BCS Practitioner Certificate in Information Assurance Architecture

Duration: 5 Days (40 Hours)

BCS Practitioner Certificate in Information Assurance Architecture Course Overview:

The BCS Practitioner Certificate in Information Assurance Architecture is a professional certification validating expertise in designing and implementing robust information security solutions. It signifies an in-depth understanding of information assurance, security risks, controls, and regulations, with a focus on creating architectures that safeguard against threats and align with business goals. This certification is utilized by industries to evaluate the competence of professionals involved in information assurance strategy design and implementation, ensuring secure and trustworthy information systems.

Intended Audience:

• IT professionals aspired to specialize in Information Assurance Architecture
• Network and System administrators seeking higher roles
• Auditors related to Information Security
• Information Assurance professionals
• Cybersecurity architects
• Data protection specialists
• Individuals with background in IT Security
• Risk assessment professionals
• Compliance managers in tech industries

Learning Objectives of BCS Practitioner Certificate in Information Assurance Architecture:

The main learning objectives of the BCS Practitioner Certificate in Information Assurance Architecture course revolve around cultivating a thorough comprehension of information assurance, data protection, and system security. The course is designed to provide students with advanced proficiencies in designing and implementing resilient security architectures. The emphasis is on grasping the fundamental principles, strategies, and methodologies of information assurance. Participants are anticipated to gain insight into risk management, legal compliance, and the formulation of security policies. The course aims to equip students to competently manage security incidents and ensure the uninterrupted operation of systems. Upon completion, learners should have the capability to seamlessly integrate security measures into system architectures.

The Basics of Information Assurance (IA) Architecture (15%, K2)
  • Describe the concepts of IA and cyber security, the role of the IA architect and the concepts of security architectures.
  • Describe the knowledge, skills and experience an IA architect must possess.
  • Explain the concepts and design principles used by IA architects when designing and assuring systems.
  • Describe security architectures at a high level using appropriate contextual terms and architectural concepts related to security concerns.
  • Explain the importance of design patterns and conceptual architectures.
  • Describe the methods and techniques used for risk assessment, business impact analysis, and establishing countermeasures and contingency plans.
  • Evaluate the security implications and governance of business transitions.
  • Explain the nature of organisational risk, culture, appetite and risk tolerance.
  • Evaluate how security is a business enabler.
  • Describe continuous improvement as a philosophy
  • Apply the techniques that can be used to measure security maturity levels.
  • Evaluate available security monitoring, response solutions and security services.
  • Describe the role of directories and how they can be used in authentication and authorisation.
  • Demonstrate the functions of security management within the organisation.
  • Evaluate the main network technologies, associated security controls and the threats they counter
  • Illustrate the main methods for resilience, recovery capabilities and techniques.
  • Illustrate the main characteristics of virtualisation, cloud platforms and their security aspects.
  • Illustrate the threats to Industrial Control Systems and appropriate countermeasures.
  • Demonstrate the purpose of Digital Right Managements (DRM), Data Loss Prevention (DLP), and their main standards and technologies.
  • Illustrate the threats to an organisation when implementing and managing microprocessor-controlled devices.
  • Evaluate common mobile platforms and technologies, their management, and their potential risks.
  • Apply appropriate security mechanisms for a given scenario or organisation.
  • Implement application security measures and adhere to appropriate frameworks to secure them.
  • Apply appropriate cryptographic mechanisms and techniques.
  • Evaluate the use of threat modelling techniques.
  • Illustrate security design patterns, common threats, and security controls that can be used to counter them.
  • Evaluate supplier assurance frameworks and how supplier services can be securely acquired and managed.
  • Evaluate the main authentication, authorisation, and accounting (AAA) techniques and how to implement them.
  • Demonstrate how new and emerging technologies impact on security.
  • Analyse how operational changes can be managed, controlled and assured.
  • Apply the main information assurance and enterprise architecture methodologies and frameworks.
  • Evaluate methods, tools and techniques for identifying potential vulnerabilities.
  • Evaluate methods, tools and techniques used for penetration testing.
  • Analyse vulnerability and penetration testing programs.
  • Analyse frameworks and tools that can be used to secure code.
  • Demonstrate an understanding of product evaluation and maturity models.
  • Demonstrate an understanding of cryptographic assurance frameworks and standards.
  • Explain the roles and responsibilities related to Information Assurance Architecture development.
  • Illustrate the importance of embedding security throughout the development process.
  • Demonstrate the main concepts and techniques of auditability and traceability.
  • Explain the core types of design artefacts at the conceptual, logical and physical layers.
  • Evaluate the security issues associated with commercial systems, applications and products.
  • Demonstrate the importance of systems hardening.
  • Explain the role and value of information security architecture within the overall business process.

BCS Practitioner Certificate in Information Assurance Architecture Course Prerequisites

• Prior experience in Information Assurance (IA) field
• Knowledge of IA concepts, principles, and best practices
• Understanding of network security architecture
• Familiarity with risk management and assessment
• Basic knowledge in IA technology implementation
• Awareness of IA legislation, policies, and standards
• BCS membership is recommended but not mandatory.

Discover the perfect fit for your learning journey

Choose Learning Modality

Live Online

  • Convenience
  • Cost-effective
  • Self-paced learning
  • Scalability

Classroom

  • Interaction and collaboration
  • Networking opportunities
  • Real-time feedback
  • Personal attention

Onsite

  • Familiar environment
  • Confidentiality
  • Team building
  • Immediate application

Training Exclusives

This course comes with following benefits:

  • Practice Labs.
  • Get Trained by Certified Trainers.
  • Access to the recordings of your class sessions for 90 days.
  • Digital courseware
  • Experience 24*7 learner support.

Got more questions? We’re all ears and ready to assist!

Request More Details

Please enable JavaScript in your browser to complete this form.

Subscribe to our Newsletter

Please enable JavaScript in your browser to complete this form.
×