Fundamentals of Information System Security Architecture
Offered By: LearnQuest via Coursera
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This course is designed for Cybersecurity and Application Security Specialists, IT Security Managers and System Administrators, Software Developers, as well as IT Consultants and Penetration Testers. The course provides an introduction to the principles of information system security architecture. The focus will be on understanding key concepts, existing frameworks, and risk assessment methodologies. It will also cover topics like the CIA triad (Confidentiality, Integrity, Availability), defense in depth, and zero-trust architectures. By the end of the course, learners should have a firm grasp of security architecture fundamentals and be ready to delve into more advanced topics.
Syllabus
- Welcome and Module 1: The Principles of Information System Security
- This module offers a foundational understanding of information security's significance in the digital age, focusing on the CIA Triad's importance for data integrity. Learn effective information protection methods, access control strategies, and grasp security management essentials for swift responses to emerging threats. Gain the essential insights needed to navigate the dynamic landscape of modern information security.
- Module 2: Existing Information Security Architecture Frameworks
- This module provides an in-depth look at key security architecture frameworks, including the Sherwood Applied Business Security Architecture (SABSA), Zero Trust, and Defense in Depth strategies. Participants will gain an in-depth grasp of these frameworks, allowing them to create adaptive security solutions that effectively protect digital assets against the ever-changing landscape of cyber threats.
- Module 3: Risk Assessment Methodologies and Security
- This module provides an in-depth review of information security risk assessment, including risk types, their significance in security architecture, metrics, and various methodologies. Discover the critical role of risk assessment, investigate OCTAVE, NIST RMF, and FAIR methodologies, and emerge prepared to assess and mitigate risks effectively in complex security environments.
Taught by
Vahab Iranmanesh
Related Courses
Abordaje del riesgo suicida en adolescentes y jóvenesUniversidad de Chile via Coursera Accompagner à la cession et à l’acquisition de sociétés
Universidade Estadual de Campinas via France Université Numerique Портфельные инвестиции: активные и пассивные стратегии
Higher School of Economics via Coursera Advanced Sukuk Structures: Issuances from Around the World
INCEIF University via FutureLearn Introduction to IT Security
Akamai via Coursera