Enterprise Security Architecture

Learn to carve out your own enterprise security architecture — mastering security skills, staying ahead of threats, and growing your career. 

(SEC-ARCH.AV1) / ISBN : 978-1-64459-716-3
Lessons
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

Enroll in our enterprise security architecture course to build a proactive security framework that protects your entire business, not just its parts.

In this course, dive into the SABSA model, learn to measure risk and ROI, and design layered security strategies. You’ll gain a hands-on experience with tools to turn security into a business enabler.

Skills You’ll Get

  • Proactive Security Architecture Frameworks: Master the SABSA® model to build layered, business-aligned security architectures.
  • Risk Assessment & ROI Measurement: Learn to prioritize threats, quantify security investments, and track business impact.
  • Policy & Governance Development: Create enforceable security policies, compliance strategies, and governance structures.
  • Systems Thinking for Security: Apply engineering principles to integrate security across people, processes, and technology.
  • Operational Risk Mitigation: Develop strategies to manage vulnerabilities, continuity, and regulatory demands.
  • Stakeholder Collaboration: Sell security value to leadership, secure budgets, and align teams with business goals.

1

Preface

  • Benefits
  • The Evolution of Information Security
  • Information Security Literature
  • How to Use This Course
  • About the SABSA® Model
  • Relationship to Other Methods, Models and Standards
  • And Finally...
2

The Meaning of Security

  • The Cultural Legacy: Business Prevention
  • Measuring and Prioritising Business Risk
  • Information Security as the Enabler of Business
  • Adding Value to the Core Product
  • Empowering the Customers
  • Protecting Relationships and Leveraging Trust
  • To Summarise: What Does ‘Security’ Mean?
3

The Meaning of Architecture

  • The Origins of Architecture
  • Managing Complexity
  • Information Systems Architecture
  • Enterprise Security Architecture
  • Why Architectures Sometimes Fail to Deliver Benefit – and How to Avoid that Fate
  • Security Architecture Needs a Holistic Approach
  • To Summarise: What Does Architecture Mean?
4

Security Architecture Model

  • The SABSA® Model
  • The Architect’s View
  • The Designer’s View
  • The Builder’s View
  • The Tradesman’s View
  • The Facilities Manager’s View
  • The Inspector’s View
  • The SABSA® Matrix
  • Detailed SABSA® Matrix for the Operational Layer
  • To Summarise: The Security Architecture Model
5

Case Study

  • Intergalactic Banking and Financial Services Inc
  • Interviews at IBFS
  • To Summarise: IBFS Inc
6

A Systems Approach

  • The Role of Systems Engineering
  • Why a Systems Approach?
  • What Does the Systems Approach Make You Do?
  • The Need for Systems Engineering in Security Architectures
  • Some Basic Concepts
  • The Control System Concept
  • Using the Systems Approach in Security Architecture
  • Case Study
  • Advanced Modelling Techniques
  • To Summarise: A Systems Approach
7

Measuring Return on Investment in Security Architecture

  • What Is Meant by ‘Return on Investment’?
  • Why Do You Need Metrics?
  • The Security Management Dashboard
  • The Balanced Scorecard Approach
  • Business Drivers and Traceability
  • Business Attributes and Metrics
  • Setting Up a Metrics Framework
  • Maturity Models Applied to Security Architecture
  • To Summarise: Measuring Return on Investment in Security Architecture?
8

Using This Course as a Practical Guide

  • Using the SABSA® Model to Define a Development Process
  • Strategy and Concept Phase
  • Design Phase
  • Implementation Phase
  • Manage and Measure Phase
  • To Summarise: How to Use This Course as a Practical Guide
9

Managing the Security Architecture Programme

  • Selling the Benefits of Security Architecture
  • Getting Sponsorship and Budget
  • Building the Team
  • Getting Started: Fast Track™ Workshops
  • Programme Planning and Management
  • Collecting the Information You Need
  • Getting Consensus on the Conceptual Architecture
  • Architecture Governance and Compliance
  • Architecture Maintenance
  • Long-Term Confidence of Senior Management
  • To Summarise: Managing the Security Architecture Programme
10

