Security Architecture

The Security Architecture skills path teaches you enterprise security architecture concepts, including security architecture modeling, architecture for governance and compliance, infrastructure security and more.

Course

Security Architecture Modeling

1 hour, 41 minutes

Course

Software Vulnerabilities and Security Controls

37 minutes

Course

Secure Storage Controls

29 minutes

Course

Securing Host Devices

20 minutes

Course

Network Security Components

44 minutes

Course

Architect for Application Security

1 hour, 28 minutes

Course

Infrastructure Security

1 hour, 27 minutes

Course

Security Operations Architecture

3 hours, 1 minutes

Course

Architecture for Governance, Compliance, and Risk Management

3 hours, 31 minutes

Course

Cryptography Fundamentals

41 minutes

Cryptography is the science of securing information, and in today’s security-obsessed world, cryptography is more important than ever. In eight videos, the student explores the fundamentals of symmetric and asymmetric cryptography, cryptographic attacks, hybrid cryptography, ciphers and more. This course offers vocabulary and definitions, example diagrams, a close look at cryptographic algorithms and everything you ever wanted to know about keys. We also touch on the CIA triad and the use of hashing and digital signatures to ensure confidentiality, integrity and non-repudiation.

Course

Identity and Access Management Architecture

2 hours, 45 minutes

Course

Secure Software Development

43 minutes

They say an ounce of prevention is worth a pound of cure, and that’s what this course is about. Nine videos cover secure software development: from change control and software testing to software environment security, object-oriented programming, distributed computing, mobile code, malware and more, this course explores the details of ensuring that software development has security baked in right from the get-go. Take a closer look at software testing types, sample change control procedures and definitions of terms such as polyinstantiation and polymorphism.

Course

Secure Software Design

25 minutes

Four videos cover the ins and outs of secure software design. Beginning with an introductory module on secure software design, we move on to secure system development life cycle (SDLC), software development models and maturity models. Take a closer look at the waterfall method, the spiral model, the agile software development method and more.

Course

Distributed System & Virtualized Networks

20 minutes

Take a closer look at distributed systems and virtualized networks with this four-video course. Beginning with Virtual Private Networks (VPNs) and Virtualized Local Area Networks (VLANs), the student will be introduced to the fundamentals of distributed and cloud computing, virtualization and virtualized networks. Why is virtualization a good choice, and what are its weaknesses? What’s the difference between Infrastructure-as-a-Service and Platform-as-a-Service? Includes definitions and diagrams.

Course

Data Center Security

21 minutes

Take a closer look at data center security with four videos covering the big picture of data center security, media storage, fire safety and utilities and HVAC (heating, ventilation and air conditioning) systems. Why is prevention the best solution for fire? What’s the difference between a safe, a vault and a container, and why does it matter? Full details on everything you need to know about data center security and protecting your organization’s servers from disaster.

Course

Physical Security

52 minutes

Physical security is any organization’s first line of defense, and understanding it is key. Learn the hows and whys of physical security with eight videos covering facility design and construction, perimeter defenses, internal facilities security, physical intrusion detection, personnel safety and more. Discover the difference between deterrent, detective and preventive controls, and learn about crime prevention through environmental design (CPTED), piggybacking, tailgating, defense-in-depth in physical security and appropriate choices of locks and keys.

Course

Secure Design Principles

39 minutes

Systems engineering applies through the entire process of development, from concept until final disposal. And to keep your system secure, you need to understand the principles of secure design. Nine modules take the student through security models, evaluation models, popular security models (such as Bell-LaPadula, State Machine, Clark & Wilson and more), common criteria and the certification and accreditation process, with quick stops at useful items such as the Rainbow Series and the secure design life cycle. Includes vocabulary, definitions, lattice diagrams and even some notes on obsolete models.