This course introduces the student to the importance of security architecture design in enterprise security. Students are presented with a structured approach to the steps and processes involved in developing comprehensive and layered security architectures. Students evaluate the principles, attributes, and processes used in designing and deploying architecture that supports the business objectives of the enterprise.
Upon completion of the course, students are expected to be able to do the following:
- Select from the dominant information security management models, including U.S. government sanctioned models, to meet an organization’s needs.
- Create a strategic plan to accomplish an organization’s strategic security objectives.
- Identify different methods, roles, responsibilities, and accountabilities of personnel, along with the governance and compliance of a security policy framework.
- Apply principles of corporate governance to the information security function.
- Utilize information security knowledge and infrastructure efficiently to manage resources.
- Measure and report information security metrics to ensure that organizational objectives are achieved.
- Optimize information security investments in support of organizational objectives.