Security Architecture Documentation and Alternative Architectures

Cybersecurity    |    Beginner
  • 12 Videos | 36m 57s
  • Includes Assessment
  • Earns a Badge
In this course, you'll learn about documentation requirements for a security architecture and alternate architectures. First, you'll explore the types of documentation required to guide an architecture. You'll examine input documentation, including business requirements and objectives, standards and best practices, and laws and regulations. Next, you'll learn about architecture documentation, including how and what to document. You'll examine output documentation as well, including policies, procedures, and guidelines. You'll learn about the Security Requirements Traceability Matrix, including required fields. Finally, you'll learn about virtualization and how to evaluate cloud and hybrid cloud solutions, focusing on factors like shared responsibility, encryption, and key management.

WHAT YOU WILL LEARN

  • recognize important elements involved in documenting a security architecture
    recognize the types of documentation required to guide an architecture
    describe input documentation, including business requirements and objectives, standards and best practices, and laws and regulations
    describe architecture documentation, including how and what to document
    describe output documentation, including policies, procedures, and guidelines
    describe the Security Requirements Traceability Matrix (SRTM), including required fields
  • recognize alternative architectures, focusing on virtualization, cloud security, shared responsibility, encryption, and key management
    describe virtualization, including types, security concerns, and architecture concerns
    describe cloud security architecture, including provider selection, compliance concerns, availability and redundancy, performance, and the process of decommissioning data
    recognize that cloud security is a shared responsibility and who is responsible for security at various layers
    recognize the importance of encryption in a cloud environment and considerations for ensuring data is properly encrypted
    recognize the importance of keeping keys secure, including standards, key storage, and considerations

IN THIS COURSE

  • Playable
    1. 
    Documenting a Security Architecture
    28s
    UP NEXT
  • Playable
    2. 
    Documentation Life Cycle
    2m 58s
  • Locked
    3. 
    Input Documentation
    2m 1s
  • Locked
    4. 
    Architecture Documentation
    3m 41s
  • Locked
    5. 
    Output Documentation
    1m 39s
  • Locked
    6. 
    Security Requirements Traceability Matrix
    4m 2s
  • Locked
    7. 
    Examining Alternative Architectures
    15s
  • Locked
    8. 
    Virtualization
    5m 48s
  • Locked
    9. 
    Cloud Security Architecture
    4m 42s
  • Locked
    10. 
    Shared Responsibility
    4m 24s
  • Locked
    11. 
    Encryption
    2m 51s
  • Locked
    12. 
    Key Management for Cloud
    4m 7s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.