مساعد Cyvitrix
×
أهلاً بك! اكتب سؤالك أو اختر اقتراحاً من الأسفل.
أسئلة مقترحة
واتساب
البريد
إرسال
أنا هنا لمساعدتك
جرّبني
×
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Security Architecture Arabic Training | دورة معمارية الأمن السيبراني
Section 1
1 Security Architecture Course Overview (12:48)
2 The Cybersecurity Architect (14:50)
3 Key Industry Frameworks (14:06)
4 Security Architecture Layers (13:31)
5 Secure Design Principles (14:42)
6 Threat Modeling Fundamentals (13:12)
7 Risk-Based Design Decisions (15:11)
8 Developing Reference Architectures (14:33)
9 Zero-Trust Architecture Deep Dive (15:35)
Section 2
11 Identity Access Architecture (12:41)
10 Network Segmentation Micro-Segmentation Strategie (13:14)
12 Data Security Architecture (14:31)
13 Application Security Architecture (13:16)
14 Cloud Security Architectures (14:18)
15 Hybrid Multi-Cloud Design Patterns (12:17)
16 Container Kubernetes Security (13:23)
17 DevSecOps Pipelines (11:50)
18 AI ML Security Architecture (13:06)
19 Security Architecture for AI and LLM Workloads (12:37)
20 Logging Monitoring Observability Architectures (13:01)
21 Resilience High Availability (12:42)
22 Cryptographic Architecture (11:35)
23 OT IIoT Security Architectures (12:49)
24 Secure Network Edge (11:14)
25 Security Architecture Governance (12:13)
26 Compliance-Driven Architecture (13:58)
27 Third-Party Ecosystem Supply Chain Security (13:10)
28 Traffic Decryption and Packet Brokers (13:07)
29 Network Visibility Architecture (13:39)
30 Identity and Access Management or IAM (12:11)
31 Privileged Access Management PAM and Secure Remote (12:17)
32 Active Directory AD Security Architecture (16:50)
33 Secure Service Edge Architecture (13:33)
34 Modern Demilitarized Zone DMZ Architecture (13:22)
35 Email Security Architecture (13:15)
36 Enterprise Service Bus ESB Design (12:52)
37 Network Architecture (13:58)
38 ACI and SDN Mindshift (15:10)
39 Business-Driven Security Architecture and Enterpri (14:23)
40 Architecture Anti-Patterns and Postmortems (15:16)
41 Operationalizing Architecture (13:40)
42 Zero-Day Readiness and Architectural Response Path (14:48)
43 Case Study - Multinational Enterprise (13:32)
44 Case Study - Banking and Fintech (15:13)
45 Case Study - OT Security (13:25)
46 Tooling Ecosystem (13:05)
47 Creating Executive Architecture Briefs Roadmaps (12:47)
48 Capstone Project (15:42)
49 Course Wrap-Up (9:15)
19 Security Architecture for AI and LLM Workloads
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock