Post your thoughtful analysis about one key point you took from this assigned reading.
Public Key Infrastructure and X.509 Public Key Certificates
OWASP Attack Surface Analysis Cheat Sheet
Ross, J.W., Weill P., and Robertson D.C. (2008), “Implement the Operating Model Via Enterprise Architecture”
NIST 800 60 V1R1 Guide for Mapping Types of Information and Information Systems to Security Categories
NIST SP 800 34r1 Contingency Planning Guide for Federal Information Systems
NIST SP 800-100, Chapter 10 “Risk Management”
Post your thoughtful analysis about one key point you took from this assigned reading.
FIPS 200 Minimum Security Requirements for Federal Information and Information Systems pp 1 through 9
Welcome to Security Architecture
Course (Introduction Video MP4)
In this course you will study and learn about how organizations plan, design and develop enterprise security architecture, align their IT security capabilities with its business goals and strategy, and assess IT system security architectures and capabilities.
Objectives
- Learn key Enterprise Security Architecture concepts
- Develop an understanding of contextual, conceptual, logical, physical and component levels or security architectures and how they relate to one another
- Learn how security architectures are planned, designed and documented
- Gain an overview of how security architectures are evaluated and assessed
- Gain experience working as part of team, developing and delivering a professional presentation