Secure Application and Data Architecture Design

Cybersecurity    |    Beginner
  • 20 videos | 55m 56s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 128 users Rating 4.5 of 128 users (128)
Security architects design and implement secure architectures and translate business processes and risk into policy and implementation rules. In this course, you'll explore designing secure application and data architectures. First, you'll examine the history of development, the role of the application architect, and application architecture goals. Next, you'll learn about disciplines related to application architecture, as well as Service-oriented Architecture and its standards. You'll move on to learn about modular framework development, authentication, patching, and vulnerability testing. Next, you'll examine data architecture, data classification, data privacy, and database security. Finally, you'll learn about encryption and big data, as well as data architecture analysis and influences.

WHAT YOU WILL LEARN

  • Recognize important elements of secure application architecture design
    Recognize how aspects of the history of development impact the application architecture
    Describe the role of the application architect and the skillset they should have
    Recognize application architecture goals
    Recognize disciplines related to application architecture like the software development life cycle, secure coding, and secure devops
    Describe service-oriented architecture (soa) and its tenets
    Describe soa standards, web services, and risks
    Recognize how a modular framework can be used in the development process
    Describe authentication, including services that can be used internally and externally
    Describe patching and recognize the importance of patch management
  • Recognize various methods of vulnerability testing
    Recognize important elements in secure data architecture design
    Describe data architecture and its goals
    Describe various forms of data classification, associated considerations, and controls
    Recognize restrictions, considerations, and risks for private data
    Recognize high-level concerns for database security
    Recognize general and database encryptions options
    Describe big data, its uses, and security concerns
    Describe the purpose of and need for data architecture analysis
    Recognize factors that influence data architecture decisions

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 45 users Rating 4.5 of 45 users (45)
Rating 4.7 of 23 users Rating 4.7 of 23 users (23)
Rating 4.4 of 47 users Rating 4.4 of 47 users (47)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 342 users Rating 4.5 of 342 users (342)
Rating 4.4 of 231 users Rating 4.4 of 231 users (231)
Rating 4.5 of 70 users Rating 4.5 of 70 users (70)