AltSchool of Cyber Security (SEAC) – Tinyuka 2024 Third Semester Current Status Not Enrolled Price Free Get Started Login to Enroll Course Content Expand All AltSchool of Cyber Security (SEAC) WEEKLY LIVE CLASS(ES) REGISTRATION LINK AltSchool of Cyber Security (SEAC) Weekly Live Class Month 1 Week 2 – A Registration Link AltSchool of Cyber Security (SEAC) Weekly Live Class Month 1 Week 2 – B Registration Link AltSchool of Cyber Security (SEAC) Weekly Live Class Month 1 Week 3 – A Registration Link MONTH 1: WEEK 1 FUNDAMENTALS OF SECURITY ARCHITECTURE 18 Topics Expand Lesson Content 0% Complete 0/18 Steps Introduction Security Architecture in Cybersecurity Frameworks – Definition and Role 1.0 Differences Between Security Architecture, Security Engineering and Security Operations 2.0 Differences Between Security Architecture, Security Engineering and Security Operations 2.1 Differences Between Security Architecture, Security Engineering and Security Operations 2.2 Differences Between Security Architecture, Security Engineering and Security Operations 2.3 Organizational Structure Implications for Security Program 3.1 Organizational Structure Implications for Security Program 3.2 Key Architecture Frameworks – SABSA, TOGAT, Zachman 4.0 Key Architecture Frameworks – SABSA, TOGAT, Zachman 4.1 Industry Adoption Patterns for Security Architecture Framework 5.0 Industry Adoption Patterns for Security Architecture Framework 5.1 Industry Adoption Patterns for Security Architecture Framework 5.2 Security Principles in Architecture 6.0 Security Principles in Architecture 6.1 Security Principles in Architecture 6.2 Comprehensive Guide to Architectural Threat Modeling 7.0 Comprehensive Guide to Architectural Threat Modeling 7.1 LAB 8 Topics Expand Lesson Content 0% Complete 0/8 Steps Identifying Key Components and Security Challenges in Enterprise Architecture 8.0 Lab 1 Identifying Key Components and Security Challenges in Enterprise Architecture 8.1 Lab 1 Identifying Key Components and Security Challenges in Enterprise Architecture 8.2 Lab 1 Applying Security Principles to an Unsecured Network Architecture 9.0 Lab 2 Applying Security Principles to an Unsecured Network Architecture 9.1 Lab 2 Applying Security Principles to an Unsecured Network Architecture 9.2 Lab 2 Threat Modeling Using STRIDE 10.0 Lab 3 Threat Modeling Using STRIDE 10.1 Lab 3 MONTH 1: WEEK 2 DESIGNING SECURE NETWORKS 5 Topics Expand Lesson Content 0% Complete 0/5 Steps Introduction Network Segmentation Network Segmentation cont.d Zero Trust Architecture Secure DMZ Design LAB 1 Topic Expand Lesson Content 0% Complete 0/1 Steps Lab 1 – Assign Devices to VLANs Based on Their Roles