مساعد Cyvitrix
×
أهلاً بك! اكتب سؤالك أو اختر اقتراحاً من الأسفل.
أسئلة مقترحة
واتساب
البريد
إرسال
أنا هنا لمساعدتك
جرّبني
×
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Security Architecture Arabic Training | دورة معمارية الأمن السيبراني
Security Architecture Training Section 1
Lecture 1 Security Architecture Course Overview (10:59)
Lecture 2 The Cybersecurity Architect (12:39)
Lecture 3 Key Industry Frameworks (11:48)
Lecture 4 Security Architecture Layers (11:04)
Lecture 5 Secure Design Principles (12:12)
Lecture 6 Threat Modeling Fundamentals (11:30)
Lecture 7 Risk-Based Design Decisions (12:51)
Lecture 8 Developing Reference Architectures (12:41)
Lecture 9 Zero-Trust Architecture Deep Dive (12:35)
Lecture 10 Network Segmentation Micro-Segmentation Strategie (10:59)
Lecture 11 Identity Access Architecture (10:32)
Security Architecture Training Section 2
Lecture 12 Data Security Architecture (11:36)
Lecture 13 Application Security Architecture (10:20)
Lecture 14 Cloud Security Architectures (11:41)
Lecture 15 Hybrid Multi-Cloud Design Patterns (10:12)
Lecture 16 Container Kubernetes Security (10:18)
Lecture 17 DevSecOps Pipelines (9:52)
Lecture 18 AI ML Security Architecture (10:56)
Lecture 19 Security Architecture for AI and LLM Workloads (10:33)
Lecture 20 Logging Monitoring Observability Architectures (10:12)
Lecture 21 Resilience High Availability (9:46)
Lecture 22 Cryptographic Architecture (9:47)
Lecture 23 OT IIoT Security Architectures (10:07)
Lecture 24 Secure Network Edge (9:37)
Lecture 25 Security Architecture Governance (9:54)
Lecture 26 Compliance-Driven Architecture (11:43)
Lecture 27 Third-Party Ecosystem Supply Chain Security (10:55)
Lecture 28 Traffic Decryption and Packet Brokers (10:54)
Lecture 29 Network Visibility Architecture (10:13)
Lecture 30 Identity and Access Management or IAM (9:48)
Lecture 31 Privileged Access Management PAM and Secure Remote (10:23)
Lecture 32 Active Directory AD Security Architecture (14:25)
Lecture 33 Secure Service Edge Architecture (11:04)
Lecture 34 Modern Demilitarized Zone DMZ Architecture (10:51)
Lecture 35 Email Security Architecture (10:24)
Lecture 36 Enterprise Service Bus ESB Design (11:00)
Lecture 37 Network Architecture (11:34)
Lecture 38 ACI and SDN Mindshift (12:34)
Lecture 39 Business-Driven Security Architecture and Enterpri (11:37)
Lecture 40 Architecture Anti-Patterns and Postmortems (12:06)
Lecture 41 Operationalizing Architecture (11:53)
Lecture 42 Zero-Day Readiness and Architectural Response Path (12:18)
Lecture 43 Case Study - Multinational Enterprise (10:59)
Lecture 44 Case Study - Banking and Fintech (13:06)
Lecture 45 Case Study - OT Security (10:59)
Lecture 46 Tooling Ecosystem (10:36)
Lecture 47 Creating Executive Architecture Briefs Roadmaps (10:40)
Lecture 48 Capstone Project (12:40)
Lecture 49 Course Wrap-Up (7:50)
Lecture 33 Secure Service Edge Architecture
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock