TorBT - Torrents and Magnet Links Search Engine
Cybersecurity Architecture Fundamentals
- Date: 2026-05-05
- Size: 2.2 GB
- Files: 81
File Name
Size
Chapter 1 Introduction/006. Security Principles and Approaches.mp4
260 MB
Chapter 1 Introduction/002. Introduction to Cybersecurity.mp4
19 MB
Chapter 1 Introduction/003. The Problem with Security Today.mp4
226 MB
Chapter 1 Introduction/004. Introduction to Security Architecture.mp4
41 MB
Chapter 1 Introduction/005. Who Is a Security Architect.mp4
94 MB
Chapter 1 Introduction/001. Welcome to the Course.mp4
13 MB
Chapter 1 Introduction/007. Cybersecurity Processes.mp4
26 MB
Chapter 1 Introduction/008. Risk Management.mp4
95 MB
Chapter 1 Introduction/009. Understanding Residual Risk.mp4
114 MB
Chapter 2 Threat Modelling/001. Threat Modelling - Part 1.mp4
67 MB
Chapter 2 Threat Modelling/002. Threat Modelling Versus Risk Assessment.mp4
72 MB
Chapter 2 Threat Modelling/003. Threat Modelling - Part 2.mp4
48 MB
Chapter 2 Threat Modelling/004. STRIDE.mp4
31 MB
Chapter 2 Threat Modelling/005. DREAD.mp4
33 MB
Chapter 2 Threat Modelling/006. PASTA.mp4
90 MB
Chapter 2 Threat Modelling/007. OCTAVE.mp4
29 MB
Chapter 2 Threat Modelling/008. TRIKE.mp4
29 MB
Chapter 2 Threat Modelling/009. Attack Trees.mp4
66 MB
Chapter 3 Enterprise Architecture Frameworks/001. Section Preview.mp4
22 MB
Chapter 3 Enterprise Architecture Frameworks/002. TOGAF Framework.mp4
26 MB
Chapter 3 Enterprise Architecture Frameworks/003. Zachman Framework.mp4
43 MB
Chapter 3 Enterprise Architecture Frameworks/004. SABSA Framework.mp4
35 MB
Chapter 4 Cyber Architecture for Enterprise Security/001. Network Security.mp4
76 MB
Chapter 4 Cyber Architecture for Enterprise Security/002. Application Security.mp4
23 MB
Chapter 4 Cyber Architecture for Enterprise Security/003. Endpoint Security.mp4
16 MB
Chapter 4 Cyber Architecture for Enterprise Security/004. Identity and Access Management.mp4
16 MB
Chapter 4 Cyber Architecture for Enterprise Security/005. Data Protection.mp4
54 MB
Chapter 4 Cyber Architecture for Enterprise Security/006. Vulnerability, Patch, and Availability Management.mp4
98 MB
Chapter 4 Cyber Architecture for Enterprise Security/007. Supply Chain Security.mp4
22 MB
Chapter 5 Designing for Security/001. Security Design Patterns.mp4
40 MB
Chapter 5 Designing for Security/002. Security Design Pattern Example.mp4
43 MB
Chapter 5 Designing for Security/003. Reference Security Architectures.mp4
50 MB
Chapter 6 Case Study/001. Case Study Preview.mp4
74 MB
Chapter 6 Case Study/002. Business Requirements.mp4
13 MB
Chapter 6 Case Study/003. Data Classification.mp4
16 MB
Chapter 6 Case Study/004. Threat Modelling.mp4
35 MB
Chapter 6 Case Study/005. Security Requirements.mp4
22 MB
Chapter 6 Case Study/006. Reference Architecture.mp4
35 MB
Chapter 6 Case Study/007. Identifying the Residual Risk.mp4
17 MB
Chapter 7 Conclusion/001. Conclusion.mp4
11 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Summary+Guide.pdf
24 MB
Cybersecurity-Architecture-Fundamentals-main/LICENSE
1.0 kB
Cybersecurity-Architecture-Fundamentals-main/README.md
103 B
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Application Security.pdf
3.3 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Attack Trees.pdf
7.8 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/CASE STUDY - Business Requirements.pdf
2.3 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/CASE STUDY - Data Classification.pdf
2.3 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/CASE STUDY - Identifying Residual Risk.pdf
2.5 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Case Study - Threat Modelling.pdf
3.5 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/CASE STUDY -Security Requirements.pdf
2.7 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/CASE STUDY PREVIEW.pdf
4.6 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/CASE STUDY Reference Architecture.pdf
2.8 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Cyber Security Process Part 1.pdf
5.7 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Data Protection.pdf
1.1 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/DREAD.pdf
5.0 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Endpoint Security.pdf
2.8 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/ENTERPRISE ARCHITECTURE.pdf
1.0 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Identity & Access Management.pdf
6.7 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Intro to Cyber Security.pdf
2.4 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Intro to Security Architecture.pdf
566 kB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Network Security.pdf
823 kB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/OCTAVE.pdf
3.7 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/PASTA.pdf
2.2 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Reference Security Architectures.pdf
2.2 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Risk management involves all processes from assessing the risk to managing it.pdf
1.0 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/SABSA.pdf
3.4 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/SECURITY DESIGN PATTERNS.pdf
1.5 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Security Pattern Example.pdf
1.6 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Security Principles & Approaches.pdf
361 kB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/STRIDE.pdf
6.1 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Supply Chain Security.pdf
1.3 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/The Problem with Security Today.pdf
905 kB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Threat Modelling Part 2.pdf
6.6 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/THREAT MODELLING vs Risk Assessment.pdf
9.7 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Threat Modelling.pdf
6.6 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/TOGAF.pdf
2.6 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/TRIKE.pdf
6.5 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Understanding Residual Risk.pdf
1.1 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Vulnerability, Patch & Availability Management.pdf
891 kB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Who is a Security Architect.pdf
6.0 MB
Cybersecurity-Architecture-Fundamentals-main/Cyber+Architecture+Slides/Cyber Architecture Slides/Zachman Framework.pdf
2.1 MB