Cybersecurity framework and Architecture Professional

4 out of 5
4
6 reviews
Understanding Cybersecurity Frameworks

NIST Cyber Security Framework
  • Key Framework Attributes
  • The Framework Core: Establishes a Common Language
  • Implementation Tiers
TOGAF Security Architecture
  • TOGAF Capability Framework
  • Architecture Development Method (ADM)
  • Deliverables, Artifacts, and Building Blocks
SABSA Enterprise Security Architecture
  • SABSA Security Architecture Framework
  • SABSA Domain Concepts
  • SABSA Methodology and Applications
Framework Mapping, Controls and Applications
  • Framework Categories and Sub Categories
  • Framework Controls and Mapping with Categories
  • Implementation of controls

Understanding of Framework and Architecture

1
TOP-Down approach and Need of a Framework
30
2
Enterprise Risk based Cybersecurity
30
3
Cyber Security Framework and Architecture
30
4
Type of Frameworks
30

ISO/IEC 27001 Cyber Security Framework

1
Introduction to Information Security Management System (ISMS)
30
2
Process approach
30
3
Why an ISMS is important
30
4
Establishing, monitoring, maintaining and improving an ISMS
30
5
ISMS critical success factors
30
6
Benefits of the ISMS family of standards
30

NIST Cyber Security Framework

1
Risk Management and NIST Cybersecurity Framework
30
2
Understanding of NIST Framework
30
3
NIST Framework Core
30
4
NIST Framework Implementation Tiers
30
5
NIST Framework Profile
30
6
Coordination of Framework Implementation
30

SABSA Enterprise Security Architecture

1
What is an Architecture Framework?
30
2
SABSA Security Architecture Framework
30
3
SABSA as a six-layer model
30
4
SABSA Matrix
30
5
Develop Enterprise Security Architecture
30
6
SABSA Framework for Security Service Management
30
7
SABSA Development Process
30
8
SABSA Lifecycle
30
9
SABSA Attributes
30

TOGAF Security Architecture

1
Introduction to Enterprise Architecture (EA)
30
2
Introduction to TOGAF Enterprise Architecture (EA)
30
3
TOGAF Architecture Domains
30
4
Architecture Development Method (ADM)
30
5
Security Architecture Guidance in the ADM
30
6
Security Guidance for ADM Architecture Requirements Management
30
7
Security Guidance for Preliminary Phase: Framework and Principles
30
8
Security Guidance for Phase A: Architecture Vision
30
9
Security Guidance for Phase B: Business Architecture
30
10
Security Guidance for Phase C: Information System Architectures
30
11
Security Guidance for Phase D: Technology Architecture
30
12
Security Guidance for Phase E: Opportunities and Solutions
13
Security Guidance for Phase F: Migration Planning
14
Security Guidance for Phase G: Implementation Governance
15
Security Guidance for Phase H: Architecture Change Management

Framework Mapping, Controls and Applications, Real world Use cases

1
Framework Mapping with controls
2
Enterprise Architecture (EA) Tools

Final Quiz

1
Quiz
30 questions
Faq Content 1
Faq Content 2

Productivity Hacks to Get More Done in 2018

— 28 February 2017

  1. Facebook News Feed Eradicator (free chrome extension) Stay focused by removing your Facebook newsfeed and replacing it with an inspirational quote. Disable the tool anytime you want to see what friends are up to!
  2. Hide My Inbox (free chrome extension for Gmail) Stay focused by hiding your inbox. Click "show your inbox" at a scheduled time and batch processs everything one go.
  3. Habitica (free mobile + web app) Gamify your to do list. Treat your life like a game and earn gold goins for getting stuff done!


4
4 out of 5
6 Ratings

Detailed Rating

Stars 5
3
Stars 4
0
Stars 3
3
Stars 2
0
Stars 1
0

{{ review.user }}

{{ review.time }}
 

Show more
Please, login to leave a review
Get course
Enrolled: 0 students
Duration: 40 hours
Lectures: 42

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed
×
This website uses cookies and asks your personal data to enhance your browsing experience.