Center for Qualified CyberSecurity Excellence & Mastery

Get Q/ualified!

50% OFF Ethical Hacking, Pen Testing Class, & Any Q/ISP, Q/IAP, or Qualified class!

Qualified/ Policy & SOA Professional

How to plan and execute a security architecture that matches your technology infrastructure from top to bottom.

This 3-day class brings the whole network together and delivers a secure infrastructure. Merge today's security technologies into your network with the assurance that your layering defense tactics and providing early warning systems. Bring together the separate, tactical, diverse parts of your network with the services, mechanisms, and objects that reflect the security policies, business functions, and technologies into a process involving risk assessment, policy, awareness, technology and security management, and audit functions. Building a security architecture involves close examination of current business processes, technical capability, information security documentation, and existing risk. Students will leave this class with a document template outlining a best practice for an information security architecture framework.

Key topics:

• Defined policy and practice — including audit programs and compliance metrics
• Physical security mechanics and human interaction
• Network perimeter protection and countermeasures
• Enterprise information access management — including remote access, network and data exposure, network account control, audit and accounting capability
• Application development security
• Network and platform systems safeguarding
• Data availability and reliability issues
• Disaster recovery and contingency planning

Who should attend:

CIOs with responsibility over information security, Network Security Administrators, Information Security Architects, Auditors, and Consultants, as well as others seeking to tie together their organization's discreet tactical advanced security solutions into a strategic information security framework.

Course Fee: $1,995
Time: 8:30am - 5pm
Location: Click here to view the course schedule
Learning Level: Intermediate
CPE Credits: 24
Prerequisites: TCP/IP


Class agenda:

Section I — Security Architecture Component Review
A review of current network security architecture standards and practices, with special emphasis on the technology, processes, and people involved.
• Defining an information security architecture
• Critical information security domains
• Determining your organizational needs
• People, policy, process, and technology
• Component dependencies
• Information security program layers
• Technical architecture models

Section II — Advanced Security Architecture Discussion
The nuts and bolts of advanced network security architecture — including examinations of data integrity, systems audits, and recovery plans
• Awareness and training
• Governance, compliance, and audit
• Perimeter protection and countermeasures
• Authentication, authorization, and accounting
• Systems audit and event monitoring
• Data availability, integrity, and confidentiality
• Incident escalation and response
• Operations, administration, and maintenance security
• Application development and integration security
• Continuity and recovery planning

Section III — Building the Plan
How to take advanced network security knowledge and translate it into enterprise-specific strategies, plans, and processes
• Information collection and amalgamation
• Baseline assessments
• Conducting reviews of existing infrastructure and processes
• Performing gap analysis and risk assessments
• Understanding synergistic relationships — policy, procedures, standards, and guidelines
• Creating the architecture framework designs — logical, physical, process flow
• Creating an integration roadmap — budgets, scheduling

Section IV— Integration Strategies
Once all the strategies and plans are worked out, the final step to success is putting it all into practice.
• Information security roles and responsibilities
• Logistics planning
• Technology vs. process
• Effective change management practices
• Executing pilot programs and proofs-of-concept
• Business process reengineering
• Establishing the continual information security program

In-Class Exercises
• Defining the "enterprise" environment
• Establishing a case-study enterprise and performing a gap analysis
• Creating a complete information security program for the enterprise
• Creating a technology comparison matrix
• Designing an advanced security architecture


*Course fees are subject to change


View Class Schedule