Secure Architecture Design

Secure Architecture Design

English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 14 Lessons (3h 41m) | 2.13 GB

Knowing how to properly design a secure infrastructure is just as important as being able to properly configure the security controls themselves. In this course, we go through what should be considered during the planning process, including network design, authentication and authorization controls, and the importance of a well thought out logging infrastructure. In addition, you’ll also learn about how to identify threats to your infrastructure and methods to choose proper countermeasures for those threats through a process known as threat modeling.

Table of Contents

1 Course Introduction
2 Basic Security Principles
3 What is Secure Architecture
4 General Principles of Secure Architecture
5 Secure Architecture Goals
6 Secure the Users
7 Secure Infrastructure
8 Threat Modeling
9 Secure Architecture Planning
10 Creating a Secure Network
11 Logging
12 Disaster Recovery
13 Documenting the Secure Architecture
14 Course Conclusion

Homepage