This course will introduce the attendee to the importance of security architecture design in enterprise security. Security architecture frameworks will then be used to explore and develop information system security architectures. Attendees will be presented with a structured approach to the steps and processes involved in developing security architec-tures. Also considered will be how major organizational issues likely to be encountered can be resolved.
At the end of the course, attendees are expected to:
- Apply the principles of a security architecture
- Implement data leak prevention techniques
- Understand the concepts of trust and trustworthiness.
- Explain what is meant by con dentiality, integrity, and availability.
- Understand what a security policy is, and its role in protecting data and resources.
- Describe physical and logical access control, and compare and contrast them
- Distinguish between authorization and authentication.
- Discuss how intrusion detection systems contribute to security and the uses of system monitoring.
- Describe the limits of anti-malware software such as antivirus programs.
- Discuss the importance of documenting the proper installation and configuration of a system.
- Be able to write-host and network intrusions documentation.