Security Architecture and Design 1 Day

The Security Architecture and Models course contains the concepts, principles, structures, and standards used to design, monitor, and secure operating systems, equipment, networks, applications and those controls used to enforce various levels of availability, integrity, and confidentiality.

While software developers can implement more secure coding practices, one of the most critical aspects of secure software pertains to its architecture.

Security has to be baked into the fundamental core of the operating systems that provide processing environments. Today’s operating systems were not architected with security as their main focus. It is very difficult to retrofit security into operating systems that are already deployed throughout the world and that contain millions of lines of code. And it is almost impossible to re-architect them in a manner that allows them to continue to provide all of their current functionality and for it all to take place securely.

The course addresses key weakness in software development process and what must be done to develop software securely.

This course suggests that this can only be done if more people understand how to build software securely from the beginning, meaning at the architecture stage. The approach of integrating security at the architecture level would get us much closer to having secure environments, compared to the “patch and pray” approach many organizations deal with today.

Course Content

Computer Security

System Architecture

Computer Architecture

Operating System Architectures

System Security Architecture

Security Models

Security Modes of Operation

The Orange Book and the Rainbow Series

Information Technology Security Evaluation Criteria

Certification vs. Accreditation

Open vs. Closed Systems

and more...

Anyone who is required to develop a broad and deep knowledge

and understanding of System Architecture and Design:

1. IT consultants, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, security engineers

2. Security professionals whose positions require CISSP certification.

3. Course: Managing Malicious Insider Threats to Information and Systems

1. Employing tools, technologies and activities to enhance a practical understanding of System Architecture and Design.

2. Reinforcing key areas of the (ISC)2® CBK® through practice questions and review sessions.

3. Strategically focus your preparation for CISSP Certification.