We may earn an affiliate commission when you visit our partners.
Kevin Henry

Security architecture requires the design of solutions that meet organizational requirements. This course will teach you the skills of security architecture needed for the Certified Information Systems Security Professional examination.

Read more

Security architecture requires the design of solutions that meet organizational requirements. This course will teach you the skills of security architecture needed for the Certified Information Systems Security Professional examination.

Security architecture should be based on an enterprise-wide model, understanding the limitations of technology and the need to support business and compliance goals. In this course, Security Architecture and Engineering: Secure Design Principles for CISSP®, you’ll learn the art and science of enterprise security architecture. First, you’ll determine security requirements. Next, you’ll discover the design of security architecture. Finally, you’ll learn how to implement and maintain the designed architecture. When you’re finished with this course, you’ll have the skills and knowledge of security architecture and engineering needed for the Certified Information Systems Security Professional examination.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Course Overview
Secure Design Principles
Implementation and Maintenance
Domain Summary
Read more

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Emphasizes architecting security solutions to meet organizational requirements, aligning with industry standards
Taught by Kevin Henry, an acclaimed instructor in the field of information security
Prepares learners for the Certified Information Systems Security Professional examination
Covers foundational security architecture principles and concepts
Includes hands-on exercises and assessments to reinforce learning
Requires learners to have a solid understanding of security concepts and principles

Save this course

Save Security Architecture and Engineering: Secure Design Principles for CISSP® to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Security Architecture and Engineering: Secure Design Principles for CISSP® with these activities:
Review computer security concepts
Reviewing the basics will help you better prep for more advanced security topics covered in this course.
Browse courses on Computer Security
Show steps
  • Revisit foundational concepts such as security principles, threats, and vulnerabilities
  • Re-familiarize yourself with basic security protocols and technologies
Attend Cybersecurity Industry Conferences
Network with professionals and learn about the latest trends in security architecture.
Browse courses on Networking
Show steps
  • Identify relevant cybersecurity conferences
  • Register for the conferences and plan your attendance
  • Attend sessions and workshops on security architecture topics
  • Connect with speakers and attendees to expand your network
  • Follow up with new connections after the conference
Compile a list of tools and resources for security architecture
Gather and organize resources and tools that can support your learning and application of security architecture.
Show steps
  • Identify relevant online and offline resources on security architecture.
  • Use a tool like a spreadsheet or document to collect and organize the resources.
  • Include information about the type of resource, its purpose, and the target audience.
  • Share the compilation with others who are interested in security architecture.
13 other activities
Expand to see all activities and additional details
Show all 16 activities
Implementing security architecture
Practice implementing security architecture to build a strong foundation in security architecture.
Show steps
  • Study security architecture principles
  • Design a security architecture
  • Implement security architecture
Read about the CISSP Certification
Gain a clear understanding of the objectives and requirements of the CISSP Certification.
Show steps
  • Read the first chapter and focus on the sections that introduce CISSP and its purpose.
  • Read sections that are relevant to the access control and security models, as well as those that discuss information security governance and risk management.
  • Return to sections as needed to clarify key concepts and ideas.
Learn about secure design principles
Supplemental resources can aid in understanding practical applications of design principles.
Browse courses on Secure Design Principles
Show steps
  • Find online tutorials on security design best practices
  • Follow along with video demonstrations of secure design implementation
Explore the NIST Cybersecurity Framework
Review the NIST Cybersecurity Framework to familiarize yourself with industry best practices and standards.
Show steps
  • Visit the NIST website and download the NIST Cybersecurity Framework document
  • Read the framework and make notes on key concepts and principles
  • Identify how the framework can be applied to your organization's security architecture
  • Discuss the framework with your colleagues and share your insights
Engineering security solutions
Engineer a security solution to learn the engineering aspect of security architecture.
Browse courses on Security Solutions
Show steps
  • Study security architecture principles
  • Design a security solution for a specific problem
  • Code and test the security solution
Security Policy Analysis Exercises
Analyze existing security policies to identify gaps and weaknesses.
Browse courses on Security Policies
Show steps
  • Collect sample security policies from various sources
  • Review each policy and identify potential security risks and compliance issues
  • Develop recommendations for improving the security posture of each policy
Discuss security architecture trends with peers
Exchange insights and latest knowledge on security architecture by engaging in discussions with peers.
Show steps
  • Identify a peer or a group of peers who are also interested in security architecture.
  • Schedule a meeting to discuss current trends and challenges in security architecture.
  • Take turns sharing your knowledge and insights.
  • Summarize the key points of the discussion and any action items.
Design a security architecture for a small business
Practical hands-on experience will reinforce concepts covered in the course.
Browse courses on Security Architecture
Show steps
  • Gather requirements and assess the business's security needs
  • Design a network architecture that meets the identified needs
  • Implement the designed architecture and monitor its effectiveness
Design Document for a Secure Network Architecture
Create a design document that outlines a secure network architecture for a specific scenario.
Browse courses on Network Architecture
Show steps
  • Identify the security requirements and constraints for the network
  • Research and select appropriate security technologies and protocols
  • Design the network architecture, ensuring compliance with security best practices
  • Document the design in a clear and concise manner
  • Review and iterate on the design based on feedback from experts
Design a flowchart of security architecture principles
Implement the principles of security architecture in a logical order by designing and creating a flowchart.
Show steps
  • Identify the key principles of security architecture.
  • Develop a rough sketch of the flowchart.
  • Refine the flowchart by adding details and refining connections.
  • Share the flowchart for review and feedback.
Attend a workshop on security architecture design
Participate in a workshop to gain hands-on experience in security architecture design and implementation.
Show steps
  • Identify and register for a relevant workshop on security architecture design.
  • Attend the workshop and actively participate in the activities and discussions.
  • Apply the knowledge and skills gained from the workshop to your own security architecture projects.
Solve scenario-based questions on security architecture
Engage with practice questions to test your understanding of security architecture in practical scenarios.
Show steps
  • Identify and collect relevant scenario-based questions.
  • Break down complex questions and focus on the problem you're solving.
  • Explain the steps you took to arrive at your solution using security architecture principles.
Develop a security architecture plan for a small business.
Gain practical experience in applying security architecture principles by developing a plan for a small business.
Show steps
  • Identify the scope of the project and gather necessary information about the business.
  • Conduct a risk assessment to identify potential threats and vulnerabilities.
  • Design a security architecture plan that addresses the identified risks and meets the business requirements.
  • Implement the security architecture plan and monitor its effectiveness.
  • Review and update the security architecture plan regularly to ensure its ongoing effectiveness.

