Companies Home Search Profile

Cybersecurity Foundations: Security Architecture

Focused View

Pete Lindstrom

44:15

76 View
  • 01 - Protect your enterprise with the four disciplines of cybersecurity.mp4
    01:03
  • 02 - A brief introduction to security architecture frameworks.mp4
    02:46
  • 03 - A function and component-based approach to security architecture.mp4
    03:00
  • 04 - The four disciplines of cybersecurity.mp4
    03:49
  • 01 - Generating your identity management objectives.mp4
    01:49
  • 02 - Collecting your core identity management capabilities.mp4
    02:01
  • 03 - Assembling your identity management platform.mp4
    03:09
  • 01 - Generating your vulnerability management objectives.mp4
    02:05
  • 02 - Collecting your core vulnerability management capabilities.mp4
    02:15
  • 03 - Assembling your vulnerability management platform.mp4
    03:36
  • 01 - Generating your threat management objectives.mp4
    02:12
  • 02 - Collecting your core threat management capabilities.mp4
    01:53
  • 03 - Assembling your threat management platform.mp4
    01:58
  • 01 - Generating your trust management objectives.mp4
    02:08
  • 02 - Collecting your core trust management capabilities.mp4
    02:39
  • 03 - Assembling your trust management platform.mp4
    01:52
  • 01 - Building an enterprise reference security architecture.mp4
    02:14
  • 02 - Building a zero trust architecture.mp4
    02:25
  • 01 - Next steps.mp4
    01:21
  • Description


    Enterprise Security Architects as well as other cybersecurity and IT professionals are awash with marketing buzzwords and bombarded by security products and services whose functions can be extremely hard to decipher. Cloud, the platformization of IT, and growing market pressures are driving product categories that have partially overlapping functionality and lead to inefficient and potentially ineffective architectures. The reality is that these solutions can be deconstructed and recomposed to rationalize and optimize a cybersecurity architecture if one understands the basic types of cybersecurity functions and their use cases within an enterprise.

    This course provides a “building blocks” approach to enterprise security architecture that defines its components and functions in logical ways that can be leveraged throughout an enterprise with all of its data centers, clouds, and networks and incorporating all of its digital use cases.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Pete Lindstrom
    Pete Lindstrom
    Instructor's Courses
    Pete Lindstrom is a cybersecurity strategist. Pete is the VP of security strategies at IDC. He has over 25 years of information security and cybersecurity operations, management, and audit positions. He's worked in a wide variety of industries, including public accounting, pharmaceuticals, financial services, health care. He also spent five years in the United States Marine Corps and is a veteran of Operations Desert Shield and Desert Storm.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 19
    • duration 44:15
    • Release Date 2022/12/28