Architecting Security Training

Commitment 4 Days, 7-8 hours a day.
Language English
User Ratings Average User Rating 4.8 See what learners said
Price REQUEST
Delivery Options Instructor-Led Onsite, Online, and Classroom Live

COURSE OVERVIEW

Managers associated with information systems have a legal responsibility for the security of those information systems deployed in their organizations. This includes protecting the confidentiality, integrity, and appropriate availability of information processed by architected systems that make use of that information. The development of these architected systems must apply effective CM, software change control, and release management processes to establish a chain of security custody that gives accreditors justification to authorize the operational release of reviewed systems.

Architecting Security Training provides a total systems perspective on incorporating security throughout the system lifecycle, from the initial phases of architecting systems through securing data-at-rest and data-in-transit to audits for performance evaluation. A risk-based, cost-benefit approach is presented for selecting controls to protect against identified threats. This approach is also applied to securing the infrastructural and contextual aspects of the architected system including policy guidance as well as behavioral and physical security considerations.

WHAT'S INCLUDED?
  • 4 days of Architecting Security Training with an expert instructor
  • Architecting Security Electronic Course Guide
  • Certificate of Completion
  • 100% Satisfaction Guarantee
RESOURCES
RELATED COURSES

ADDITIONAL INFORMATION

COURSE OBJECTIVES

Upon completing this Architecting Security Training course, learners will be able to meet these objectives:

  • The critical concepts of information security.
  • The security systems development life cycle, and gathering the right security requirements.
  • Information security responsibilities in an organization
  • The threats posed to information security and common attacks.
  • CM processes that establish a secure chain of custody.
  • Key laws that shape the field of information security.
  • Integrating security into software release management.
  • Management’s role in the development, maintenance, and enforcement of information security policy, standards, practices, procedures, and guidelines.
  • Risk management, cost-benefit approach to fulfilling security responsibilities.
  • A survey of security controls to protect against both external and internal threats.
  • Implementation and change management of information security.
CUSTOMIZE IT
  • We can adapt this Architecting Security course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this Architecting Security Training course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Architecting Security course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Architecting Security course in a manner understandable to lay audiences
AUDIENCE/TARGET GROUP

The target audience for this Architecting Security Training course:

  • Federal government managers and project managers are personally responsible for the security of information systems in their organization, governed by the statutes and Executive Branch policies
  • Managers and project managers in publicly traded corporations are likewise personally responsible for information security governed by the Sarbanes-Oxley Act.
  • Staff who need to understand the NIST-prepared guidelines for information security should attend this course.
CLASS PREREQUISITES

The knowledge and skills that a learner must have before attending this Architecting Security Training course are:

  • Technical background and general exposure to network security.

COURSE SYLLABUS

  1. The critical concepts of information security.
  2. The security systems development life cycle, and gathering the right security requirements.
  3. Information security responsibilities in an organization
  4. The threats posed to information security and common attacks.
  5. CM processes that establish a secure chain of custody.
  6. Key laws that shape the field of information security.
  7. Integrating security into software release management.
  8. Management’s role in the development, maintenance, and enforcement of information security policy, standards, practices, procedures, and guidelines.
  9. Risk management, cost-benefit approach to fulfilling security responsibilities.
  10. A survey of security controls to protect against both external and internal threats.
  11. Implementation and change management of information security.
Architecting Security TrainingArchitecting Security Training Course Wrap-Up

REQUEST MORE INFORMATION