Career center

Learners who complete Security Architecture and Engineering: Secure Design Principles for CISSP® will develop knowledge and skills that may be useful to these careers:
Security Architect
A Security Architect designs, develops, and implements security solutions to protect an organization's information and systems from threats. This course directly teaches the skills and knowledge needed to succeed in this role and those who wish to enter this field should take this course.
Security Analyst
A Security Analyst defends computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course provides a solid foundation in security architecture and engineering, which are essential skills that one needs to be successful in this role.
Cloud Security Architect
A Cloud Security Architect designs and implements security solutions for cloud computing environments. This course provides a foundation in security architecture and engineering, which are essential skills that one needs to succeed in this role.
Security Operations Center Analyst
A Security Operations Center Analyst monitors and responds to security events in real time. This course provides a foundation in security architecture and engineering, which are essential skills that one needs to succeed in this role.
Incident Responder
An Incident Responder investigates and responds to security incidents. This course provides a foundation in security architecture and engineering, which are essential skills that one needs to succeed in this role.
Identity and Access Management Analyst
An Identity and Access Management Analyst manages an organization's identity and access management systems. This course provides a foundation in security architecture and engineering, which are essential skills that one needs to succeed in this role.
Penetration Tester
A Penetration Tester evaluates an organization's security systems and networks for vulnerabilities. This course provides a foundation in security architecture and engineering, which are essential skills that one needs to succeed in this role.
Security Engineer
A Security Engineer builds and maintains security systems to protect an organization's information and systems from threats. This course provides a foundation in security architecture and engineering, which are essential skills that one needs to succeed in this role.
Data Security Analyst
A Data Security Analyst protects an organization's data from unauthorized access, use, disclosure, disruption, modification, or destruction. This course provides a foundation in security architecture and engineering, which are essential skills that one needs to succeed in this role.
Information Security Manager
An Information Security Manager plans and implements an organization's security strategy and policies. This course may be helpful for those who want to enter this field, as it provides a foundation in security architecture and engineering.
Risk Analyst
A Risk Analyst assesses the risks to an organization's information and systems. This course may be helpful for those who want to enter this field, as it provides a foundation in security architecture and engineering.
Compliance Analyst
A Compliance Analyst ensures that an organization's information and systems comply with regulations. This course may be helpful for those who want to enter this field, as it provides a foundation in security architecture and engineering.
IT Auditor
An IT Auditor evaluates an organization's IT systems and processes to ensure that they are secure and compliant with regulations. This course may be helpful for those who want to enter this field, as it provides a foundation in security architecture and engineering.
Cybersecurity Consultant
A Cybersecurity Consultant provides advice and guidance to organizations on how to protect their systems and data from threats. This course may be helpful for those who want to enter this field, as it provides a foundation in security architecture and engineering.
Security Awareness Trainer
A Security Awareness Trainer educates employees about security risks and best practices. This course may be helpful for those who want to enter this field, as it provides a foundation in security architecture and engineering.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Architecture and Engineering: Secure Design Principles for CISSP®.
Will be great to use as a supplement for the course's 'Domain Summary' topic. While not focused on security architecture specifically, this book goes into detail about testing and identifying flaws in software design.
Will be great to use as a general reference to supplement the course. This book provides practical and implementation-oriented guidance for secure coding.
Provides a fascinating look at the human side of security. It valuable resource for anyone who wants to understand how to protect against social engineering attacks.
Will be great to use as a general reference to supplement the course. This book introduces security principles that provide a common vocabulary to software developers and security professionals.
Will be great to use as a general reference to supplement the course. This book provides a comprehensive guide to cloud security.
Will be great to use as a supplement for the course's 'Implementation and Maintenance' topic. While not specifically about security architecture, this book provides a comprehensive overview of network security techniques.
Will be great to use as a general reference to supplement the course. This book provides a comprehensive overview of cryptography and network security principles and practices.
Will be great to use as a general reference or as the primary textbook for this course. It provides a comprehensive overview of computer security principles and practices.
Will be great to use as a supplement for the course's 'Implementation and Maintenance' topic. While not specifically about security architecture, this book provides a comprehensive overview of network security techniques.
Will be great to use as a general reference for this course. This book provides a comprehensive overview of security engineering principles and practices.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Architecture and Engineering: Secure Design Principles for CISSP®.
Security Architecture and Engineering: Security Controls...
Most relevant
Security Architecture and Engineering: Physical Security...
Most relevant
Security Architecture and Engineering: Cryptography for...
Most relevant
Secure Software Architecture and Design for CSSLP®
Most relevant
Implementation of Security and Privacy Controls for CGRC
Most relevant
Secure Software Requirements for CSSLP®
Most relevant
Information Security Risk Management Program for CGRC
Most relevant
Specialized Engineering: Healthcare Facilities
Most relevant
Cloud Concepts, Architecture and Design for CCSP®
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser