Loading...

Course Description

Protecting companies and organizations from natural disasters and malicious acts are essential. Learn security architecture, security engineering, and secure network design principles.

Security architecture is the design and organization of the components, processes, services, and controls appropriate to reduce the security risks associated with a system to an acceptable level. Security engineering is the implementation of the design.

Examine security models, design strategies, methodologies, technical control mechanisms, cryptographic solutions, supply chain risk management, and system lifecycle management. Students will learn various aspects of computing networks, interconnections, networked devices, and communication processes related to information security. 

Topics like networking protocols, services, models, various design principles of secure network architecture, and secure communication channels will be introduced.

This course covers the following domains of the CISSP Common Body of Knowledge:

  • Domain Three: Security Architecture and Engineering
  • Domain Four: Communication and Network Security

Course Details

Course Learning Outcomes

By the completion of this course, successful learners will be able to:

  • Describe and apply secure design principles, security models and select controls based upon systems security requirements
  • Demonstrate knowledge in security architectures and designs, cryptographic solutions, and methods of cryptanalytic attacks
  • Explain and apply security principles and security controls to site and facility design
  • Describe and assess secure design principles in network architectures
  • Demonstrate knowledge in secure network components and implementation of secure communication channels according to design

Topics

  • System Architectures
    • General system architectures
    • Industrial control systems
    • Virtualized systems
    • Cloud-based systems
    • Pervasive systems
    • Distributed systems
  • Cryptology
    • Principles of cryptology
    • Symmetric cryptography
    • Asymmetric cryptography
    • Public key infrastructure
    • Cryptanalytic attacks
  • Security Architectures
    • Threat modelling
    • Security architecture design principles
    • Security models
    • Addressing security requirements
    • Security capabilities of information systems
  • Site and Facility Security
    • Security principles of facility design
    • Designing facility security controls
  • Networking Fundamentals
    • Data communications foundations
    • Networking protocols
    • Local, metropolitan, and wide area networks
  • Wireless Networking
    • Wireless networking, Wireless LAN security
    • Cellular networks
    • Satellite communications
  • Securing the Network
    • Secure networking, secure protocols
    • Multilayer protocols
    • Converged protocols
    • Micro-segmentation
  • Network Components
    • Transmission media
    • Network devices
    • Endpoint security
    • Content distribution networks
  • Secure Communications Channels
    • Voice communications
    • Multimedia collaboration
    • Remote access
    • Data communications
    • Virtualized networks
    • Third-party connectivity

Who is this course for?

This course will help you to acquire the knowledge covered in the following domains of the CISSP CBK:

  • Domain Three: Security Architecture and Engineering
  • Domain Four: Communication and Network Security

Individuals in different roles and at various career stages can benefit from this course. The course is designed for:

  • Recent graduates (degree, associate degree, diploma) in IT or Computer Science who plan to challenge the CISSP exams to become Associate of (ISC)2
  • Experienced IT professionals who are keen to move up the career ladder entering senior positions (e.g. manager, director, senior specialist, chief information security officer)
  • Individuals who want to learn the technical skills to a career change into cyber security or information security
  • IT infrastructure or Cyber Security professionals looking to upskill and learn new in-demand skills

Prerequisites

There are no mandatory prerequisites for this course. However, you are required to perform a self-assessment to ensure you meet the requirements to enrol.

Self-assessment for enrolment

Recent graduates (degree, associate degree, or diploma) in IT / Computer Science or related field

OR

At least 2 years of working experience in IT infrastructure or Cybersecurity

OR

Recommended prerequisites:

Applies Towards the Following Program(s)

Loading...
Enrol Now - Select a section to enrol in
Type
Online Synchronous
Days
T, Th
Time
6:00PM to 9:00PM
Dates
Feb 25, 2025 to Mar 20, 2025
Schedule and Location
Hours
24.0
Delivery Options
Course Fees
Flat Fee non-credit $799.00
Potential Price Adjustments
Reading List / Textbook

Maymi, F., & Haris, S. (2022). CISSP All-in-One Exam Guide (9th Edition). McGraw Hill.

ISBN: 9781260467369

Section Notes

Classes are held online in real time (Mountain Time) at the specified time and dates.

This course uses:

  • Desire2Learn (D2L), an online learning management system. The instructor will post the course outline and other materials in D2L.
  • Zoom web conferencing software.

For more information, please visit our Online Learning Resources.

Unless notified, all online courses are available at 9 am MT the day before the start date. Students registering on (or after) the start date will receive access within one day of registration.

Students unfamiliar with online learning are encouraged to take our free Digital Skills for Learning Online course.

Unless otherwise stated, notice of withdrawal or transfer from a course must be received at least seven calendar days prior to the start date of the course.

Required fields are indicated by .