Skip to content
  • Sign In
  • Try Now
View all events
Security Architecture

Security Architecture for Beginners

Published by O'Reilly Media, Inc.

Beginner content levelBeginner

From builder to planner +GenAI

Course outcomes

  • Understand the frameworks needed for success as a security architect
  • Understand the major cybersecurity requirements of any organization
  • Learn controls and how to categorize them
  • Explore network security diagrams

Course description

Security architecture ensures the integration of security and technical components, identifies and resolves conflicts, and supports continuous improvement. It is a comprehensive framework that outlines the design, behavior, and implementation of security controls and measures within an information system. It aligns with the organization’s security strategy and translates it into specific technical capabilities and relationships, providing clear technical guidance across all technical initiatives and security disciplines.

Join expert Dean Bushmiller to level up your cybersecurity architecture skills and get started on the path to becoming a security architect. You’ll explore frameworks, blueprints, and the system lifecycle and look at emerging concerns in the field, such as incorporating GenAI tools and models.

What you’ll learn and how you can apply it

  • Build your own mental representations of security architecture
  • Review a network architecture and the core services and devices
  • Identify poorly-placed controls
  • Determine placement of controls in a network
  • Given a scenario, determine what improvements can be made to support the mission in a financially prudent manner

This live event is for you because...

  • You’re beginning your career as a cybersecurity architect.
  • You want to improve your cybersecurity skills.

Prerequisites

Recommended preparation:

Recommended follow-up:

Schedule

The time frames are only estimates and may vary according to how the class is progressing.

Preparing for class (15 minutes)

  • Presentation: Pomodoro technique; how to get the most from class, the interface, and the recording; mind maps; AWS lab setup; Mentimeter; timeline; Am I ready for this content or do I need a review?; class activities; paper labs; readings
  • Hands-on exercise: Navigate shared content on O’Reilly and GitHub
  • Q&A

Short review of core concepts (10 minutes)

  • Hands-on exercises: What do you know?; confidentiality, integrity, and availability; authentication, authorization, and accounting; zero trust; physical security; change management; cryptology; What is wrong with this security?
  • Break

Core architectures (30 minutes)

  • Presentation: Architectures (TOGAF, Zackman, FEAF, DoDAF); common language; Why is X not an architecture?; harsh criticism for good reasons; practical approach
  • Hands-on exercise: Spot the salesperson
  • Q&A
  • Break

Blueprints and templates (30 minutes)

  • Presentation: Building blueprints and templates; security standards; scope versus system; assets and protocols; major control categories
  • Q&A
  • Break

Process overview (30 minutes)

  • Presentation: Plan, deploy, maintenance
  • Hands-on exercise: Translate business requirements into phases
  • Q&A
  • Break

System security engineering lifecycle process (30 minutes)

  • Presentation: AR architecture definition; prepare; develop viewpoints; develop models of candidate architectures; relate views to design; select; manage
  • Hands-on exercise: Spot the failure
  • Q&A

Your Instructor

  • Dean Bushmiller

    Dean Bushmiller is a virtual CISO, a penetration tester, and a global incident responder. His work with the Z9M9Z think tank impacts many Fortune 500 companies. As an instructor, he won O’Reilly’s Engager Award for 2023, so be ready to learn and have fun. He’s been teaching cybersecurity since 1999 and has achieved more than 34 major cybersecurity certifications and passed over 100 certification exams. Though Dean is nonmilitary, he has had the honor to train the US military since 1999. In recognition of his outstanding service in the Information Assurance field, he has received eight mission coins.

    linkedinXlinksearch