Contextual Security Architecture

  • Business Needs for Information Security
  • Security As a Business Enabler
  • Digital Business
  • Operational Continuity and Stability
  • Safety-Critical Dependencies
  • Business Goals, Success Factors and Operational Risks
  • Operational Risk Assessment
  • Business Processes and Their Need for Security
  • Organisation and Relationships Affecting Business Security-Needs
  • Location Dependence of Business Security Needs
  • Time Dependency of Business Security Needs
  • To Summarise: Contextual Security Architecture
11

Conceptual Security Architecture

  • Conceptual Thinking
  • Business Attributes Profile
  • Control Objectives
  • Security Strategies and Architectural Layering
  • Security Entity Model and Trust Framework
  • Security Domain Model
  • Security Lifetimes and Deadlines
  • Assessing the Current State of your Security Architecture
  • To Summarise: Conceptual Security Architecture
12

Logical Security Architecture

  • Business Information Model
  • Security Policies
  • Security Services
  • Application and System Security Services
  • Security Management Services
  • Entity Schema and Privilege Profiles
  • Security Domain Definitions and Associations
  • Security Processing Cycle
  • Security Improvements Programme
  • To Summarise: Logical Security Architecture
13

Physical Security Architecture

  • Business Data Model
  • Security Rules, Practices and Procedures
  • Security Mechanisms
  • User and Application Security
  • Platform and Network Infrastructure Security
  • Control Structure Execution
  • To Summarise: Physical Security Architecture
14

Component Security Architecture

  • Detailed Data Structures
  • Security Standards
  • Security Products and Tools
  • Identities, Functions, Actions and ACLs
  • Processes, Nodes, Addresses and Protocols
  • Security Step-Timing and Sequencing
  • To Summarise: Component Security Architecture
15

Security Policy Management

  • The Meaning of Security Policy
  • Structuring the Content of a Security Policy
  • Policy Hierarchy and Architecture
  • Corporate Security Policy
  • Policy Principles
  • CA and RA Security Policies
  • Application System Security Policies
  • Platform Security Policies
  • Network Security Policies
  • Other Infrastructure Security Policies
  • Security Organisation and Responsibilities
  • Security Culture Development
  • Outsourcing Strategy and Policy Management
  • To Summarise
16

Operational Risk Management

  • Introduction to Operational Risk Management
  • Regulatory Drivers for Operational Risk Management
  • The Complexity of Operational Risk Management
  • Approaches to Risk Assessment
  • Managing Operational Risk
  • Risk Mitigation
  • Risk-Based Security Reviews
  • Risk Financing
  • The Risk Management Dashboard
  • To Summarise
17

Assurance Management

  • Assurance of Operational Continuity
  • Organisational Security Audits
  • System Security Audits
  • System Assurance Strategy
  • Functional Testing
  • Penetration Testing
  • To Summarise
18

Security Administration and Operations

  • Introduction to Security Management and Administration
  • Managing the People
  • Managing Physical and Environmental Security
  • Managing ICT Operations and Support
  • Access Control Management
  • Compliance Management
  • Security-Specific Operations
  • Managed Security Services
  • Product Evaluation and Selection
  • Business Continuity Management
  • To Summarise
A

Appendix A: List of Acronyms

Any questions?
Check out the FAQs

  Want to Learn More?

Contact Us Now

  • Security architects, IT managers, and CISOs.
  • Cybersecurity professionals aiming to specialize in risk-driven security design.
  • Compliance officers needing to align security with regulations like GDPR or HIPAA.

The enterprise security architecture course typically includes:

  • SABSA (business-driven security design)
  • TOGAF (enterprise architecture integration)
  • NIST CSF (risk management and compliance)

ESA focuses on holistic, proactive planning (e.g., layered defenses, Zero Trust) rather than reactive tools. It bridges the gaps between business strategy and technical implementation. 

This security architecture training prepares you for roles like: 

  • Security Architect ($128K avg. salary)
  • Cybersecurity Consultant
  • Compliance Manager

Related Courses

All Course
scroll to top