This course is designed for Cybersecurity and Application Security Specialists, IT Security Managers and System Administrators, Software Developers, as well as IT Consultants and Penetration Testers. The course provides an introduction to the principles of information system security architecture. The focus will be on understanding key concepts, existing frameworks, and risk assessment methodologies. It will also cover topics like the CIA triad (Confidentiality, Integrity, Availability), defense in depth, and zero-trust architectures. By the end of the course, learners should have a firm grasp of security architecture fundamentals and be ready to delve into more advanced topics.
Fundamentals of Information System Security Architecture
This course is part of Designing Information System Security Architectures Specialization
Instructor: Vahab Iranmanesh
Sponsored by PTT Global Chemical
Recommended experience
Details to know
Add to your LinkedIn profile
12 assignments
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 3 modules in this course
This module offers a foundational understanding of information security's significance in the digital age, focusing on the CIA Triad's importance for data integrity. Learn effective information protection methods, access control strategies, and grasp security management essentials for swift responses to emerging threats. Gain the essential insights needed to navigate the dynamic landscape of modern information security.
What's included
8 videos4 readings4 assignments1 discussion prompt2 plugins
This module provides an in-depth look at key security architecture frameworks, including the Sherwood Applied Business Security Architecture (SABSA), Zero Trust, and Defense in Depth strategies. Participants will gain an in-depth grasp of these frameworks, allowing them to create adaptive security solutions that effectively protect digital assets against the ever-changing landscape of cyber threats.
What's included
5 videos2 readings4 assignments1 discussion prompt1 plugin
This module provides an in-depth review of information security risk assessment, including risk types, their significance in security architecture, metrics, and various methodologies. Discover the critical role of risk assessment, investigate OCTAVE, NIST RMF, and FAIR methodologies, and emerge prepared to assess and mitigate risks effectively in complex security environments.
What's included
5 videos2 readings4 assignments1 discussion prompt1 plugin
Instructor
Offered by
Why people choose Coursera for their career
Recommended if you're interested in Information Technology
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy