Udacity Logo
Log InSign Up

Security Architecture Planning and Design

Course

This course introduces the fundamental security planning, design, and systems thinking concepts that are used throughout security architecture. As networks and applications grow more complex, the need to identify potential sources of weakness that are a product of that complexity becomes crucial. Students who complete this course will be equipped with the skills to identify and evaluate risks in systems, assess whether or not risks are acceptable, and work alongside stakeholders to prioritize remediation efforts.

This course introduces the fundamental security planning, design, and systems thinking concepts that are used throughout security architecture. As networks and applications grow more complex, the need to identify potential sources of weakness that are a product of that complexity becomes crucial. Students who complete this course will be equipped with the skills to identify and evaluate risks in systems, assess whether or not risks are acceptable, and work alongside stakeholders to prioritize remediation efforts.

4 weeks

Real-world Projects

Completion Certificate

Last Updated January 10, 2022

Prerequisites:

No experience required

Course Lessons

Lesson 1

Introduction to Security Planning and Design

In this lesson we'll learn how to evaluate security risks, prioritize remediation, apply systems thinking to security problems, and build simple architecture diagrams.

Lesson 2

Security and Regulatory Frameworks

Learn how to apply both general-purpose and industry-specific security frameworks, as well as data privacy legislation, to applications and infrastructure.

Lesson 3

Designing Secure Systems

Use governance, risk management, and compliance to achieve security goals, examine business needs to determine which risks are worth accepting, and design secure architectures from scratch.

Lesson 4 • Project

Conduct an Application Security Review

Demonstrate your new security architecture skills by conducting a security assessment. You'll identify risks and policy violations in an existing architecture, and then recommend a new, secure design.

Taught By The Best

Photo of Erick Galinkin

Erick Galinkin

Principal AI Researcher | Rapid7

Erick Galinkin is a hacker and computer scientist, leading research at the intersection of security and artificial intelligence at Rapid7. He has spoken at numerous industry and academic conferences on topics ranging from malware development to game theory in security.

Taught By The Best

Photo of Erick Galinkin

Erick Galinkin

Principal AI Researcher | Rapid7

Erick Galinkin is a hacker and computer scientist, leading research at the intersection of security and artificial intelligence at Rapid7. He has spoken at numerous industry and academic conferences on topics ranging from malware development to game theory in security.

Get Started Today

Security Architecture Planning and Design