Companies Home Search Profile

Using SABSA to Architect Cloud Security

Focused View

Malcolm Shore

1:11:12

0 View
  • 001 Architecting business requirements to deliver a secure cloud deployment.mp4
    00:56
  • 002 What you should know.mp4
    00:27
  • 001 Why business has moved to the cloud.mp4
    06:28
  • 002 Security architectures for the cloud.mp4
    02:55
  • 003 SABSA strategy and planning.mp4
    05:19
  • 004 SABSA attributes.mp4
    02:03
  • 005 The lower layers of design.mp4
    03:41
  • 006 The service management matrix.mp4
    02:06
  • 001 Establishing a conceptual architecture.mp4
    04:50
  • 002 Threat modeling for cloud.mp4
    04:41
  • 003 Risk management with SABSA.mp4
    04:31
  • 004 Using attributes to collect lower layer risks.mp4
    02:19
  • 005 Thinking clouds with SABSA.mp4
    06:03
  • 006 Tiers of the CAT.mp4
    06:22
  • 007 A cloud-enhanced conceptual architecture.mp4
    02:48
  • 001 Creating the logical architecture.mp4
    03:45
  • 002 Aligning security services with attributes.mp4
    04:15
  • 003 Cloud delivered security services.mp4
    05:09
  • 004 The SABSA journey to the cloud.mp4
    01:37
  • 001 Whats next .mp4
    00:57
  • Description


    The security required for cloud deployments is quite different from the security applied to on-site infrastructure. In order to ensure the most effective cloud security, cloud deployments should be properly architected. In this course, instructor Malcolm Shore shows how to do this using the SABSA enterprise security architecture. Malcolm goes over strategy, planning, and the ongoing architectural management processes needed to maintain the architecture and keep it relevant. He walks you through establishing a conceptual architecture, threat modeling, and risk management, then explains how the elements of the contextual and conceptual layers work together to provide a conceptual architecture suitable for the cloud. Malcolm covers how to create the logical architecture and align security services with attributes. He concludes with a description of cloud-delivered security services and a review of what you covered in the course.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Malcolm Shore
    Malcolm Shore
    Instructor's Courses
    Wide range of IT experience ranging from systems programming to policy and strategic planning. Strong expertise in applied IT security, focused on policy and governance. Teaching post graduate security (forensics, information warfare, security management, applied cryptography) Past interests include virtual worlds and web3d developments. Current work focusing on Cloud, security architectures, and national-level cybersecurity Specialties: SABSA, Cloud, Cryptography, Cybersecurity Strategy, Network Survivability
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 20
    • duration 1:11:12
    • Release Date 2025/02/26

    Courses related to Network Security