Course description
In this course, we will introduce a seven-step, business- and risk-driven process to develop security architectures. Among other things, we will examine business requirements as the drivers for security, data classification to understand the value of business information, security requirements to address prioritized information risks and architectural issues and risks which should inform future security budgeting and roadmap decisions.