Secure IT architecture is needed to meet your business, customer, and compliance requirements. Upon successful completion of this course you will be able to take a holistic approach to security, adopt an enterprise-wide view, and create principles, policies, and standards by which an information system will be designed and built.
Graduates of this course will be able to describe effective approaches to threat modeling and describe potential security threats to your systems. As a graduate you will be able to categorize those threats and implement reasonable security controls, ensuring that the hazards are properly addressed. You will also be able to describe the concepts of confidentiality, integrity, and availability and create secure systems to deliver value and address threats in designed systems.