Organizations require people with the skills to make decisions to secure information systems based on best practices, standards, and industry recommendations. Security architects fill this need. These skilled cybersecurity professionals design and implement secure architectures and translate business processes and risk into policy and implementation rules.
Cybersecurity Specialization: Architecture and Policy provides an overview for designing and deploying a security architecture. In this course, you will integrate security policies across network, application, information, and access control architectures as well as cloud and hybrid cloud models. You will review and implement industry standard best practices and policies (NIST, etc.), along with standard architecture framework models.
The course uses a challenge-based design that focuses on what a learner should be able to do at the end of the course and back on the job. The practice opportunities and challenge activities resemble—as much as possible—tasks the learner would be asked to perform in a real-life situation.
Any mid-career or intermediate level person with an interest in security architecture and who has been in a cybersecurity role or organization for at least 2 years.
While security architect is typically a senior role in many organizations, Cybersecurity Specialization: Architecture and Policy is a mid-level course focused on building the skills a security architect will use on the job.
As such, the ideal candidate for this course will already have strong technical skills and experience in more than one technical area (for example, network infrastructure configuration, web services, and identity and access management), but may have more limited experience in cybersecurity.
They may have an interest in security architecture but no experience, or they may be performing some architecture tasks already as part of their job.
Frameworks and the Lifecycles
Design a Network Security Architecture
Design a Secure Application Architecture
Design a Data Security Architecture
Design an Access Control Security Architecture
Update a Security Architecture
Document a Security Architecture
Examine Alternative Architectures
Course Look Around
Join our public courses in our South Africa facilities. Private class trainings will be organized at the location of your preference, according to your schedule.