Security Architecture and Design

AGENDA

  • Implementation and operation of the controls necessary to insure availability, integrity, and confidentiality of information
  • Know how to secure an enterprise architecture
  • Relationships between various types of software
  • Design principles of enterprise architecture
  • Physical components of IT architecture
  • Security models and architecture theory
  • Evaluation methods and criteria
  • Definitions of certification and accreditation
  • Difference between trusted and nontrusted components
  • Constitutes appropriate protection mechanisms
  • Purpose of assurance evaluations
  • Techniques used to provide system security