8 hours 39 minutes
so looking at the frameworks, we're now gonna build our architecture. So in this section
Mmm, here's where the hardware, the software, the firmware. And that's what there's acronyms, hardware, software for where stand for
it's meet the business objectives
and with that architecture because it describes the inner operation
of all of those elements of our environment, we have to make sure that they work well together. So it's not enough just to signify that a device where mechanism works doesn't work in my environment.
Consistent. We have to think about scale, ability can week road in the future. Do we have the environment in place so that if we take on another organization, if we hire two under people, we have a huge boost in sales? Can we handle it?
Can we? If we're not immediately there, can we upgrade the equipment that we have? Can we bring in additional elements? Can we meet our needs? Right? Can the architecture Vern buyer environment not hold us back from implementing our goals is really kind of what we're saying here.
So when we talk about architecture, we could talk about business architecture, right, The elements of strategy and governance and organization processes with. We've really kind of addressed those starting with governance
data architecture, er, making sure that how we store process manage our data
is following and accomplishing our objectives. Application architecture. Er, are we designing APS within our framework? Are we are we testing and implementing
and then the technology offer architecture? You see that common theme with our architectures, how it comes together to support the strategy,
the goals, how to meet the objectives
Cybrary's Certified Information Security Manager (CISM) course is a great fit for IT professionals looking to move up in their organization and advance their careers and/or current CISMs looking to learn about the latest trends in the IT industry.