Post your thoughtful analysis about one key point you took from this assigned reading. (This first week you are not required to post: One question to ask your fellow classmates to facilitate discussion, nor are required to post In The News nor comment on other students’ postings.)
Main Content
My question to discuss with my classmates
In The News
Boyle and Panko: Chapter 1 “The Threat Environment”
Ross, J.W., Weill P., and Robertson D.C. (2008), “Implement the Operating Model Via Enterprise Architecture”
Post your thoughtful analysis about one key point you took from this assigned reading.
Welcome to Security Architecture
Course
In this course you will study and learn about how organizations plan, design and develop enterprise security architecture, align their IT security capabilities with its business goals and strategy, and assess IT system security architectures and capabilities.
Objectives
- Learn key Enterprise Security Architecture concepts
- Develop an understanding of contextual, conceptual, logical, physical and component levels or security architectures and how they relate to one another
- Learn how security architectures are planned, designed and documented
- Gain an overview of how security architectures are evaluated and assessed
- Gain experience working as part of team, developing and delivering a professional presentation