The Principles of Information Security Architecture

In this course, you’ll learn about the key considerations and controls involved in information security architecture and how they can help to build a resilient, secure and usable information environment.

What you’ll learn:

  • Explain the key components of a network.
  • Explain the use of procedural, physical and technical controls.
  • Describe preventive, corrective and detective controls.
  • Describe how different controls contribute to the confidentiality, integrity and availability of information.
  • Explain the principles of digital forensics and business continuity management.

Course overview

Course content

  • Key components of a network
    Explore how components in a network function in order to keep information secure
  • Physical and procedural controls
    Discover some of the first controls that an organisation can use to mitigate risk
  • Technical controls and cryptography
    Learn about the software and hardware that can keep information and systems secure
  • Preventative, corrective and detective controls
    Discover another way to classify controls based on their purpose
  • Confidentiality, integrity and availability
    Find out about the ‘CIA triad’ and why it’s important to balance these three elements
  • Digital forensics and business continuity management
    Delve into the steps that organisations should take during and after an information security incident
£36.00
£36.00

Earn a digital badge upon completion

Set up a BCS account to access the course

This course will suit you if you are involved in information security or IT projects. It will be particularly useful if you have – or want to have – one of these roles:

  • Solution Architect
  • Enterprise Architect
  • Business Architect
  • IT Security Specialist
  • Security Manager
  • Security Engineer
  • Information Security Analyst
  • Security Administrator
  • Network Security Engineer
  • Machine Learning Engineer

Information security architecture is the blueprint for the structure, processes and controls that protect information. It’s critical to managing risk and ensuring information systems function securely.

At the end of the module, you’ll be able to put your knowledge to the test and gain a digital badge which you can use to prove that you’ve successfully completed your training.

You may also like…