Lesson 1
Introduction to Security Planning and Design
In this lesson we'll learn how to evaluate security risks, prioritize remediation, apply systems thinking to security problems, and build simple architecture diagrams.
Course
This course introduces the fundamental security planning, design, and systems thinking concepts that are used throughout security architecture. As networks and applications grow more complex, the need to identify potential sources of weakness that are a product of that complexity becomes crucial. Students who complete this course will be equipped with the skills to identify and evaluate risks in systems, assess whether or not risks are acceptable, and work alongside stakeholders to prioritize remediation efforts.
This course introduces the fundamental security planning, design, and systems thinking concepts that are used throughout security architecture. As networks and applications grow more complex, the need to identify potential sources of weakness that are a product of that complexity becomes crucial. Students who complete this course will be equipped with the skills to identify and evaluate risks in systems, assess whether or not risks are acceptable, and work alongside stakeholders to prioritize remediation efforts.
4 weeks
Real-world Projects
Completion Certificate
Last Updated January 10, 2022
No experience required
Lesson 1
Introduction to Security Planning and Design
In this lesson we'll learn how to evaluate security risks, prioritize remediation, apply systems thinking to security problems, and build simple architecture diagrams.
Lesson 2
Security and Regulatory Frameworks
Learn how to apply both general-purpose and industry-specific security frameworks, as well as data privacy legislation, to applications and infrastructure.
Lesson 3
Designing Secure Systems
Use governance, risk management, and compliance to achieve security goals, examine business needs to determine which risks are worth accepting, and design secure architectures from scratch.
Lesson 4 • Project
Conduct an Application Security Review
Demonstrate your new security architecture skills by conducting a security assessment. You'll identify risks and policy violations in an existing architecture, and then recommend a new, secure design.
Erick Galinkin
Principal AI Researcher | Rapid7
Erick Galinkin is a hacker and computer scientist, leading research at the intersection of security and artificial intelligence at Rapid7. He has spoken at numerous industry and academic conferences on topics ranging from malware development to game theory in security.
Erick Galinkin
Principal AI Researcher | Rapid7
Erick Galinkin is a hacker and computer scientist, leading research at the intersection of security and artificial intelligence at Rapid7. He has spoken at numerous industry and academic conferences on topics ranging from malware development to game theory in security.
Get Started Today