This Security Architect course equips you with the practical skills to design and implement robust security solutions. Develop the expertise to identify and prioritise vulnerabilities in complex environments while exploring industry best practice for identity and access management, ensuring only authorised users have access to critical data. Learn to design multi-layered security architectures and implement robust monitoring to keep threats at bay. Through hands-on projects and real-world scenarios, you’ll gain the practical experience needed to safeguard IT infrastructure.
This Security Architect course will be delivered to you in partnership with Udacity, meaning you'll have access to both Udacity's learning and career services as well as RMIT Online's course enablement support through our Learner Success team. Upon successful completion of the course, students will also receive an RMIT Online credential which can be uploaded to LinkedIn, verifying their skill mastery in the discipline.
This Security Architect course is best suited for:
- Mid – Senior level IT professionals with a foundational level knowledge in cyber security wanting to build on their technical experience
- Aspiring mid-senior level network or cyber security professionals with experience in technical roles looking to transition towards a security architect role, focusing on the strategic and structural aspects of cyber security.
By the end of this course you’ll be able to:
- Design security architecture to evaluate business risks and implement trust models that keep data safe
- Design and develop identity access and management models to govern permissions and privileges across an organisation
- Integrate network defence in-depth controls to detect and alert for security incidents
- Establish an incident response and business continuity plan to respond to cyber-attacks with reducing its impact on the business
During this course you'll have the opportunity to demonstrate your newly acquired Security Architect skills through 4 projects.
In your first project you will review a customer information management system (CIMS) for security vulnerabilities and write up their findings in a technical report. In your second project you will architect IAM implementation with enforcement. In your third you will help improve the overall security of a water and power organisation and mitigate possible disruptions to customers. In your final project you will create and execute a cloud incident response runbook for a compromised database administrator account.
After completing this course, you’ll walk away with an RMIT credential which can be validated, recognised, and shared on social media platforms.
Prior to enrolling you should have the following knowledge:
- IT architecture diagramming
- Systems administration proficiency
- Cloud computing fluency
- Python scripting
- Amazon web services basics
- Cybersecurity fluency
- Basic Linux
- Computer networking basics