Designing Information System Security Architectures
About this Specialization
This specialization is intended for Cybersecurity and Application Security Specialists, IT Security Managers, System Administrators, Software Developers, and Penetration Testers.\\n\\nThis specialization consists of three courses:\\n\\nIn the first course, The Fundamentals of Information System Security Architecture, you will be introduced to the principles of information system security architecture, focusing on key concepts, existing frameworks, and risk assessment methodologies. Modules include: The Principles of Information System Security; Existing Information Security Architecture Frameworks; and Risk Assessment Methodologies and Security.\\n\\nIn the second course, Designing Robust Information System Security Architectures, you go deeper into the design process, focusing on creating secure information system architectures. Modules include: Designing Secure-by-Design Information System Architectures; Aligning Security Design with Business Needs; and Integrating Security into Software Development Life Cycles.\\n\\nIn course 3, Managing Information System Security Architecture, you will concentrate on the practical aspects of implementing security architecture into IT environments, explore secure configuration and IAM, and learn advanced techniques for implementing and monitoring security controls. Topics include: The Multi-Dimensional Role of Security Architecture; Implementing Secure Information System Architectures; and Security Architecture Continuous Improvement and Monitoring.Created by: LearnQuest

Related Online Courses
This specialization will provide learners with the fundamentals and history of ESG investing, and a close examination of the set of investment approaches that are informed by environmental, social... more
This specialization will provide aspiring and established songwriters with the strategies and practices to develop hit songs. The award-winning Berklee Songwriting Faculty have selected four... more
UiPath Orchestrator and Capstone Projects course will provide knowledge about Orchestrator and its capabilities. Further, the learning extends through understanding the Orchestrator user Interface,... more
By its nature, the law touches on many aspects of entrepreneurship, making it an applicable and versatile topic of study. For aspiring entrepreneurs, it\'s important to understand how to form the... more
This is a self-paced lab that takes place in the Google Cloud console. Redacting Sensitive Data with the DLP APICreated by: Google Cloud more