Security Architecture Documentation and Alternative Architectures
Cybersecurity
| Beginner
- 12 videos | 38m 46s
- Includes Assessment
- Earns a Badge
In this course, you'll learn about documentation requirements for a security architecture and alternate architectures. First, you'll explore the types of documentation required to guide an architecture. You'll examine input documentation, including business requirements and objectives, standards and best practices, and laws and regulations. Next, you'll learn about architecture documentation, including how and what to document. You'll examine output documentation as well, including policies, procedures, and guidelines. You'll learn about the Security Requirements Traceability Matrix, including required fields. Finally, you'll learn about virtualization and how to evaluate cloud and hybrid cloud solutions, focusing on factors like shared responsibility, encryption, and key management.
WHAT YOU WILL LEARN
-
Recognize important elements involved in documenting a security architectureRecognize the types of documentation required to guide an architectureDescribe input documentation, including business requirements and objectives, standards and best practices, and laws and regulationsDescribe architecture documentation, including how and what to documentDescribe output documentation, including policies, procedures, and guidelinesDescribe the security requirements traceability matrix (srtm), including required fields
-
Recognize alternative architectures, focusing on virtualization, cloud security, shared responsibility, encryption, and key managementDescribe virtualization, including types, security concerns, and architecture concernsDescribe cloud security architecture, including provider selection, compliance concerns, availability and redundancy, performance, and the process of decommissioning dataRecognize that cloud security is a shared responsibility and who is responsible for security at various layersRecognize the importance of encryption in a cloud environment and considerations for ensuring data is properly encryptedRecognize the importance of keeping keys secure, including standards, key storage, and considerations
IN THIS COURSE
-
38s
-
3m 7s
-
2m 11s
-
3m 50s
-
1m 48s
-
4m 11s
-
24s
-
5m 57s
-
4m 51s
-
4m 33s
-
3m
-
4m 16s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.