What is a Security Architect

Cross Cutting Domain

This course is intended to provide a deeper understanding of Security Architecture. Learning is enhanced with hands-on experience through exercises based on real-world case studies.

The goal of the information systems security architect is to design controls that effectively manage risk associated with information and information technology.  The goal of the security architect is to protect the enterprise not the technology.

Effective security architectures are fully integrated with the architecture of the enterprise.  Security architects must work with, not against, the tools, practices, and culture of the enterprise.  They must balance the need to protect against the drive to succeed.

Key Learning Objectives:

On completing this course, students will be able to:

  • Identify and assess business risks associated with information and information technology.
  • Understand how to communicate risk.
  • Describe the key information security concerns of confidentiality, integrity, and availability.
  • Identify and describe the features found in typical information systems architectures including networks, operating systems, and applications.
  • Describe how security fits with architecture and systems development methodologies
  • Identify and describe common security controls.
  • Understand the connection between information systems security and privacy
  • Comprehend the information systems security standards landscape.
  • Define assurance and understand the role of assurance in information systems security.
  • Identify and describe the top 20 information system safeguards.

Security Architecture Training Course

Included in the delivery:

  • 3 days of instruction
    • Lecture
    • Workshop Exercises
    • Exercise review
  • Electronic copy of all Conexiam courseware and exercise materials
  • Electronic copy of all Navigate templates and public architecture tools used in the course
    • Students have access to up-dated courseware, exercise materials, Navigate templates and public architecture contents for over one year
  • References to relevant literature Φ

Φ Conexiam maintains a library of relevant literature used in internal development of our staff and consulting practice. The bulk of this library is from the Centre for Information Systems Research, MIT Sloane and the Harvard Business Review. Before this class the assigned instructor will review our library and select an appropriate literature. Where the literature is not publicly available Conexiam will acquire a licensed electronic copy for each student.

All course material is provided electronically. As well, for in-class delivery course slides and exercise materials are provided in a binder.

Recommended Prerequisites:

Recommended Prerequisites:

An understanding of systems or enterprise architecture. Completion of TOGAF® 9 Certification or EA with TOGAF® and Navigate™ is an asset.

Who Should Attend:

  • Security engineers and designers who want to better understand the big picture
  • Enterprise and system architects who want to understand security

Purchase the Security Architecture Course

The Security Architecture class can either be purchase individually from any scheduled classes or ordered as a custom course for your organization
For more information on Conexiam’s custom courses

This configurable course can be purchased online for your organization Security Architecture course.
Or please contact [email protected] (Contact Conexiam)

Open Reference Material

We openly test our method’s effectiveness internally and with our peers.  We are active in the Open Group’s development of standards and guidance on how to use them. In the Security space we have been deeply involved in:

Conexiam Training Value Add

As part of our program of sharing our expertise in Enterprise Architecture we have started publishing our approach and making free on-line training available.

All Conexiam students have access to

Follow-On Courses:

These courses enable participants to develop specialized skills applicable to a domain, or techniques, such as soft-skills and analysis. In-house we spend far more time developing domain and specialized technique skills.  We believe enterprise architecture is the smart way for organizations to solve complex problems and deliver on their business strategy. For Conexiam, enterprise architecture and TOGAF® 9.1 are means, not ends.

Ready to find out more?

Drop us a line today for a free quote!

Second Heading

2nd block of text

Expect Failure

gjhg jkhg jkhg

Call out Header

Complete call out

Third Heading

When linking to agile software development, the same question is asked, what they should the team assist in answering. Some of the alignment is driven by what the enterprise architecture team is designed to support.

  1. defining the agile approach
  2. guiding the backlog in sprint
  3. constraining the sprints
  4. solving for cross product dependency

Next call out heading

Next call-out

Ready to find out more?

Drop us a line today for a free quote!

Scroll to Top