Competency

Implementation of Control A 8.27 Secure System Architecture and Engineering Principles

Explore secure system architecture and risk management in this competency. Participants will learn foundational security principles, the role of architecture in resilience, and essential security standards. Delve into threat modeling and risk assessment to identify vulnerabilities and address common threats. The competency also covers secure components like network design, data protection, and authentication, while highlighting monitoring and response strategies aligned with ISO/IEC 27001 to enhance compliance and organizational resilience.

5 Trainers

About

Course Overview:

This course is designed to equip participants with the knowledge and skills necessary to implement secure system architectures. The course focuses on risk management, threat modeling, security standards, and the practical application of these principles to create resilient systems. Topics include network design, data protection, secure authentication, and continuous monitoring to meet industry standards like ISO/IEC 27001.

What You'll Learn:

  • Understanding the principles of secure system architecture
  • Identifying and managing risks through threat modeling and risk assessments
  • Addressing common security threats with effective system components
  • Implementing secure network designs, data protection, and authentication techniques
  • Aligning system architecture with ISO/IEC 27001 for continuous compliance and improvement
  • Building resilience and recovery strategies for incident response

Who Should Take This Course?

This course is perfect for:

  • Information security professionals
  • Risk managers and governance officers
  • IT architects and system engineers
  • Cybersecurity consultants and auditors
  • Business leaders responsible for security compliance

What You'll Get:

  • A certification of completion
  • Practical knowledge of secure system architecture and engineering principles
  • Access to a global community of cybersecurity professionals
  • Hands-on experience with real-world security frameworks and best practices
  • Access to course materials in multiple languages

Module 1

Introduction to the Secure System Architecture

  • Secure System Architecture Overview (13 mins)
  • Foundational Security Principles (14 mins)
  • Role of Architecture in Shaping Security (14 mins)
  • Security Standards and Frameworks (13 mins)
  • Take the Practice Quiz

Module 2

Threat Modeling and Risk Assessment

  • Threat Modeling Overview (13 mins)
  • Evaluating and Prioritizing Risk (14 mins)
  • Addressing Common Threats (14 mins)
  • Incorporating Privacy into System Architecture (15 mins)
  • Take the Practice Quiz

Module 3

Secure System Components and Technologies

  • Secure Network Design Principles (16 mins)
  • Securing Data in Transit and at Rest (13 mins)
  • Authentication and Authorization (13 mins)
  • Secure Cloud System Architectures (16 mins)
  • Take the Practice Quiz

Module 4

Monitoring, Response, and ISO/IEC 27001

  • Incident Response and Recovery (13 mins)
  • Continuous Monitoring and Adaptation (14 mins)
  • Implementation as per ISO/IEC 27001 (14 mins)
  • Auditing as per ISO/IEC 27001 (13 mins)
  • Take the Practice Quiz

Specialization · 4 modules             

4 Modules

100% Positive Reviews (24 reviews)

104 Lessons (4h 15m)

3,011 Students

Languages Available: Spanish, English, German, French

Exam

Certificate upon completion of the course

Tags

Implementation of Control 8.27

Secure System Architecture and Engineering Principles

Risk Management

ISO/IEC 27001

Data Protection

Authentication

Network Security

Cybersecurity Resilience

Threat Modeling

About the Trainer

Mike Boutwell

Information Security and Risk Management Expert

Mike Boutwell is an esteemed expert in information security and risk management, with over 15 years in security and 10 years in risk management, contributing to companies such as Cisco, AT&T, IBM, Kyndryl, First Data, and Euroclear. Specializing in artificial intelligence and cybersecurity, he identifies and mitigates cyber risks while integrating AI risk management into existing security frameworks. Mike has advanced information security through innovative vendor collaborations, maintaining high compliance rates, and authoring insightful publications on AI and cybersecurity.

Get Industry Insights and Special Offers

Skills Subscribes

© PECB Skills 2025. All rights reserved.

Book a Meeting

Skills - Book a demo

登録ありがとうございます!

Thank you for subscribing!