[   Home   |   News   |   Services   |   Solutions   |   White Papers   |   Programs   |   Associates   ]
(801) 763-7141, Fax (801) 763-0277
For more info contact:


Information Security Architecture

In this program participants will learn how to create and validate an information security architecture (ISA) that will promote interoperability with the physical, administrative/operational, and technical aspects of security. Review how to implement an ISA that will interact with the business drivers and information processes of the organization and that will protect its network infrastructure. Understand guidelines and leading practices that link all of the necessary security controls to a combination of design, baseline administrative controls, business drivers, legal requirements, and threat scenarios. Working through case studies and real-world solution examples, program particpants will focus on the advanced concepts and components that need to be known to design, build and implement an effective information security architecture.

Key points include:

  • Standards, Criteria, Specifications and Protocols
  • Information Security Architecture Elements including: distributed policy, authentication, perimeter security, access control and authorization, encryption, directory and database, toolkits and middleware, messaging and wireless, risk assessment and audit, incident response, and more
  • Creating and Validating the Architecture
  • Vendor Security Solutions
  • Case Study: Network Infrastructure Architecture and ISA
  • Case Study: Web Business Application Architecture and ISA
  • Case Study: ISA Steps




[   Home   |   News   |   Services   |   Solutions   |   White Papers   |   Programs   |   Associates   ]

© 1995-2003 InfoCore, Inc.