Cybersecurity framework and Architecture Professional
Back to Dashboard
Hey there, great course, right? Do you like this course?
All of the most interesting lessons further. In order to continue you just need to purchase it
Get course
$500
Course sections
Section 1
Understanding of Framework and Architecture
1
TOP-Down approach and Need of a Framework
2
Enterprise Risk based Cybersecurity
3
Cyber Security Framework and Architecture
4
Type of Frameworks
Section 2
ISO/IEC 27001 Cyber Security Framework
1
Introduction to Information Security Management System (ISMS)
2
Process approach
3
Why an ISMS is important
4
Establishing, monitoring, maintaining and improving an ISMS
5
ISMS critical success factors
6
Benefits of the ISMS family of standards
Section 3
NIST Cyber Security Framework
1
Risk Management and NIST Cybersecurity Framework
2
Understanding of NIST Framework
3
NIST Framework Core
4
NIST Framework Implementation Tiers
5
NIST Framework Profile
6
Coordination of Framework Implementation
Section 4
SABSA Enterprise Security Architecture
1
What is an Architecture Framework?
2
SABSA Security Architecture Framework
3
SABSA as a six-layer model
4
SABSA Matrix
5
Develop Enterprise Security Architecture
6
SABSA Framework for Security Service Management
7
SABSA Development Process
8
SABSA Lifecycle
9
SABSA Attributes
Section 5
TOGAF Security Architecture
1
Introduction to Enterprise Architecture (EA)
2
Introduction to TOGAF Enterprise Architecture (EA)
3
TOGAF Architecture Domains
4
Architecture Development Method (ADM)
5
Security Architecture Guidance in the ADM
6
Security Guidance for ADM Architecture Requirements Management
7
Security Guidance for Preliminary Phase: Framework and Principles
8
Security Guidance for Phase A: Architecture Vision
9
Security Guidance for Phase B: Business Architecture
10
Security Guidance for Phase C: Information System Architectures
11
Security Guidance for Phase D: Technology Architecture
12
Security Guidance for Phase E: Opportunities and Solutions
13
Security Guidance for Phase F: Migration Planning
14
Security Guidance for Phase G: Implementation Governance
15
Security Guidance for Phase H: Architecture Change Management
Section 6
Framework Mapping, Controls and Applications, Real world Use cases
1
Framework Mapping with controls
2
Enterprise Architecture (EA) Tools
Section 7
Final Quiz
1
Quiz
30 questions
Questions
My Question
{{ comment.replies_count }}
Send
Load More
Back to Q&A List
Add Comment
{{ message }}
Send
TOGAF Security Architecture
Security Guidance for Phase H: Architecture Change Management
Lesson is locked. Please Buy course to proceed.
TOGAF Security Architecture
Security Guidance for Phase G: Implementation Governance
Complete
Framework Mapping, Controls and Applications, Real world Use cases
Framework Mapping with controls
×
This website uses cookies and asks your personal data to enhance your browsing experience.
Ok, I agree
Privacy Policy
Questions
My Question