and welcome to cyber security. Architectural fundamentals.
This is an introductory class on the practice off cyber security architecture.
and I have been in industry for more than 20 years, not just in security but in application development, enterprise architecture, deaf ops, processes and infrastructure.
And I have done on various certifications from CCS K to see SSP, CSM and recently been certified AWS solutions, architect professionals and security specialty.
I also have experiences working across multiple industries, from government to manufacturing to high tech industries.
Today, I was share some of my experiences in building and practical approach
to cyber security architecture.
is to raise awareness off all the considerations in building a secure system.
I will help you understand a few basic techniques to get started in cyber security architecture,
and at the end of this cause, you should be able to identify and document various at effects of security architecture.
No, this is our fundamentals costs, and it's not meant to make you an expert.
Do look out for more classes that go deeper in debt for the various topics that catch your interests
and upon debt skills to improve your skills.
The target audience for this class.
The cybersecurity students looking to understand a little bit about rail wall application.
For career professionals looking to make the jump into cybersecurity, you might be a solutions architect trying to get into cyber security architecture.
It's also for engineers looking to improve their understanding of cybersecurity when building systems, and also to business leaders looking to better understand the domain of cybersecurity and how cyber security architecture fits into an organization.
This class built upon some basic understanding, so we would require you to at least have some basic understanding off I T systems. Example. What a service network and points, etcetera.
We also expect some basic knowledge off some common cyber security concepts like firewalls, intrusion prevention systems and so on,
and an understanding off systems and application building blocks and structure.
So if this is the right class for you and you have to pre requisites, let's begin.
This cost consists off six main models, and each model might be broken into multiple Electra sessions.
Will saut with the introduction to cyber security.
Then we'll proceed on to do some basic trap modeling.
Follow on. We would cover enterprise security areas
like networks and points, et cetera,
and a little bit about fringe areas like Claude Mobile and data centers.
After that, we would talk about processes and how they affect an architecture design,
and we will wrap up with how to document your design
to get prepared for this class. Here are some links to some good reading materials To get you started,
you can start with the nous page on cybersecurity. There are lots of good resource is available there.
You can also go to mightiest page on all their resources on cyber security.
You can also get the free e book, an introduction to cyber security than this handbook, which is a very good resource to get started in this area.
In the next video, we will start with an introduction to what its cyber security,
which is confidentiality, integrity and availability, will put into contacts where cybersecurity, architectural fits
and I would start to illustrate why this is so difficult to do.
So. If you have time, I'll look forward to seeing you in the next lecture