This course is designed for Cybersecurity and Application Security Specialists, IT Security Managers and System Administrators, Software Developers, as well as IT Consultants and Penetration Testers. The course provides an introduction to the principles of information system security architecture. The focus will be on understanding key concepts, existing frameworks, and risk assessment methodologies. It will also cover topics like the CIA triad (Confidentiality, Integrity, Availability), defense in depth, and zero-trust architectures. By the end of the course, learners should have a firm grasp of security architecture fundamentals and be ready to delve into more advanced topics.

Fundamentals of Information System Security Architecture
访问权限由 New York State Department of Labor 提供
您将获得的技能
- Information Systems Security Assessment Framework (ISSAF)
- Data Integrity
- Zero Trust Network Access
- Application Security
- Security Management
- Threat Modeling
- Cyber Security Assessment
- Computer Security
- Security Requirements Analysis
- Security Strategy
- Security Controls
- Cybersecurity
- Cyber Risk
- Enterprise Architecture
- Information Systems Security
- Data Security
- Vulnerability Assessments
- IT Security Architecture
- Risk Management Framework
- Network Security
- 技能部分已折叠。显示 7 项技能,共 20 项。
要了解的详细信息

添加到您的领英档案
12 项作业
了解顶级公司的员工如何掌握热门技能

积累特定领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 获得可共享的职业证书

该课程共有3个模块
This module offers a foundational understanding of information security's significance in the digital age, focusing on the CIA Triad's importance for data integrity. Learn effective information protection methods, access control strategies, and grasp security management essentials for swift responses to emerging threats. Gain the essential insights needed to navigate the dynamic landscape of modern information security.
涵盖的内容
8个视频4篇阅读材料4个作业1个讨论话题2个插件
This module provides an in-depth look at key security architecture frameworks, including the Sherwood Applied Business Security Architecture (SABSA), Zero Trust, and Defense in Depth strategies. Participants will gain an in-depth grasp of these frameworks, allowing them to create adaptive security solutions that effectively protect digital assets against the ever-changing landscape of cyber threats.
涵盖的内容
5个视频2篇阅读材料4个作业1个讨论话题1个插件
This module provides an in-depth review of information security risk assessment, including risk types, their significance in security architecture, metrics, and various methodologies. Discover the critical role of risk assessment, investigate OCTAVE, NIST RMF, and FAIR methodologies, and emerge prepared to assess and mitigate risks effectively in complex security environments.
涵盖的内容
5个视频2篇阅读材料4个作业1个讨论话题1个插件
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
位教师

提供方
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.







