -Zero-Trust Architecture Deep Dive Pillars, Controls, and Implementation Paths.mp4
119 MB
~Get Your Files Here !/3 - Identity, Access, and Zero Trust Models/2 -Identity and Access Architecture IAM, PAM, Federation, and Just-in-Time Access.mp4
119 MB
~Get Your Files Here !/3 - Identity, Access, and Zero Trust Models/3 -Privileged Access Management and Secure Remote Access.mp4
110 MB
~Get Your Files Here !/3 - Identity, Access, and Zero Trust Models/4 -Active Directory Security Architecture Tiering, Hardening, and Detection.mp4
113 MB
~Get Your Files Here !/4 - Tools, Communication, and Executive Enablement/1 -The Security Architect Role, Personality, Mindset, and Business Alignment.mp4
137 MB
~Get Your Files Here !/4 - Tools, Communication, and Executive Enablement/2 -Tooling Ecosystem Architecture Modeling, Automated Compliance, IaC Scanning.mp4
112 MB
~Get Your Files Here !/4 - Tools, Communication, and Executive Enablement/3 -Creating Executive Architecture Briefs and Roadmaps Storytelling with PPT.mp4
118 MB
~Get Your Files Here !/5 - Capstone and Conclusion/1 -Capstone Project Draft a Secure Reference Architecture and Design Justification.mp4
109 MB
~Get Your Files Here !/5 - Capstone and Conclusion/2 -Course Wrap-Up Maturity Roadmap and Next Steps for Aspiring Security Architects.mp4
70 MB
~Get Your Files Here !/Bonus Resources.txt
70 B