Course Outline
1. Domain 1: Security Architecture Analysis
Approach to Security Architecture
Conducting the Requirements Analysis
Designing the Security Model
Conduct Design Verification and Validation
2. Domain 2: Communication and Network Security
The Communication Architecture
The Network Architecture
Protecting the Communications and Networks
Security Design Considerations and Associated Risks
3. Domain 3: Physical Security Considerations
Assessing the Physical Security Requirements
Integration of Physical Products and Systems
Solution Evaluation
4. Domain 4: Cryptography
Cryptography Requirements
Design Considerations and Constraints
Key Management Life Cycle
Integrated Solutions
Identity System Integration
5. Domain 5: Technology-Related Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
Business Impact Analysis (BIA) Requirements
What are the Strategies for Availability and Recovery?
Designing the Continuity Recovery Solution
6. Domain 6: Access Control Systems and Methodology
Access Control Key Concepts, Methodologies, and Techniques
Architecture of Identity and Access Management.

  • 10 Days
  • 0 Units
  • 0 Hrs

Select Your Currency

WOOCS 1.1.8
Drop Us A Query
[contact-form-7 id="5639" title="Drop Us A Query"]
Create an Account