Back to Catalog

Digital Security Architecture

PremiumIntermediateCourse

Learn the fundamentals of cybersecurity architecture, including the CIA triad, IAM, endpoint security, and detection tools.

Language

  • English

Topic

  • Computer Science & Information Technology

Skills You Will Learn

  • Application Security, CyberSecurity, Data Security, Digital Network Architecture, Network Security

Offered By

  • IBMSkillsNetwork

Estimated Effort

  • 36 hours

Platform

  • SkillsNetwork

Last Update

  • February 24, 2026
About this Course
In today’s digital landscape, data is essential to the global economy, and cyberattacks often focus on stealing sensitive information or compromising systems. 

If you're interested in starting a career in cybersecurity or simply want to learn how it works, this five-module course on Cybersecurity Architecture is perfect for you. You’ll be guided by an experienced IBM cybersecurity engineer with extensive knowledge of the field. 

This course covers the core fundamentals of cybersecurity, including the five security principles, the CIA triad, Identity and Access Management (IAM), endpoint security, and security domains. You’ll also dive into detection and response strategies, gaining a well-rounded understanding of prevention, detection, and response in cybersecurity. 

Through practical activities, labs, and quizzes, you’ll apply what you’ve learned and test your knowledge at each step. Explore the world of cybersecurity and build a strong foundation for your future career! 

Learning Outcomes

  • Explain the five core principles of cybersecurity and the key concepts of the Confidentiality, Integrity, and Availability (CIA) triad 
  • Outline the various areas a cybersecurity architect must address to design a secure enterprise solution. 
  • Discuss key security domains, such as IAM, endpoint security, network security, application security, and data security 
  • Show your ability to recommend strategies for enhancing network security in a specific scenario 

Course Syllabus

Welcome
  • Video: Course Introduction (3:59)
  • General Information
  • Prerequisites and Course Syllabus
  • Grading Scheme
  • Helpful Tips for Course Completion

Module 1: Cybersecurity Architecture Overview
  • Module 1 Introduction and Learning Objectives
  • Video: Five Principles to Follow (and One to Avoid) (17:02)
  • Reading: Key Takeaways: Five Principles
  • Reading: How to Implement Least Privilege Security
  • Activity: Apply the Concept of Least Privilege
  • Video: Fundamentals of Confidentiality, Integrity, and Availability (12:25)
  • Reading: Key Takeaways: CIA Fundamentals
  • Reading: CIA Triad
  • Activity: Identify Compromised CIA Principles
  • Video: Roles and Tools (13:57)
  • Reading: Key Takeaways: Roles and Tools
  • Reading: NIST Cybersecurity Framework
  • Module 1 Summary: Cybersecurity Architecture Overview
  • Module 1 Glossary: Cybersecurity Architecture Overview
  • Module 1 Practice Quiz: Cybersecurity Architecture Overview
  • Module 1 Graded Quiz: Cybersecurity Architecture Overview
Module 2 Access Management and Endpoint Security
  • Module Introduction and Learning Objectives
  • Video: Who Are You? Identity and Access Management Really Wants to Know (31:04)
  • Reading: Key Takeaways: IAM
  • Reading: Understanding Multi-Factor Authentication
  • Activity: Apply Multi-Factor Authentication
  • Video: Endpoints Are the IT Front Door - Guard Them (13:51)
  • Reading: Key Takeaways: Endpoint Security
  • Reading: Endpoint Management with IBM
  • Activity: Implementing Endpoint Management
  • Module 2 Summary: Access Management and Endpoint Security
  • Module 2 Glossary: Access Management and Endpoint Security
  • Module 2 Practice Quiz: Access Management and Endpoint Security
  • Module 2 Graded Quiz: Access Management and Endpoint Security
Module 3 Network, Application, and Data Security
  • Module 3 Introduction and Learning Objectives
  • Video: Network Security (27:23)
  • Reading: Key Takeaways: Network Security
  • Reading: Securing Network Infrastructure
  • Video: Lab Demo (3:18)
  • Hands-on Lab: Secure Network Diagram
  • Video: Application Security (16:27)
  • Reading: Key Takeaways: Application Security
  • Reading: Secure Coding Practices
  • Video: Data Security (14:39)
  • Reading: Key Takeaways: Data Security
  • Reading: Data Security: Why a Proactive Stance is Best
  • Reading: Quantum Safe Encryption
  • Module 3 Summary: Network, Application, and Data Security
  • Module 3 Glossary: Network, Application, and Data Security
  • Module 3 Practice Quiz: Network, Application, and Data Security
  • Module 3 Graded Quiz: Network, Application, and Data Security
Module 4 Detection and Response
  • Module Introduction and Learning Objectives
  • Video: Detection (17:01)
  • Reading: Key Takeaways: Detection
  • Reading: Indicators of Compromise
  • Reading: Threat Intelligence
  • Hands-on Lab: Review Recent Security Threat Reports using X-Force Threat Exchange
  • Video: Response (15:49)
  • Reading: Key Takeaways: Response
  • Reading: Incident Response Frameworks
  • Activity: Incident Response
  • Reading: Case Study - Stopping Cyberattacks at a Major International Airport
  • Module 4 Summary: Detection and Response
  • Module 4 Glossary: Detection and Response
  • Module 4 Practice Quiz: Detection and Response
  • Module 4 Graded Quiz: Detection and Response
Module 5 Final Project and Exam
  • Module Introduction and Learning Objectives'
  • Reading: Final Project: Recommendations to Improve Network Security
  • Final Project Graded Quiz: Recommendations to Improve Network Security
  • Reading: Case Study: Network Architecture Powered by IBM
  • Course Glossary: Cyber Defense Architecture
  • Final Exam: Cyber Defense Architecture
Course Wrap-Up
  • Course Summary: Cyber Defense Architecture
  • Congratulations and Next Steps
  • Thanks from the Course Team
  • Copyrights and Trademarks
Course Rating and Feedback

Badge

General Information

  • This course is self-paced.  
  • This platform works best with current versions of Chrome, Edge, Firefox, Internet Explorer, or Safari. 

Recommended Skills Prior to Taking this Course

Cybersecurity and Networking Fundamentals knowledge.