Security Architecture Documentation and Alternative Architectures

Cybersecurity    |    Beginner
  • 12 videos | 38m 46s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 71 users Rating 4.7 of 71 users (71)
In this course, you'll learn about documentation requirements for a security architecture and alternate architectures. First, you'll explore the types of documentation required to guide an architecture. You'll examine input documentation, including business requirements and objectives, standards and best practices, and laws and regulations. Next, you'll learn about architecture documentation, including how and what to document. You'll examine output documentation as well, including policies, procedures, and guidelines. You'll learn about the Security Requirements Traceability Matrix, including required fields. Finally, you'll learn about virtualization and how to evaluate cloud and hybrid cloud solutions, focusing on factors like shared responsibility, encryption, and key management.

WHAT YOU WILL LEARN

  • Recognize important elements involved in documenting a security architecture
    Recognize the types of documentation required to guide an architecture
    Describe input documentation, including business requirements and objectives, standards and best practices, and laws and regulations
    Describe architecture documentation, including how and what to document
    Describe output documentation, including policies, procedures, and guidelines
    Describe the security requirements traceability matrix (srtm), including required fields
  • Recognize alternative architectures, focusing on virtualization, cloud security, shared responsibility, encryption, and key management
    Describe virtualization, including types, security concerns, and architecture concerns
    Describe cloud security architecture, including provider selection, compliance concerns, availability and redundancy, performance, and the process of decommissioning data
    Recognize that cloud security is a shared responsibility and who is responsible for security at various layers
    Recognize the importance of encryption in a cloud environment and considerations for ensuring data is properly encrypted
    Recognize the importance of keeping keys secure, including standards, key storage, and considerations

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.5 of 8 users Rating 4.5 of 8 users (8)
Rating 4.7 of 266 users Rating 4.7 of 266 users (266)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 519 users Rating 4.4 of 519 users (519)
Rating 4.6 of 129 users Rating 4.6 of 129 users (129)
Rating 4.4 of 108 users Rating 4.4 of 108 users (108)