Security Analyst to Security Architect- Track 4 Security Architect
duration: 15 hours |
Language: English (US) |
access duration: 365 days |

Details
This is the fourth track of the learning path Security Analyst to Security Architect. In this track, the focus is on the role of Security Architect.
You will learn about ethical hacking, intelligent security orchastration, regulatory mandates, breach notification process, triage automation, and a unified security playbook.
In this track you will find various training courses that prepare you to get started as a Security Architect. In addition, a live lab is available that teaches you to apply the learned theory in a practical environment. You conclude this part with an exam
Result
After completing this track you will have the knowledge and skills you will need when working as a Security Architect.
Prerequisites
You have successfully completed track 1, 2 and 3 of this learning path.
Target audience
Security Specialist
Content
Security Analyst to Security Architect- Track 4 Security Architect
Security Rules: Rules of Engagement
Prior to performing any penetration testing, it is important to
- outline the Rules of Engagement with the client. Discover common
- elements found in a ROE such as the scope of the engagement,
- information handling, potential impacts, and liabilities. Explore
- how to draft templates and pre-defined checklists that can help
- ensure all responsibilities, rules, and directives are clearly
- communicated.
Security Architect: Ethical Hacking Best Practices
To become a well-rounded ethical hacker you must have good
- ethics, love a challenge, and be persistent. In addition, you must
- have a strong technical background and be familiar with common
- tools, strategies, and techniques used in a variety of ethical
- hacking situations. Explore best practices related to ethical
- hacking and incident handling, legal considerations, and proactive
- hacking practices and strategies.
Intelligent Orchestration: Automating Security Incident Processing
Discover the importance of automating the responses to security incidents. Examine how SIEM and SOAR are related, as well as how automation and orchestration differ. The role of playbooks and machine learning in security is also covered.
Regulatory Mandates: Security Program Regulatory Integration
Discover the importance of integrating regulations with organizational security policies. Explore security standards such as GDPR, HIPAA, FISMA, as well as ISO and NIST security standards.
Data Security Breach Notification Process
Explore the data breach response plan as well as the regulatory
- requirements for notifying stakeholder and clients of a data
- security breach. Discover the regulatory notification requirements
- for the Digital Privacy Act, the General Data Protection Regulation
- (GDPR), the Health Insurance Portability and Accountability Act
- (HIPAA), and the Gramm Leach Bliley Act and the consequences for
- noncompliance.
Security Incident Triage
Explore the importance of security incident triage in handling incidents in a timely and automated manner. Familiarize yourself with anomalies and activities that often require triage.
Unified Security: Playbook Approach to Security
Discover the playbook approach to security including the security architect's approach to decision making in the era of Agile development. Also explore the challenges, benefits, and considerations to implementing a playbook approach.
Security Architect
- Practice Security Architect tasks such as implementing testing best practices, executing Ansible playbooks, automating upgrades with playbooks, and analyzing SSH activity. Then, test your skills by answering assessment questions after examining security data breach categories, applying NIST standards on encryption, working with ethical hacking tools and applying mitigation tools and techniques.
- This lab provides access to tools typically by Security Architects, including:
- � PowerShell 5.1
- � Nmap 7.60
- � OpenSSH 7.6p1
- � Nginx 1.14.0
- � Snort 2.9.7.0
- � Suricata 3.2
- � MySQL
- � Python 3.6.9
- � Python3-pip pip 9.0.1
- � Docker 18.09.7
- This lab is part of the Security Architect track of the Skillsoft Aspire Security Analyst to Security Architect journey.
Final Exam: Security Architect
Final Exam: Security Architect will test your knowledge and
- application of the topics presented throughout the Security
- Architect track of the Skillsoft Aspire Security Analyst to
- Security Architect Journey. Learners seeking to test their
- knowledge and application of Security Architect skills and those
- seeking to complete the Security Architect track of the Skillsoft
- Aspire Security Analyst to Security Architect Journey.
Course options
We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.
Optional practice exam (trial exam)
To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam.
Optional practice lab
To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediately. The lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience.
Sign In
WHY_ICTTRAININGEN
Via ons opleidingsconcept bespaar je tot 80% op trainingen
Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo
Spar met medecursisten en profileer je als autoriteit in je vakgebied.
Ontvang na succesvolle afronding van je cursus het officiële certificaat van deelname van Icttrainingen.nl
Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers
Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten
Orderproces
Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.
read more about the order process
Een zakelijk account aanmaken
Wanneer u besteld namens uw bedrijf doet u er goed aan om aan zakelijk account bij ons aan te maken. Tijdens het registratieproces kunt u hiervoor kiezen. U heeft vervolgens de mogelijkheden om de bedrijfsgegevens in te voeren, een referentie en een afwijkend factuuradres toe te voegen.
Betaalmogelijkheden
U heeft bij ons diverse betaalmogelijkheden. Bij alle betaalopties ontvangt u sowieso een factuur na de bestelling. Gaat uw werkgever betalen, dan kiest u voor betaling per factuur.

Cursisten aanmaken
Als u een zakelijk account heeft aangemaakt dan heeft u de optie om cursisten/medewerkers aan te maken onder uw account. Als u dus meerdere trainingen koopt, kunt u cursisten aanmaken en deze vervolgens uitdelen aan uw collega’s. De cursisten krijgen een e-mail met inloggegevens wanneer zij worden aangemaakt en wanneer zij een training hebben gekregen.
Voortgangsinformatie
Met een zakelijk account bent u automatisch beheerder van uw organisatie en kunt u naast cursisten ook managers aanmaken. Beheerders en managers kunnen tevens voortgang inzien van alle cursisten binnen uw organisatie.
What is included?
Certificate of participation | Yes |
Monitor Progress | Yes |
Award Winning E-learning | Yes |
Mobile ready | Yes |
Sharing knowledge | Unlimited access to our IT professionals community |
Study advice | Our consultants are here for you to advice about your study career and options |
Study materials | Certified teachers with in depth knowledge about the subject. |
Service | World's best service |
Platform
Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.

FAQ
Niet gevonden wat je zocht? Bekijk alle vragen of neem contact op.