Who's it for?

This course will suit you if you are involved in information security or IT projects.

How can I access it?

Purchase and gain access to this course via BCS's exclusive platform - Discover.

How much does it cost?

What you'll learn:

  • Explain the key components of a network.
  • Explain the use of procedural, physical and technical controls.
  • Describe preventive, corrective and detective controls.
  • Describe how different controls contribute to the confidentiality, integrity and availability of information.
  • Explain the principles of digital forensics and business continuity management.

This course includes:

  • 60-90 minutes of on-demand training
  • Videos
  • Interactive elements to explore
  • Questions to test your understanding as you go
  • Reflection tasks to apply your learning
  • Scenarios to connect the topics to your work
  • Access on mobile and desktop
  • Earn a digital badge on completion

Course description

This course will suit you if you are involved in information security or IT projects. It will be particularly useful if you have – or want to have – one of these roles:

  • Solution Architect
  • Enterprise Architect
  • Business Architect
  • IT Security Specialist
  • Security Manager
  • Security Engineer
  • Information Security Analyst
  • Security Administrator
  • Network Security Engineer
  • Machine Learning Engineer

Information security architecture is the blueprint for the structure, processes and controls that protect information. It’s critical to managing risk and ensuring information systems function securely.

At the end of the module, you’ll be able to put your knowledge to the test and gain a digital badge which you can use to prove that you’ve successfully completed your training.

Course Content

1 module • 1 knowledge test • 60-90 minutes total length

 

The topics you’ll cover in this module are:

 

Key components of a network

Explore how components in a network function in order to keep information secure

Physical and procedural controls

Discover some of the first controls that an organisation can use to mitigate risk

Technical controls and cryptography

Learn about the software and hardware that can keep information and systems secure

Preventative, corrective and detective controls

Discover another way to classify controls based on their purpose

Confidentiality, integrity and availability

Find out about the ‘CIA triad’ and why it’s important to balance these three elements

Digital forensics and business continuity management

Delve into the steps that organisations should take during and after an information security incident

 

Already a BCS member?

Access your course via your MyBCS account.

Buy now

Non-member?

You can set up a free MyBCS account after purchase.

Buy now

Get in touch

Training five or more people? Want to buy more than one course for yourself? Or have a general enquiry? Please get in touch. Call our Customer Services team on (UK +44) 01793 417417 or make an enquiry with this form and we’ll contact you.