Lesson 1
Introduction to Security Planning and Design
In this lesson we'll learn how to evaluate security risks, prioritize remediation, apply systems thinking to security problems, and build simple architecture diagrams.
Course
This course introduces the fundamental security planning, design, and systems thinking concepts that are used throughout security architecture. As networks and applications grow more complex, the need to identify potential sources of weakness that are a product of that complexity becomes crucial. Students who complete this course will be equipped with the skills to identify and evaluate risks in systems, assess whether or not risks are acceptable, and work alongside stakeholders to prioritize remediation efforts.
This course introduces the fundamental security planning, design, and systems thinking concepts that are used throughout security architecture. As networks and applications grow more complex, the need to identify potential sources of weakness that are a product of that complexity becomes crucial. Students who complete this course will be equipped with the skills to identify and evaluate risks in systems, assess whether or not risks are acceptable, and work alongside stakeholders to prioritize remediation efforts.
Intermediate
2 weeks
Real-world Projects
Completion Certificate
Last Updated October 1, 2024
Skills you'll learn:
Prerequisites:
Lesson 1
In this lesson we'll learn how to evaluate security risks, prioritize remediation, apply systems thinking to security problems, and build simple architecture diagrams.
Lesson 2
Learn how to apply both general-purpose and industry-specific security frameworks, as well as data privacy legislation, to applications and infrastructure.
Lesson 3
Use governance, risk management, and compliance to achieve security goals, examine business needs to determine which risks are worth accepting, and design secure architectures from scratch.
Lesson 4 • Project
Demonstrate your new security architecture skills by conducting a security assessment. You'll identify risks and policy violations in an existing architecture, and then recommend a new, secure design.
Principal AI Researcher
Erick Galinkin is a hacker and computer scientist, leading research at the intersection of security and artificial intelligence at Rapid7. He has spoken at numerous industry and academic conferences on topics ranging from malware development to game theory in security.
Combine technology training for employees with industry experts, mentors, and projects, for critical thinking that pushes innovation. Our proven upskilling system goes after success—relentlessly.
Demonstrate proficiency with practical projects
Projects are based on real-world scenarios and challenges, allowing you to apply the skills you learn to practical situations, while giving you real hands-on experience.
Gain proven experience
Retain knowledge longer
Apply new skills immediately
Top-tier services to ensure learner success
Reviewers provide timely and constructive feedback on your project submissions, highlighting areas of improvement and offering practical tips to enhance your work.
Get help from subject matter experts
Learn industry best practices
Gain valuable insights and improve your skills
Unlimited access to our top-rated courses
Real-world projects
Personalized project reviews
Program certificates
Proven career outcomes
Full Catalog Access
One subscription opens up this course and our entire catalog of projects and skills.
Average time to complete a Nanodegree program
2 weeks
, Intermediate
(9)
3 months
, Intermediate
4 weeks
, Intermediate
4 weeks
, Beginner
1 month
, Intermediate
2 weeks
, Intermediate
4 weeks
, Intermediate
1 month
, Intermediate
3 weeks
, Advanced
3 weeks
, Beginner
4 weeks
, Beginner
3 weeks
, Beginner
4 weeks
, Advanced
3 weeks
, Intermediate
3 weeks
, Beginner
(115)
3 months
, Beginner