SABSA Is A Top To Bottom Framework And Methodology

SABSA® Foundation

SABSA® is the world’s leading open security architecture framework and methodology. SABSA is a top-to-bottom framework and methodology to conceive, conceptualise, design, implement and manage security in a business-driven model.

80% of Global Fortune 500 organizations are expected to adopt DevOps by 2021 – CA.

ADP, BBC News, ebay, GE, ING, Intuit, PayPal, Splunk, Uber & other MNCs worldwide use DevOps.

Be future ready. Start learning
Structure your learning and get a certificate to prove it.
Start Learning

Sabsa Foundation UpComing Batches

Nov-17 - Dec-29

Weekend
SOLD OUT

Timings: 07:00 AM To 10:00 AM (IST)

350.00     Enroll Now

Nov-10 - Dec-22

Weekday
SOLD OUT

Timings: 20:30 PM To 23:30 PM (IST)

350.00     Enroll Now

Nov-23 - Jan-04

Weekend
FILLING FAST

Timings: 07:00 AM To 10:00 AM (IST)

350.00     Enroll Now

Nov-30 - Jan-11

Weekday
FILLING FAST

Timings: 20:30 PM To 23:30 PM (IST)

350.00     Enroll Now

Dec-07 - Jan-18

Weekend

Timings: 07:00 AM To 10:00 AM (IST)

350.00     Enroll Now

Dec-14 - Jan-25

Weekday

Timings: 20:30 PM To 23:30 PM (IST)

350.00     Enroll Now
Be future ready. Start learning
Structure your learning and get a certificate to prove it.
Start Learning

Course Curriculum

SABSA® Foundation

SELF PACED

SABSA® is the world’s leading open security architecture framework and methodology. SABSA is a top-to-bottom framework and methodology to conceive, conceptualise, design, implement and manage security in a business-driven model.

  • WEEK 5-6
  • 10 Modules
  • 6 Hours
Self Paced

Information Security Strategy, Benefits and Objectives.

Topics:
  • Security: A Cultural Legacy as a Business Constraint.
  • Technical Legacy of Tactical Point Solutions.
  • Security Strategy, Tactics and Operations.
  • Critical Success Factors for Business, IT and Security.
  • Measuring and Prioritising Business Risk.
  • Enabling Business and Empowering Customers.
  • Adding Value to the Core Product.
  • Protecting Relationships and Leveraging Trust.

Topics:
  • Information Security and its Role in the Modern Enterprise.
  • Enterprise Security Architecture: Definition and Principles.
  • The History of SABSA Development.
  • Introduction to the SABSA Model.
  • The Business View of Security: Contextual Architecture.
  • The Architect’s View of Security: Conceptual Architecture.
  • The Designer’s View of Security: Logical Architecture.
  • The Builder’s View of Security: Physical Architecture.
  • The Tradesman’s View of Security: Component Architecture.
  • The Service Manager’s View of Security: Operational Architecture.
  • Traceability from Business Requirements to Deployed Solutions.
  • The SABSA Matrix and Service Management Matrix.

Business Requirements & How To Define Them.


Topics:
  • Business Goals, Success Factors and Operational Risks.
  • Business Processes and the Need for Security.
  • Location Dependence of Enterprise Security Needs.
  • Organisation and Relationships Affecting Enterprise Security.
  • Time Dependency of Enterprise Security.
  • Collecting Enterprise Requirements for Security.
  • Creating a Business Attributes Profile.
  • Defining Control Objectives.

Topics:
  • Managing Complexity.
  • Systems Engineering for Security.
  • Architectural Layering.
  • End-to-End Security.
  • Defence-in-Depth Models.
  • Security Domains.
  • Security Associations.
  • Trust Modelling.
  • Organisation & Workflow.
  • Infrastructure Strategy.
  • Management Strategy.

The Strategy Programme & Architecture Delivery.


Topics:
  • The SABSA Development Process.
  • The SABSA Lifecycle.
  • Strategy and Concept Phase Processes and Sub-processes.
  • Design Phase Processes and Sub-processes.
  • Implement Phase Processes and Sub-processes.
  • Manage and Measure Phase Processes and Sub-processes.
  • Top-down Decomposition of the SABSA Model.
  • Scope, Deliverables and Project Sequencing.

Topics:
  • Introduction to Return on Investment & Return of Value.
  • Defining the Benefits and Value Propositions.
  • Selling the Benefits.
  • Getting Sponsorship and Budget.
  • Building the Team.
  • Team Competency Assessment & Development.
  • Programme Planning and Management.
  • ‘Fast Track’ Start-up Programmes.
  • Collecting the Information You Need.
  • Gaining Consensus on the Conceptual Architecture.
  • Strategic Architecture Governance, Compliance and Maintenance.
  • Identifying Quick Wins and Gaining Long Term Confidence.

