Security Architecture
Cross Cutting Domain
This course is intended to provide a deeper understanding of Security Architecture. Learning is enhanced with hands-on experience through exercises based on real-world case studies.
The goal of the information systems security architect is to design controls that effectively manage risk associated with information and information technology. The goal of the security architect is to protect the enterprise not the technology.
Effective security architectures are fully integrated with the architecture of the enterprise. Security architects must work with, not against, the tools, practices, and culture of the enterprise. They must balance the need to protect against the drive to succeed.
Key Learning Objectives:
On completing this course, students will be able to:
- Identify and assess business risks associated with information and information technology.
- Understand how to communicate risk.
- Describe the key information security concerns of confidentiality, integrity, and availability.
- Identify and describe the features found in typical information systems architectures including networks, operating systems, and applications.
- Describe how security fits with architecture and systems development methodologies
- Identify and describe common security controls.
- Understand the connection between information systems security and privacy
- Comprehend the information systems security standards landscape.
- Define assurance and understand the role of assurance in information systems security.
- Identify and describe the top 20 information system safeguards.
Security Architecture Training Course
Included in the delivery:
- 3 days of instruction
- Lecture
- Workshop Exercises
- Exercise review
- Electronic copy of all Conexiam courseware and exercise materials
- Electronic copy of all Navigate templates and public architecture tools used in the course
- Students have access to up-dated courseware, exercise materials, Navigate templates and public architecture contents for over one year
- References to relevant literature Φ
Φ Conexiam maintains a library of relevant literature used in internal development of our staff and consulting practice. The bulk of this library is from the Centre for Information Systems Research, MIT Sloane and the Harvard Business Review. Before this class the assigned instructor will review our library and select an appropriate literature. Where the literature is not publicly available Conexiam will acquire a licensed electronic copy for each student.
All course material is provided electronically. As well, for in-class delivery course slides and exercise materials are provided in a binder.
Recommended Prerequisites:
Recommended Prerequisites:
An understanding of systems or enterprise architecture. Completion of TOGAF® 9 Certification or EA with TOGAF® and Navigate™ is an asset.
Who Should Attend:
- Security engineers and designers who want to better understand the big picture
- Enterprise and system architects who want to understand security
Purchase the Security Architecture Course
The Security Architecture class can either be purchase individually from any scheduled classes or ordered as a custom course for your organization
For more information on Conexiam’s custom courses
This configurable course can be purchased online for your organization Security Architecture course.
Or please contact [email protected] (Contact Conexiam)
Open Reference Material
We openly test our method’s effectiveness internally and with our peers. We are active in the Open Group’s development of standards and guidance on how to use them. In the Security space we have been deeply involved in:
- Integrating Risk and Security within a TOGAF® Enterprise Architecture Guide
Published with the SABSA Institute & The Open Group - TOGAF / SABSA Interoperability Whitepaper
Published with the SABSA Institute & The Open Group
Conexiam Training Value Add
As part of our program of sharing our expertise in Enterprise Architecture we have started publishing our approach and making free on-line training available.
All Conexiam students have access to
- the Conexiam Navigate library used in their course
- free follow-on training:
- Conexiam’s library of EA reference material
Follow-On Courses:
These courses enable participants to develop specialized skills applicable to a domain, or techniques, such as soft-skills and analysis. In-house we spend far more time developing domain and specialized technique skills. We believe enterprise architecture is the smart way for organizations to solve complex problems and deliver on their business strategy. For Conexiam, enterprise architecture and TOGAF® 9.1 are means, not ends.
Ready to find out more?
Drop us a line today for a free quote!
- Integrating Risk and Security within a TOGAF® Enterprise Architecture Guide
Published with the SABSA Institute & The Open Group - TOGAF / SABSA Interoperability Whitepaper
Published with the SABSA Institute & The Open Group
Second Heading
2nd block of text
Expect Failure
gjhg jkhg jkhg
Call out Header
Complete call out
Third Heading
When linking to agile software development, the same question is asked, what they should the team assist in answering. Some of the alignment is driven by what the enterprise architecture team is designed to support.
Next call out heading
Next call-out
Ready to find out more?
Drop us a line today for a free quote!