• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2023 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack
  • Zoom Meeting

Main Content

NIST SP 800 34r1 Contingency Planning Guide for Federal Information Systems

April 3, 2024 By David Lanter Leave a Comment

Question to discuss with my classmates

April 3, 2024 By David Lanter Leave a Comment

In The News

April 3, 2024 By David Lanter Leave a Comment

My question to discuss with my classmates

January 9, 2024 by David Lanter Leave a Comment

Tagged With:

In The News

January 9, 2024 by David Lanter Leave a Comment

Tagged With:

Boyle and Panko: Chapter 1 “The Threat Environment”

January 8, 2024 by David Lanter Leave a Comment

Post your thoughtful analysis about one key point you took from this assigned reading. (This first week you are not required to post: One question to ask your fellow classmates to facilitate discussion, nor are required to post In The News nor comment on other students’ postings.)

Filed Under: 01 - Threat Environment Tagged With:

Ross, J.W., Weill P., and Robertson D.C. (2008), “Implement the Operating Model Via Enterprise Architecture”

January 8, 2024 by David Lanter Leave a Comment

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 01 - Threat Environment Tagged With:

Welcome to Security Architecture

January 3, 2024 by David Lanter

Course

In this course you will study and learn about how organizations plan, design and develop enterprise security architecture, align their IT security capabilities with its business goals and strategy, and assess IT system security architectures and capabilities.

Objectives

  1. Learn key Enterprise Security Architecture concepts
  2. Develop an understanding of contextual, conceptual, logical, physical and component levels or security architectures and how they relate to one another
  3. Learn how security architectures are planned, designed and documented
  4. Gain an overview of how security architectures are evaluated and assessed
  5. Gain experience working as part of team, developing and delivering a professional presentation

Filed Under: 01 - Introduction Tagged With:

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 4
  • Page 5
  • Page 6

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (2)
  • 02 – System Security Plan (5)
  • 03 – Planning and Policy (6)
  • 04 – Cryptography (3)
  • 05 – Secure Networks (6)
  • 06 – Firewalls (4)
  • 08 – Access Control (6)
  • 09 – Host Hardening (4)
  • 10 – Application Security (5)
  • 11 – Data Protection (3)
  • 12 – Incident and Disaster Response (4)
  • Uncategorized (3)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in