Cybersecurity Architecture Overview- Welcome
Course Introduction
()
Prerequisites and Course Syllabus
Cybersecurity Architecture Overview-Getting Started with Cybersecurity Architecture
Five Principles to Follow (and One to Avoid)
()
Fundamentals of Confidentiality, Integrity, and Availability
()
Roles and Tools
()
Module 1 Summary: Cybersecurity Architecture Overview
Access Management and Endpoint Security-Identity and Access Management and Endpoints
Who Are You? Identity and Access Management Really Wants to Know
()
Endpoints Are the IT Front Door - Guard Them
()
Module 2 Summary: Access Management and Endpoint Security
Network, Application, and Data Security-Security Domains
Network Security
()
Lab Demo
()
Application Security
()
Data Security
()
Module 3 Summary: Network, Application, and Data Security
Detection and Response-Detecting Cyberattacks and Creating a Response
Detection
()
Response
()
Module 4 Summary: Detection and Response
Final Project, Exam, and Course Wrap-Up-Course Wrap-Up
Course Summary: Cybersecurity Architecture
Congratulations and Next Steps
Thanks from the Course Team