Security architecture and engineering

Course Info

Date: Apr-14-2025

Length: 1 Week

City: Kuala Lumpur

Fees: 3,750

Type: In Classroom

Available Dates

  • Apr-14-2025

    Kuala Lumpur

  • July-14-2025

    Kuala Lumpur

  • Oct-13-2025

    Kuala Lumpur

Dates in Other Venues

  • Mar-17-2025

    London

  • Apr-14-2025

    Istanbul

  • Apr-14-2025

    Paris

  • Apr-28-2025

    Dubai

  • May-19-2025

    London

  • June-02-2025

    Barcelona

  • June-02-2025

    Singapore

  • June-02-2025

    Amsterdam

  • June-30-2025

    Dubai

  • July-14-2025

    Paris

  • July-14-2025

    Istanbul

  • July-21-2025

    London

  • Aug-25-2025

    Dubai

  • Sep-01-2025

    Barcelona

  • Sep-01-2025

    Amsterdam

  • Sep-01-2025

    Singapore

  • Sep-15-2025

    London

  • Oct-13-2025

    Paris

  • Oct-13-2025

    Istanbul

  • Oct-27-2025

    Dubai

  • Nov-17-2025

    London

  • Dec-01-2025

    Barcelona

  • Dec-01-2025

    Amsterdam

  • Dec-01-2025

    Singapore

  • Dec-29-2025

    Dubai

Course Details

Course Outline

5 days course

Foundations of Security Architecture



  • Introduction to Security Architecture and Engineering and its role within modern IT and business environments.
  • Defining core Security Principles like the CIA triad, defense in depth, least privilege, etc.
  • Overview of security architecture and engineering frameworks like NIST, ISO/IEC 27001, COBIT
  • Best practices for designing defensible systems from the ground up using Secure Design Principles.
  • Introduction to risk identification, assessment, mitigation, and the basics of information system life cycle management.
  • Case Study: Analyze real-world breaches to highlight the impact of strong versus weak architectural decisions.

Threat Modeling and Vulnerability Assessment



  • Exploring Threat Modeling Techniques to identify and prioritize potential vulnerabilities:
  • STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege)
  • DREAD (Damage Potential, Reproducibility, Exploitability, Affected Users, Discoverability)
  • Comparing qualitative and quantitative methodologies for risk assessment.
  • Discussing vulnerabilities across various environments (client, server, database, cloud, ICS, virtualization, microservices, and high-performance computing).
  • Examining the influence of security policies, procedures, and compliance on risk management.
  • Scenario Exercise: Engage in practical labs to model threats, assess risks, and propose mitigation strategies.

Cryptography & Secure System Design


  • Introduction to symmetric encryption, hashing, digital signatures, and PKI.
  • Examining Advanced Cryptographic Concepts like cover key management, cryptographic protocols, and modern cryptanalytic attacks.
  • Steps to design secure coding practices, system hardening, and configuration management.
  • Discussing access control methods including multi-factor authentication and protocols such as OAuth and SAML.
  • Exploring architectural patterns that create powerful and scalable security solutions across all systems.

Network Security & Architectural Evaluation


  • Reviewing network segmentation, perimeter defenses, firewalls, VPNs, and memory protection.
  • Exploring the implementation and management of IDS/IPS and secure communication protocols.
  • Methods to Integrate security into the architecture lifecycle—from design through operation.
  • Tools and techniques to identify and remediate security weaknesses.
  • Understanding Architectural Reviews and Security Audits and how to perform comprehensive security evaluations and audits.

Advanced security engineering topics


  • Introduction to Zero Trust architecture and its importance in modern security engineering
  • Discussing Cloud & Virtualization Security concepts: Cloud services, container orchestration, and virtualized environments
  • Addressing challenges in IoT, mobile security, edge computing, and distributed microservices.
  • Understanding DevSecOps and Secure Development Lifecycle (SDLC) for operational security
  • Defining top security practices for continuous integration/delivery pipelines and agile development.
  • Exploring the process of Incident Response: planning, execution, and analysis of incident response, including disaster recovery.
  • Reviewing regulatory requirements and how legal frameworks shape security architectures.