The Sabsa Security Management Framework.

Topics:
  • SABSA in the I.T. Lifecycle.
  • Using SABSA To Integrate Other Methods, Models & Standards.
  • SABSA and the ITIL Framework.
  • SABSA and CobIT.
  • SABSA and Project Management Standards.
  • SABSA and ISO Security Standards.
  • SABSA and IT Architecture.

Security Policy Management.


Topics:
  • Policy Principles.
  • Policy Content, Hierarchy & Architecture.
  • Security Policy Making.
  • Information & Systems Classification.
  • Third Party & Outsourcing Strategy & Policy Management.

Topics:
  • The Meaning of Risk.
  • Risk Philosophy & Methodology.
  • Corporate Governance & Enterprise Risk Management.
  • Risk Measurement and Risk Assessment.
  • Risk Mitigation.
  • Risk Appetite.
  • Risk Management Tools.
  • Measuring Success of Risk Management.

Security Organisation & Responsibilities.


Topics:
  • Security Governance.
  • Security Culture Development,Training & Awareness.
  • Ownership & Custody.
  • Service Provider & Customer Roles in Security Management.
  • Enterprise Audit & Review Framework.

Topics:
  • Business Continuity Planning.
  • Contingency Planning.
  • Crisis Management.
  • Business Recovery Planning.

Topics:
  • Technical Assurance of Security Correctness & Completeness.
  • Managing the Assurance Process for Systems & Software Development.
  • Assuring Integrity and Acceptable Use of Systems & Software.
  • Principles of Multi-phased Testing.

Security Services Architecture.


Topics:
  • Information as the Logical Representation of Business.
  • Logical Entities & Their Relationships.
  • Using Trust Models to Define Security Services.
  • Security Domains, Domain Definitions & Associations.
  • Security Processing Cycle.

Security Services Architecture.


Topics:
  • Security Rules, Practices & Procedures.
  • Security Mechanisms.
  • User Security.
  • Platform & Network Security.
  • Infrastructure for Service Delivery.
  • Technical Standards & Components.

Operational Security Services.


Topics:
  • Incident Management.
  • Incident Response.
  • Problem Management.
  • Change Management.
  • Continuity, Crisis & Recovery Management.

Topics:
  • Security Service Management.
  • Security Mechanism Management.
  • Security Component Management.
  • System Management & Administration.
  • User Management & Administration.
  • Security Audit Management.
  • Security Operations.
  • Product Evaluation & Selection.

Return on Investment & Return of Value.


Topics:
  • Return on Investment.
  • Net Present Value.
  • Internal Rate of Return.
  • Defining Value Metrics.
  • Business Attributes & Return of Value.

Program Syllabus

Curriculum

You can also view the program syllabus by downloading this program Curriculum.

Projects

How will I execute the practicals of Kubernetes certification course?

All the Case Studies and Demos will run on Ubuntu 17.10 VMs. The pre-built VMs and their Installation Guide will be present on LMS once you enroll for the course. Kubernetes is an open-source tool therefore anybody can use it for their lab exercises.

What are the system requirements for this course?

Hardware Requirement(s):- Memory – Minimum 16 GB RAM, processor – Intel Core i5 CPU @2.00 GHz or above, Storage–250 GB HDD/SDD or above, Software Requirement(s):- Operating System – Windows 7 or above, Ubuntu 14 or above, Latest Version of Oracle Virtual Box Installed, Windows PowerShell 4.0 or above (Install Azure Module), Microsoft Azure SDK for .NET v2.9 (prefer latest).

How will I execute the practicals of Kubernetes certification course?

The system requirements include Minimum 4 GB RAM, i3 processor or above, 20 GB HD.

Course Certification

OL Tech Edu’s Certificate Holders work at top 500s of companies like

Features

Explore step by step paths to get started on your journey to Jobs of Today and Tomorrow.

Instructor-led Sessions

30 Hours of Online Live Instructor-Led Classes.
Weekend Class : 10 sessions of 3 hours each.

Real Life Case Studies

Real-life Case Studies

Live project based on any of the selected use cases, involving implementation of the various real life solutions / services.

Assignments

Assignments

Each class will be followed by practical assignments.

24 x 7 Expert Support

24 x 7 Expert Support

We have 24x7 online support team to resolve all your technical queries, through ticket based tracking system, for the lifetime.

Certification

Certification

Towards the end of the course, OL Tech Edu certifies you for the course you had enrolled for based on the project you submit.

Course FAQ's

Enroll, Learn, Grow, Repeat! Get ready to achieve your learning goals with OL Tech Edu View All Courses

© 2015 - 2024 OL Tech Edu. All Rights Reserved.
Designed, Developed & Powered by MNJ SOFTWARE

The website is best experienced on the following version (or higher) of Chrome 31, Firefox 26, Safari 6 and Internet Explorer 9 browsers