PLU | Security Architecture (2018 EN)

Discussion in 'Information Technology' started by Kanka, Nov 30, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,047
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Kevin Henry
    Full Title: Security Architecture
    Year: 2018
    Language: English
    Genre: Educational: Security
    Skill Level: Intermediate
    Price: -
    -
    Files: MP4 (+ Slides .PDF)
    Time: 01:27:05
    Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 200 kbps
    Audio: AAC at 61 Kbps, 2 channels, 44.1 KHz



    The lack of Security Architects is a primary cause of IT system compromise and project failure. In this course, you will learn the concepts of security architecture thereby increasing your ability to contribute to project planning and success.

    Security architecture addresses the problem of disjointed and ineffective security implementations that lead to compromise of data or system or business failure. The design of an integrated and resilient security framework is the goal of this course on Security Architecture. In this course, Security Architecture, you will learn the value of strategic planning and gain the ability to design an enterprise-wide security framework. First, you will learn to secure various network and system architectures. Next, you will discover security frameworks. Finally, you will explore how to design and review a security model. When you’re finished with this course, you will have the skills and knowledge of security architecture needed to design and deploy and enterprise-wide security solution.


    Lessons:
    1. Course Overview
    01. Course Overview
    2. Architecture Design
    02. Architecture Design
    03. Common Architectures Part One
    04. Common Architectures Part Two
    05. Cloud Architecture Part One
    06. Cloud Architecture Part Two
    07. Isolation and Memory Part One
    08. Isolation and Memory Part Two
    3. Architecture Items
    09. Architecture Items Part One
    10. Architecture Items Part Two
    11. Security Control Frameworks Part One
    12. Security Control Frameworks Part Two


    -------------