We may earn an affiliate commission when you visit our partners.
Course image
Udacity logo

Security Architecture Planning and Design

Erick Galinkin, William O. Ferguson, Abhinav Singh, and Sjon-Paul Brown

Learn fundamental security planning, design, and systems concepts used throughout security architecture with Udacity's Security Architecture Training Course.

Prerequisite details

Read more

Learn fundamental security planning, design, and systems concepts used throughout security architecture with Udacity's Security Architecture Training Course.

Prerequisite details

To optimize your success in this program, we've created a list of prerequisites and recommendations to help you prepare for the curriculum. Prior to enrolling, you should have the following knowledge:

  • Cloud computing fluency
  • Cybersecurity fluency
  • Computer networking basics
  • Systems administration proficiency

You will also need to be able to communicate fluently and professionally in written and spoken English.

What's inside

Syllabus

In this lesson we'll learn how to evaluate security risks, prioritize remediation, apply systems thinking to security problems, and build simple architecture diagrams.
Read more
Learn how to apply both general-purpose and industry-specific security frameworks, as well as data privacy legislation, to applications and infrastructure.
Use governance, risk management, and compliance to achieve security goals, examine business needs to determine which risks are worth accepting, and design secure architectures from scratch.
Demonstrate your new security architecture skills by conducting a security assessment. You'll identify risks and policy violations in an existing architecture, and then recommend a new, secure design.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Taught by instructors recognized for their work in security architecture, including Erick Galinkin, William O. Ferguson, Abhinav Singh, and Sjon-Paul Brown
Introduces fundamental security planning, design, and systems concepts used in security architecture
Develops skills in applying security frameworks and data privacy legislation to applications and infrastructure
Builds foundational knowledge for conducting security assessments, identifying risks, and recommending secure designs
Requires prior fluency in cloud computing, cybersecurity, computer networking, and systems administration
May require additional resources for learners lacking the necessary prerequisite knowledge

Save this course

Save Security Architecture Planning and Design to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Security Architecture Planning and Design. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Security Architecture Planning and Design will develop knowledge and skills that may be useful to these careers:
Security Architect
Security Architects design, implement, and maintain an organization's security architecture. They are responsible for evaluating security risks, prioritizing remediation, and applying systems thinking to security problems. This course provides the fundamental concepts necessary to succeed as a Security Architect. Students will learn how to apply security frameworks, conduct security assessments, and design secure architectures.
Cloud Security Architect
Cloud Security Architects specialize in designing and implementing security for cloud computing environments. This course provides a strong foundation for a career as a Cloud Security Architect. Students will learn about cloud computing fluency, cybersecurity fluency, computer networking basics, and systems administration proficiency. These are all essential skills for success in this role.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's information systems. This course provides the knowledge and skills necessary to succeed as an Information Security Analyst. Students will learn how to apply security frameworks, conduct security assessments, and design secure architectures.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain an organization's cybersecurity systems. This course provides the skills and knowledge necessary to succeed as a Cybersecurity Engineer. Students will learn about cybersecurity fluency, computer networking basics, and systems administration proficiency. These are all essential skills for success in this role.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. This course provides the knowledge and skills necessary to succeed as a Security Consultant. Students will learn how to evaluate security risks, prioritize remediation, and apply systems thinking to security problems.
Security Manager
Security Managers are responsible for managing an organization's security program. This course provides the knowledge and skills necessary to succeed as a Security Manager. Students will learn how to apply security frameworks, conduct security assessments, and design secure architectures.
Data Privacy Analyst
Data Privacy Analysts help organizations to comply with data privacy laws and regulations. This course provides the knowledge and skills necessary to succeed as a Data Privacy Analyst. Students will learn about data privacy legislation and how to apply it to applications and infrastructure.
Systems Administrator
Systems Administrators are responsible for managing and maintaining an organization's computer systems. This course may be useful for Systems Administrators who want to learn more about security. Students will learn about computer networking basics and systems administration proficiency.
Network Administrator
Network Administrators are responsible for managing and maintaining an organization's computer networks. This course may be useful for Network Administrators who want to learn more about security. Students will learn about computer networking basics and systems administration proficiency.
Compliance Auditor
Compliance Auditors are responsible for ensuring that an organization complies with laws and regulations. This course may be useful for Compliance Auditors who want to learn more about security. Students will learn about governance, risk management, and compliance.
Risk Manager
Risk Managers are responsible for identifying and managing risks to an organization. This course may be useful for Risk Managers who want to learn more about security. Students will learn about governance, risk management, and compliance.
Forensic Investigator
Forensic Investigators investigate computer crimes and security breaches. This course may be useful for Forensic Investigators who want to learn more about security architecture. Students will learn about security frameworks and how to conduct security assessments.
Penetration Tester
Penetration Testers identify vulnerabilities in an organization's security systems. This course may be useful for Penetration Testers who want to learn more about security architecture. Students will learn about security frameworks and how to conduct security assessments.
Security Analyst
Security Analysts monitor and analyze security data to identify threats and vulnerabilities. This course may be useful for Security Analysts who want to learn more about security architecture. Students will learn about security frameworks and how to conduct security assessments.
Security Operations Manager
Security Operations Managers are responsible for managing an organization's security operations. This course may be useful for Security Operations Managers who want to learn more about security architecture. Students will learn about governance, risk management, and compliance.

Reading list

We've selected 11 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Architecture Planning and Design.
Comprehensive guide to the CISSP certification, covering all eight domains of information security. It valuable resource for anyone preparing for the CISSP exam.
Provides practical guidance on how to build secure software, covering topics such as secure coding, threat modeling, and security testing. It valuable resource for anyone working in software development.
Provides a comprehensive overview of information security, covering topics such as security policies, risk management, and incident response. It valuable resource for anyone working in cybersecurity.
Provides a comprehensive overview of security engineering, covering topics such as threat modeling, secure design, and security testing. It valuable resource for anyone working in cybersecurity.
Provides a comprehensive overview of web application security, covering topics such as SQL injection, cross-site scripting, and buffer overflows. It valuable resource for anyone working in web development.
Provides a comprehensive overview of computer security, covering topics such as cryptography, network security, and operating system security. It valuable resource for anyone working in cybersecurity.
Provides a comprehensive overview of network security, covering topics such as firewalls, intrusion detection systems, and virtual private networks. It valuable resource for anyone working in cybersecurity.
Provides a comprehensive overview of computer security, covering topics such as cryptography, network security, and operating system security. It valuable resource for anyone working in cybersecurity.
Provides a comprehensive overview of information security risk management, covering topics such as risk assessment, risk mitigation, and risk reporting. It valuable resource for anyone working in cybersecurity.
Provides a comprehensive overview of cryptography and network security, covering topics such as encryption algorithms, hash functions, and digital signatures. It valuable resource for anyone working in cybersecurity.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Architecture Planning and Design.
Security and Auditing in Ethereum
Most relevant
Introduction to Network Security
Most relevant
Digital Shield: Cybersecurity for Data and System...
Continuous Monitoring for CGRC
Advanced IoT Systems Integration and Industrial...
Digital Shield: Cybersecurity for Data and System...
Maturing Risk Management
Zero Trust Architecture (ZTA): Use Case Identification...
Application Security for Developers and DevOps...
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser