What is Security Architecture

Security Architecture is a Cross-Cutting Concern

This course is intended to provide a deeper understanding of Security Architecture. Learning is enhanced with hands-on experience through exercises based on real-world case studies.

The goal of the information systems security architect is to design controls that effectively manage risk associated with information and information technology.  The goal of the security architect is to protect the enterprise not the technology.

Effective security architectures are fully integrated with the architecture of the enterprise.  Security architects must work with, not against, the tools, practices, and culture of the enterprise.  They must balance the need to protect against the drive to succeed.

Key Learning Objectives:

On completing this course, students will be able to:

  • Identify and assess business risks associated with information and information technology.
  • Understand how to communicate risk.
  • Describe the key information security concerns of confidentiality, integrity, and availability.
  • Identify and describe the features found in typical information systems architectures including networks, operating systems, and applications.
  • Describe how security fits with architecture and systems development methodologies
  • Identify and describe common security controls.
  • Understand the connection between information systems security and privacy
  • Comprehend the information systems security standards landscape.
  • Define assurance and understand the role of assurance in information systems security.
  • Identify and describe the top 20 information system safeguards.

Security Architecture Training Course

Included in the delivery:

  • 3 days of instruction
    • Lecture
    • Workshop Exercises
    • Exercise review
  • Electronic copy of all Conexiam courseware and exercise materials
  • Electronic copy of all Navigate templates and public architecture tools used in the course
    • Students have access to up-dated courseware, exercise materials, Navigate templates and public architecture contents for over one year
  • References to relevant literature Φ

Φ Conexiam maintains a library of relevant literature used in internal development of our staff and consulting practice. The bulk of this library is from the Centre for Information Systems Research, MIT Sloane and the Harvard Business Review. Before this class the assigned instructor will review our library and select an appropriate literature. Where the literature is not publicly available Conexiam will acquire a licensed electronic copy for each student.

All course material is provided electronically. As well, for in-class delivery course slides and exercise materials are provided in a binder.

Recommended Prerequisites:

Recommended Prerequisites:

An understanding of systems or enterprise architecture. Completion of TOGAF® 9 Certification or EA with TOGAF® and Navigate™ is an asset.

Who Should Attend:

  • Security engineers and designers who want to better understand the big picture
  • Enterprise and system architects who want to understand security

Purchase the Security Architecture Course

The Security Architecture class can either be purchase individually from any scheduled classes or ordered as a custom course for your organization
For more information on Conexiam’s custom courses

This configurable course can be purchased online for your organization Security Architecture course.
Or please contact [email protected] (Contact Conexiam)

Open Reference Material

We openly test our method’s effectiveness internally and with our peers.  We are active in the Open Group’s development of standards and guidance on how to use them. In the Security space we have been deeply involved in:

Conexiam Training Value Add

As part of our program of sharing our expertise in Enterprise Architecture we have started publishing our approach and making free on-line training available.

All Conexiam students have access to

Follow-On Courses:

These courses enable participants to develop specialized skills applicable to a domain, or techniques, such as soft-skills and analysis. In-house we spend far more time developing domain and specialized technique skills.  We believe enterprise architecture is the smart way for organizations to solve complex problems and deliver on their business strategy. For Conexiam, enterprise architecture and TOGAF® 9.1 are means, not ends.

Security Architecture Reference Materials

Integrating Risk and Security within a TOGAF Enterprise Architecture
Published with the SABSA Institute & The Open Group

TOGAF / SABSA Interoperability Whitepaper
Published with the SABSA Institute & The Open Group

Second Heading

2nd block of text

Call out Header

Complete call out

Third Heading

Ready to find out more?

Drop us a line today for a free quote!

Scroll to Top