When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 3 modules in this course
This course is designed for Cybersecurity and Application Security Specialists, IT Security Managers and System Administrators, Software Developers, as well as IT Consultants and Penetration Testers. The course provides an introduction to the principles of information system security architecture. The focus will be on understanding key concepts, existing frameworks, and risk assessment methodologies. It will also cover topics like the CIA triad (Confidentiality, Integrity, Availability), defense in depth, and zero-trust architectures. By the end of the course, learners should have a firm grasp of security architecture fundamentals and be ready to delve into more advanced topics.
This module offers a foundational understanding of information security's significance in the digital age, focusing on the CIA Triad's importance for data integrity. Learn effective information protection methods, access control strategies, and grasp security management essentials for swift responses to emerging threats. Gain the essential insights needed to navigate the dynamic landscape of modern information security.
Introduction to Information System Security•3 minutes
Information System Security•4 minutes
Understanding the CIA Triad•3 minutes
The Significance of CIA Triad in Information Security•6 minutes
Protection of Information and Access Control•7 minutes
Security Management and Response•3 minutes
Security Management and Response: Information Security Principles•5 minutes
4 readings•Total 40 minutes
Course Syllabus•10 minutes
Cyber Resilience: Your Role as the Architect of Security•10 minutes
An Introduction to Information Security•10 minutes
Cyber Resilience: The CIA Cipher•10 minutes
4 assignments•Total 65 minutes
Lesson 1 Quiz: Information System Security•15 minutes
Lesson 2 Quiz: Foundational Principles of Information Security in Modern Organizations•15 minutes
Exam Prep: The Principles of Information System Security•5 minutes
Module 1 Exam: The Principles of Information System Security•30 minutes
1 discussion prompt•Total 10 minutes
Understanding the CIA Triad•10 minutes
2 plugins•Total 30 minutes
CIA Triad Security Controls•15 minutes
Information Security Principles•15 minutes
Module 2: Existing Information Security Architecture Frameworks
Module 2•2 hours to complete
Module details
This module provides an in-depth look at key security architecture frameworks, including the Sherwood Applied Business Security Architecture (SABSA), Zero Trust, and Defense in Depth strategies. Participants will gain an in-depth grasp of these frameworks, allowing them to create adaptive security solutions that effectively protect digital assets against the ever-changing landscape of cyber threats.
Overview of Security Architecture Frameworks•6 minutes
Insights into the SABSA Security Architecture Cybersecurity Framework•5 minutes
The SABSA Security Architecture Cybersecurity Framework•5 minutes
Zero Trust•6 minutes
Defense in Depth•6 minutes
2 readings•Total 20 minutes
What Is Zero Trust?•10 minutes
Cyber Resilience: Layers of Trust•10 minutes
4 assignments•Total 65 minutes
Lesson 1 Quiz: Frameworks for Information System Security•15 minutes
Lesson 2 Quiz: Information Security Architectures•15 minutes
Exam Prep: Existing Information Security Architecture Frameworks•5 minutes
Module 2 Exam: Existing Information Security Architecture Frameworks•30 minutes
1 discussion prompt•Total 10 minutes
Defense in Depth Strategy •10 minutes
1 plugin•Total 15 minutes
SABSA Framework Features•15 minutes
Module 3: Risk Assessment Methodologies and Security
Module 3•2 hours to complete
Module details
This module provides an in-depth review of information security risk assessment, including risk types, their significance in security architecture, metrics, and various methodologies. Discover the critical role of risk assessment, investigate OCTAVE, NIST RMF, and FAIR methodologies, and emerge prepared to assess and mitigate risks effectively in complex security environments.
LearnQuest is the preferred training partner to the world’s leading companies, organizations, and government agencies. Our team boasts 20+ years of experience designing, developing and delivering a full suite industry-leading technology education classes and training solutions across the globe. Our trainers, equipped with expert industry experience and an unparalleled commitment to quality, facilitate classes that are offered in various delivery formats so our clients can obtain the training they need when and where they need it.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.