Description
- Module 1: Evaluate Security architecture models and frameworks/ Security Architecture Modeling
- Module 2: Integrate security principles into applications development/ Architect for Governance, Compliance and Risk Management
- Module 3: Identity and Access Management (IAM) Architecture/ Design a security operations architecture
- Module 4: Architect for Application Security/ Produce an identity and access management architecture
- Module 5: Security Operations Architecture/ Develop an infrastructure security program
- Module 6: Create an Information Security Architecture that meets the requirements of governance/ Infrastructure Security Architecture








Reviews
There are no reviews yet.